Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3Software_1.30.1.rar
windows7-x64
3Software_1.30.1.rar
windows10-2004-x64
7Debug/Addition.dll
windows7-x64
1Debug/Addition.dll
windows10-2004-x64
1Debug/Autoupdater.ini
windows7-x64
1Debug/Autoupdater.ini
windows10-2004-x64
1Debug/Cracker.dll
windows7-x64
1Debug/Cracker.dll
windows10-2004-x64
1Debug/DebugPPF.tmp
windows7-x64
3Debug/DebugPPF.tmp
windows10-2004-x64
3Debug/DebugPPT.tmp
windows7-x64
3Debug/DebugPPT.tmp
windows10-2004-x64
3Debug/Helper.dll
windows7-x64
1Debug/Helper.dll
windows10-2004-x64
1Debug/Management.log
windows7-x64
1Debug/Management.log
windows10-2004-x64
1Debug/Resource.dll
windows7-x64
1Debug/Resource.dll
windows10-2004-x64
1Debug/main.ini
windows7-x64
1Debug/main.ini
windows10-2004-x64
1Language.pimx
windows7-x64
3Language.pimx
windows10-2004-x64
3Main.ini
windows7-x64
1Main.ini
windows10-2004-x64
1Packaged/Main.xml
windows7-x64
1Packaged/Main.xml
windows10-2004-x64
1Packaged/Resource.dll
windows7-x64
1Packaged/Resource.dll
windows10-2004-x64
1Packaged/Utils.xml
windows7-x64
1Packaged/Utils.xml
windows10-2004-x64
1Software_1.30.1.exe
windows7-x64
10Software_1.30.1.exe
windows10-2004-x64
10Analysis
-
max time kernel
15s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/04/2024, 10:10
Static task
static1
Behavioral task
behavioral1
Sample
Software_1.30.1.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Software_1.30.1.rar
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Debug/Addition.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Debug/Addition.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
Debug/Autoupdater.ini
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Debug/Autoupdater.ini
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Debug/Cracker.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
Debug/Cracker.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
Debug/DebugPPF.tmp
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Debug/DebugPPF.tmp
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
Debug/DebugPPT.tmp
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
Debug/DebugPPT.tmp
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
Debug/Helper.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Debug/Helper.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
Debug/Management.log
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
Debug/Management.log
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
Debug/Resource.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Debug/Resource.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
Debug/main.ini
Resource
win7-20240220-en
Behavioral task
behavioral20
Sample
Debug/main.ini
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
Language.pimx
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Language.pimx
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
Main.ini
Resource
win7-20231129-en
Behavioral task
behavioral24
Sample
Main.ini
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
Packaged/Main.xml
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
Packaged/Main.xml
Resource
win10v2004-20240412-en
Behavioral task
behavioral27
Sample
Packaged/Resource.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
Packaged/Resource.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral29
Sample
Packaged/Utils.xml
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
Packaged/Utils.xml
Resource
win10v2004-20240412-en
Behavioral task
behavioral31
Sample
Software_1.30.1.exe
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
Software_1.30.1.exe
Resource
win10v2004-20240412-en
General
-
Target
Packaged/Utils.xml
-
Size
1KB
-
MD5
73e051427246dd4ca45935b1a4bd7e2d
-
SHA1
7216f05041252f1c3a9d84aacdf84ef62f1a1045
-
SHA256
b7b8b412ab1e4f32da8a7cd42aeaa6e7d8d340cf14977d3e87f7d8f5eb689b0f
-
SHA512
3fc10dea91962244389214d189c141466f5630e99b01af5761738ce884df14050cd08a43802dc45bbe9117290c34143b85a75694b6301954b51972180dca1e36
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B6772C11-03B5-11EF-A6D5-5A791E92BC44} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2296 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2188 1640 MSOXMLED.EXE 28 PID 1640 wrote to memory of 2188 1640 MSOXMLED.EXE 28 PID 1640 wrote to memory of 2188 1640 MSOXMLED.EXE 28 PID 1640 wrote to memory of 2188 1640 MSOXMLED.EXE 28 PID 2188 wrote to memory of 2296 2188 iexplore.exe 29 PID 2188 wrote to memory of 2296 2188 iexplore.exe 29 PID 2188 wrote to memory of 2296 2188 iexplore.exe 29 PID 2188 wrote to memory of 2296 2188 iexplore.exe 29 PID 2296 wrote to memory of 2872 2296 IEXPLORE.EXE 30 PID 2296 wrote to memory of 2872 2296 IEXPLORE.EXE 30 PID 2296 wrote to memory of 2872 2296 IEXPLORE.EXE 30 PID 2296 wrote to memory of 2872 2296 IEXPLORE.EXE 30
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Packaged\Utils.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2872
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec034deaa5923ea56ad45a54385fc168
SHA1a3a6407c9dbf1506f2d15225c62e703a1512bc6c
SHA256f96052e2618ff2b15c5d0a1f873fdaffead7d29e0c3a685291b9329675ad732c
SHA512977152019d4d399cd10dd68f7eed5dc1f15beae9d1d420e5413064fffb59dbc30ce6ce71707b21ca8773ee031d32377044794481993d1864f6df9440e88436ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ae2a22ec42338fb04977fb152504a51
SHA1dfcce5dcbbbfffbad495605e48aeee154585b4ba
SHA2561436e4eb33aff48a2ab33e3a791ab7c640b82417171b4877dba6a9e3ab4f6b90
SHA512c425dd4118457b969cdcb5e65316a22be138d03db4e640750d694e4ec6857fa2378a44d980e8d6b2458892ef0a948053c5a642d3c11560a9d9e80f3471b789c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5070052799b09edbc73cdb005c885dc11
SHA17d95a47dadc4f4474c02e9b341b34b68e4918251
SHA25638df1663a93d38acee6dff7cb06b6edc9127e441c585731b5ab8780b24001e0c
SHA512605d154fe243dfc52edc44b69d376780bef853349764e8445aae674189b10f5ed5ac22c4b61991c5fd86e1b010e233380606700caa595307bfced3dbb4a37de1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51242788ada2e82f1a947e6807b654207
SHA1f348c4905bcb2654630902ae49c1ef00694b7728
SHA25647e47edfc45dd059400dc71eecdfc9a4eba9f3d5739eed655eb96aecdb228d2a
SHA512f96c04ddd7e232375b8a8134f70ae8581606232f6787911db39064acb83910b44259cb992f7863256add150a7bf4a9493c687a82addfb574611353e3caca65ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590bc7403e2b23fcef5f05edad86ba9ba
SHA16aa78d47aaf7d37a8a71dc2f3894f931459728dd
SHA2569a7981265a4ddeb3a42c507348673229e20d4639d081495901f20355e168a500
SHA5126c72191d01c91c11e74b51346342d052ddfe48a149b1e9e877febffb843f4810fb2ed2eac0a274fba79d734ee1bd1698af30586043ca0e6444e3652a802811d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509d5918aec6619ee1a5cafee7d8202c9
SHA14caf2669f1b42ed3328d3a793b5cca645b76d181
SHA2566bc9627c12ff57237bbd3de6ad64a54bdf30fdafc3c224fd8fe95b47928c2577
SHA512f8c3462770062d4e0c2480d39b49af2532b3f9c5b64fb370c118e21754726e6aac2d1917f1b4027f7ddce9725258acbf2afea9deb8a55c361d3fedae61d1ab9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f6b03696120112e5f674dc184bc2ee5
SHA19194964ca1af8b7ba410d021dde2e913c4a40578
SHA256a71cf840006806d31b3b7ff833d03d1c79a8fb76a05f2a04b2a16bce313634f3
SHA51250bbaddcb5bbb189756b02b8a3380de8b47a295a8a6dd4f249f9901a6ecfa527af6d0f624f5d09a35bae91ffc0b74473c05ab5b0d690ebd62ad1acf345fbdc97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52047043258c2b2825b14b27516744f0d
SHA14d60436c3bec2a8e4b73f9f2aed19facef3f77b1
SHA2562279c4e5f93e15fcc6053921e6e7d7b6efb4101a92c2d3774971bb37c5a48a77
SHA512b0fc24691ecaca47699442ca29af9798bd4c7d27e888dc94b77ea1a3be86f6d060c800cb73db288fe6146596091c962be1f5be2d100ef2e7891ceaffa2c5078e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a