Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
37eb8647ef5...71.exe
windows7-x64
77eb8647ef5...71.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3WinPcap_4_1_3.exe
windows7-x64
7WinPcap_4_1_3.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$SYSDIR/Packet.dll
windows7-x64
1$SYSDIR/Packet.dll
windows10-2004-x64
1$SYSDIR/pthreadVC.dll
windows7-x64
1$SYSDIR/pthreadVC.dll
windows10-2004-x64
1$SYSDIR/wpcap.dll
windows7-x64
1$SYSDIR/wpcap.dll
windows10-2004-x64
1WinPcapInstall.dll
windows7-x64
1WinPcapInstall.dll
windows10-2004-x64
3rpcapd.exe
windows7-x64
1rpcapd.exe
windows10-2004-x64
1albiondata-client.exe
windows7-x64
1albiondata-client.exe
windows10-2004-x64
1uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 12:17
Static task
static1
Behavioral task
behavioral1
Sample
7eb8647ef59682e127eb5b698cb2d496a6c87790c88a69ab5bdf7f682ee7d171.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7eb8647ef59682e127eb5b698cb2d496a6c87790c88a69ab5bdf7f682ee7d171.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
WinPcap_4_1_3.exe
Resource
win7-20240419-en
Behavioral task
behavioral12
Sample
WinPcap_4_1_3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
$SYSDIR/Packet.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$SYSDIR/Packet.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
$SYSDIR/pthreadVC.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$SYSDIR/pthreadVC.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
$SYSDIR/wpcap.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
$SYSDIR/wpcap.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
WinPcapInstall.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
WinPcapInstall.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
rpcapd.exe
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
rpcapd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
albiondata-client.exe
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
albiondata-client.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
uninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
uninstall.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240215-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
General
-
Target
uninstall.exe
-
Size
259KB
-
MD5
22a26bb892e35810581882bcfc52c652
-
SHA1
eb734ca419687009c75229213ae285649a3c5921
-
SHA256
7723d04405e97cefd0e220133fbdb07acfb3bcb11e2607dc71482d555744ac8b
-
SHA512
61d0c5f55a13041e201818ba7cfa6319cbfed42f4d186b8b729e71ebf4388e59a7eda67ecf09e6c4de1a12d1cab30b21ce8f7b76d807cb1988eb455ea8c04082
-
SSDEEP
6144:rJ9ECqBWtxiRuQOWF0HWR5WA1MsaAPXO4CnssN0Ffb69d3J6kY62nOf:rvsRfF7vzfb69j6kY62C
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1872 Un_A.exe -
Loads dropped DLL 3 IoCs
pid Process 2012 uninstall.exe 1872 Un_A.exe 1872 Un_A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1872 Un_A.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1872 2012 uninstall.exe 28 PID 2012 wrote to memory of 1872 2012 uninstall.exe 28 PID 2012 wrote to memory of 1872 2012 uninstall.exe 28 PID 2012 wrote to memory of 1872 2012 uninstall.exe 28 PID 2012 wrote to memory of 1872 2012 uninstall.exe 28 PID 2012 wrote to memory of 1872 2012 uninstall.exe 28 PID 2012 wrote to memory of 1872 2012 uninstall.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninstall.exe"C:\Users\Admin\AppData\Local\Temp\uninstall.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:1872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5e5240dcd169abe69a7332d01106e1d84
SHA12ca68892501102586f6ab4eb99744d7f6138c166
SHA25696c40847d52270061c25743bc9ec4843be1991f3ac36c2d1b78ec04a04437ea4
SHA512519479d1c6bfd4fcb11e0802f9cf5eb7b324577514a986f0fdf07d33ff6a275dc5ac41654aed818d1c30e0bdda543297f4b7886442cbc93066a808cafbaf8a70
-
Filesize
14KB
MD58f45e78d9d02ca8a9f9c274a8bfe2a57
SHA19b3838e1d2d4fbc1c84e1252747e96aa1b223d83
SHA25678f9594721361fd3415b8c5194f9c9b87c580d6a70ddb95f2c4743c61ce68ebe
SHA512125f1bcf833e0c233ebee552c164d9726769f06e5163467888abea08048fdae60a94b903ef97ba82ca9cf684f3c027d9605d54e9efe794df3e452f9b20e4ca96
-
Filesize
259KB
MD522a26bb892e35810581882bcfc52c652
SHA1eb734ca419687009c75229213ae285649a3c5921
SHA2567723d04405e97cefd0e220133fbdb07acfb3bcb11e2607dc71482d555744ac8b
SHA51261d0c5f55a13041e201818ba7cfa6319cbfed42f4d186b8b729e71ebf4388e59a7eda67ecf09e6c4de1a12d1cab30b21ce8f7b76d807cb1988eb455ea8c04082