Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3MyTimeShut...14.exe
windows7-x64
7MyTimeShut...14.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3Comdlg32.dll
windows7-x64
1Comdlg32.dll
windows10-2004-x64
1GetPc.dll
windows7-x64
1GetPc.dll
windows10-2004-x64
1MSCOMCT2.dll
windows7-x64
1MSCOMCT2.dll
windows10-2004-x64
1MyTimeShutDown.exe
windows7-x64
6MyTimeShutDown.exe
windows10-2004-x64
6mscomctl.dll
windows7-x64
1mscomctl.dll
windows10-2004-x64
1msvbvm60.dll
windows7-x64
1msvbvm60.dll
windows10-2004-x64
1uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3yfDNetMenu.dll
windows7-x64
1yfDNetMenu.dll
windows10-2004-x64
1Analysis
-
max time kernel
136s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2024, 11:42
Static task
static1
Behavioral task
behavioral1
Sample
MyTimeShutDown2013-1014.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
MyTimeShutDown2013-1014.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
Comdlg32.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Comdlg32.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
GetPc.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
GetPc.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
MSCOMCT2.dll
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
MSCOMCT2.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
MyTimeShutDown.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
MyTimeShutDown.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
mscomctl.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
mscomctl.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
msvbvm60.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
msvbvm60.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
uninst.exe
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
uninst.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
yfDNetMenu.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
yfDNetMenu.dll
Resource
win10v2004-20240412-en
General
-
Target
uninst.exe
-
Size
47KB
-
MD5
89da208242478eba8244dff59caa70dd
-
SHA1
f8fb2231a9d5418e0e7493fb79c97c6d5d903792
-
SHA256
40e7678e756ec9b60d054d60a97675300a0a762cae2a7b01a48a9f3828e4f753
-
SHA512
93f06c9e1214f00ab5fe59df022788f5642751f31fa2875a4853c35300f6b5457170df64fec1186fb335904c2ba1e7c80145775c87da8a29073455e91952c419
-
SSDEEP
768:PhMZ0dF4ZFvQbn+eePu3cIQGCGbiC4k42M3wJJVKBTAScjgUW:PyZMSZFvknTePMZd4k4kJJVercs3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2164 Au_.exe -
Loads dropped DLL 1 IoCs
pid Process 2164 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral18/files/0x0008000000023277-3.dat nsis_installer_1 behavioral18/files/0x0008000000023277-3.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1164 wrote to memory of 2164 1164 uninst.exe 85 PID 1164 wrote to memory of 2164 1164 uninst.exe 85 PID 1164 wrote to memory of 2164 1164 uninst.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD50dc0cc7a6d9db685bf05a7e5f3ea4781
SHA15d8b6268eeec9d8d904bc9d988a4b588b392213f
SHA2568e287326f1cdd5ef2dcd7a72537c68cbe4299ceb1f820707c5820f3aa6d8206c
SHA512814dd17ebb434f4a3356f716c783ab7f569f9ee34ce5274fa50392526925f044798f8006198ac7afe3d1c2ca83a2ca8c472ca53fec5f12bbfbbe0707abacd6b0
-
Filesize
564B
MD562bed60f934b1c489304769fafcab274
SHA199d52314384034af4b6ba7aed2446ed40ba50591
SHA256970285d15e032803526db651569232ce6c7cf9004d8040493681575ee18db120
SHA51215418f32bd095530ed8a4033e1029bb52779b4ce4aea919a9f7dbfc0332a1bd675cdf7444555b4a0e0f7b2512221d813dfde3dedb63ee118304e9ded66baccb8
-
Filesize
603B
MD5aa3b14be920a60449888e88d5b04970d
SHA1c9f00a12de4c5b331d1b4c328e27ffe819d670d3
SHA256101687027abde3e09e4e7db1c5fc1b59144533ea9f6e660ba9f8168c78826004
SHA512ef1e984e160bcdd475e81ac428a31f21169f2f8903737fdc6e876e170388bb24e041fbae901fe8c04cd6347c0bb47851261bb065c373ac71cfefc7e1bb3ecb69
-
Filesize
47KB
MD589da208242478eba8244dff59caa70dd
SHA1f8fb2231a9d5418e0e7493fb79c97c6d5d903792
SHA25640e7678e756ec9b60d054d60a97675300a0a762cae2a7b01a48a9f3828e4f753
SHA51293f06c9e1214f00ab5fe59df022788f5642751f31fa2875a4853c35300f6b5457170df64fec1186fb335904c2ba1e7c80145775c87da8a29073455e91952c419