Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7Skrinshote...30.exe
windows7-x64
7Skrinshote...30.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...ig.dll
windows7-x64
3$PLUGINSDI...ig.dll
windows10-2004-x64
3$PLUGINSDI...RF.exe
windows7-x64
1$PLUGINSDI...RF.exe
windows10-2004-x64
1$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...er.exe
windows7-x64
1$PLUGINSDI...er.exe
windows10-2004-x64
1$PLUGINSDI...ze.dll
windows7-x64
7$PLUGINSDI...ze.dll
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...ry.dll
windows7-x64
3$PLUGINSDI...ry.dll
windows10-2004-x64
3LauncherSRF.exe
windows7-x64
1LauncherSRF.exe
windows10-2004-x64
1SimpleExt.dll
windows7-x64
7SimpleExt.dll
windows10-2004-x64
7SimpleExt64.dll
windows7-x64
7SimpleExt64.dll
windows10-2004-x64
7Skrinshoter.exe
windows7-x64
6Skrinshoter.exe
windows10-2004-x64
6curl.exe
windows7-x64
1curl.exe
windows10-2004-x64
1Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 08:06
Behavioral task
behavioral1
Sample
SkrinshoterSetup_v3.11.4.30.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
SkrinshoterSetup_v3.11.4.30.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/IpConfig.dll
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/IpConfig.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/LauncherSRF.exe
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/LauncherSRF.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/downloader.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/downloader.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsResize.dll
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsResize.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/nsRestartExplorer.dll
Resource
win7-20240419-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/nsRestartExplorer.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/registry.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/registry.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
LauncherSRF.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
LauncherSRF.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
SimpleExt.dll
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
SimpleExt.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
SimpleExt64.dll
Resource
win7-20240220-en
Behavioral task
behavioral28
Sample
SimpleExt64.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
Skrinshoter.exe
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
Skrinshoter.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
curl.exe
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
curl.exe
Resource
win10v2004-20240508-en
General
-
Target
SkrinshoterSetup_v3.11.4.30.exe
-
Size
3.4MB
-
MD5
061ba6da7357850ca194496766009f59
-
SHA1
b31cdf2c231212c3c76c1e2616c1d04f44d89118
-
SHA256
60c4175e18abf22d705d855abb6f16e08b80b9fb829a08589b9e4ba750c47349
-
SHA512
8607833b8c8653545fdca0cd9011fff642622e98afb6e91503aa8a7534ff222b6821088d4e553babdb50b132d1aa42517033e584251816a574bd575ee18bccaa
-
SSDEEP
98304:njGHuYqJ/x+OJQgQyiN5dvdlqNLOFCuAC4R/z5xQgJ:nKHuYMfYyiRvgL1uZa/z5rJ
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 4 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0007000000023417-17.dat acprotect behavioral2/memory/4272-20-0x0000000074D20000-0x0000000074D29000-memory.dmp acprotect behavioral2/memory/4272-53-0x0000000074D20000-0x0000000074D29000-memory.dmp acprotect behavioral2/memory/4272-369-0x0000000074D20000-0x0000000074D29000-memory.dmp acprotect -
Executes dropped EXE 1 IoCs
pid Process 2976 LauncherSRF.exe -
Loads dropped DLL 18 IoCs
pid Process 4272 SkrinshoterSetup_v3.11.4.30.exe 4272 SkrinshoterSetup_v3.11.4.30.exe 4272 SkrinshoterSetup_v3.11.4.30.exe 4272 SkrinshoterSetup_v3.11.4.30.exe 4272 SkrinshoterSetup_v3.11.4.30.exe 4272 SkrinshoterSetup_v3.11.4.30.exe 4272 SkrinshoterSetup_v3.11.4.30.exe 4272 SkrinshoterSetup_v3.11.4.30.exe 4272 SkrinshoterSetup_v3.11.4.30.exe 4272 SkrinshoterSetup_v3.11.4.30.exe 4272 SkrinshoterSetup_v3.11.4.30.exe 4272 SkrinshoterSetup_v3.11.4.30.exe 4272 SkrinshoterSetup_v3.11.4.30.exe 4272 SkrinshoterSetup_v3.11.4.30.exe 4272 SkrinshoterSetup_v3.11.4.30.exe 4272 SkrinshoterSetup_v3.11.4.30.exe 4272 SkrinshoterSetup_v3.11.4.30.exe 4272 SkrinshoterSetup_v3.11.4.30.exe -
resource yara_rule behavioral2/files/0x0007000000023417-17.dat upx behavioral2/memory/4272-20-0x0000000074D20000-0x0000000074D29000-memory.dmp upx behavioral2/memory/4272-53-0x0000000074D20000-0x0000000074D29000-memory.dmp upx behavioral2/memory/4272-369-0x0000000074D20000-0x0000000074D29000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\yandexbarpage2.ini SkrinshoterSetup_v3.11.4.30.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2976 LauncherSRF.exe 2976 LauncherSRF.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4272 wrote to memory of 2976 4272 SkrinshoterSetup_v3.11.4.30.exe 82 PID 4272 wrote to memory of 2976 4272 SkrinshoterSetup_v3.11.4.30.exe 82 PID 4272 wrote to memory of 2976 4272 SkrinshoterSetup_v3.11.4.30.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\SkrinshoterSetup_v3.11.4.30.exe"C:\Users\Admin\AppData\Local\Temp\SkrinshoterSetup_v3.11.4.30.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\nso6979.tmp\LauncherSRF.exeC:\Users\Admin\AppData\Local\Temp\nso6979.tmp\LauncherSRF.exe "C:\Program Files (x86)\Skrinshoter\skrinshoter.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD589351a0a6a89519c86c5531e20dab9ea
SHA19e801aaaae9e70d8f7fc52f6f12cedc55e4c8a00
SHA256f530069ef87a1c163c4fd63a3d5b053420ce3d7a98739c70211b4a99f90d6277
SHA51213168fa828b581383e5f64d3b54be357e98d2eb9362b45685e7426ffc2f0696ab432cc8a3f374ce8abd03c096f1662d954877afa886fc4aa74709e6044b75c08
-
Filesize
142KB
MD5439682e20cd3b52b73127888772892e9
SHA111a2f12ea9bb3319a7070bbbe9c73bef5e0f1846
SHA2561db6f336eac2947e467243ac4f7b87cd5de253939351e6476653a10365a69848
SHA5125e8ac59db831fafd00cbb2650bb4222f9c222569927258bacc288b47797d16bf9a220edb18e6ff15470e175928993488a2ada07ee3c14939f12b94be43b7e1ab
-
Filesize
11KB
MD5bf712f32249029466fa86756f5546950
SHA175ac4dc4808ac148ddd78f6b89a51afbd4091c2e
SHA2567851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
SHA51213f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4
-
Filesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
Filesize
4KB
MD5a8655e0ca9e079edc631838273afc087
SHA120c4468e90f961c499870cfa6a179c82f6d72675
SHA256eeb2705599c3075e652762e74c88d3cb482e01ad8cae65f02022f91aebf13cb5
SHA512383201fc7f0d15f0d02ae638e411becac61eb5f475020220035ba6df560aee23cbb90082e6827aeaba434e150c08df87914e3cea308ed197f86d560eacc369e1
-
Filesize
5KB
MD53bcdf0c5e84343391b81547680838346
SHA17ee35cb44755dced6bb11ab936221085de3e2ea2
SHA256e0b746be28f9d4475e23f92144ea601b816d4d678c41f16fb224a0e77074bded
SHA512e4201bc48b17d44c9def545474d2aa70b34f44fe325c48fdf29130f0d0b434df0e8297c0b5b03201d66c5124f5732d0faf60c07c106bb9666a5f0557d4af72c6
-
Filesize
5KB
MD58760beff16d8bb0ee0467dfc0376177c
SHA177537a44c8d093947453c4356027ab35a8a61b0e
SHA2562fd782548411c25917f584296c821422a32ed5fe26752cafaa647bb87a68d989
SHA512c77620f62aaf0d8696ee2eaba26d91a85bbc6b41b1c29dda1aa4fab4ba72c10dc5f806f8f4172ad04953bdfe487fe8f3a9559814378d40805bd39623ed20bce0