Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/05/2024, 08:06

General

  • Target

    SkrinshoterSetup_v3.11.4.30.exe

  • Size

    3.4MB

  • MD5

    061ba6da7357850ca194496766009f59

  • SHA1

    b31cdf2c231212c3c76c1e2616c1d04f44d89118

  • SHA256

    60c4175e18abf22d705d855abb6f16e08b80b9fb829a08589b9e4ba750c47349

  • SHA512

    8607833b8c8653545fdca0cd9011fff642622e98afb6e91503aa8a7534ff222b6821088d4e553babdb50b132d1aa42517033e584251816a574bd575ee18bccaa

  • SSDEEP

    98304:njGHuYqJ/x+OJQgQyiN5dvdlqNLOFCuAC4R/z5xQgJ:nKHuYMfYyiRvgL1uZa/z5rJ

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 4 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 18 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SkrinshoterSetup_v3.11.4.30.exe
    "C:\Users\Admin\AppData\Local\Temp\SkrinshoterSetup_v3.11.4.30.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4272
    • C:\Users\Admin\AppData\Local\Temp\nso6979.tmp\LauncherSRF.exe
      C:\Users\Admin\AppData\Local\Temp\nso6979.tmp\LauncherSRF.exe "C:\Program Files (x86)\Skrinshoter\skrinshoter.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nso6979.tmp\InstallOptions.dll

    Filesize

    15KB

    MD5

    89351a0a6a89519c86c5531e20dab9ea

    SHA1

    9e801aaaae9e70d8f7fc52f6f12cedc55e4c8a00

    SHA256

    f530069ef87a1c163c4fd63a3d5b053420ce3d7a98739c70211b4a99f90d6277

    SHA512

    13168fa828b581383e5f64d3b54be357e98d2eb9362b45685e7426ffc2f0696ab432cc8a3f374ce8abd03c096f1662d954877afa886fc4aa74709e6044b75c08

  • C:\Users\Admin\AppData\Local\Temp\nso6979.tmp\LauncherSRF.exe

    Filesize

    142KB

    MD5

    439682e20cd3b52b73127888772892e9

    SHA1

    11a2f12ea9bb3319a7070bbbe9c73bef5e0f1846

    SHA256

    1db6f336eac2947e467243ac4f7b87cd5de253939351e6476653a10365a69848

    SHA512

    5e8ac59db831fafd00cbb2650bb4222f9c222569927258bacc288b47797d16bf9a220edb18e6ff15470e175928993488a2ada07ee3c14939f12b94be43b7e1ab

  • C:\Users\Admin\AppData\Local\Temp\nso6979.tmp\System.dll

    Filesize

    11KB

    MD5

    bf712f32249029466fa86756f5546950

    SHA1

    75ac4dc4808ac148ddd78f6b89a51afbd4091c2e

    SHA256

    7851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af

    SHA512

    13f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4

  • C:\Users\Admin\AppData\Local\Temp\nso6979.tmp\UAC.dll

    Filesize

    14KB

    MD5

    adb29e6b186daa765dc750128649b63d

    SHA1

    160cbdc4cb0ac2c142d361df138c537aa7e708c9

    SHA256

    2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

    SHA512

    b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

  • C:\Users\Admin\AppData\Local\Temp\nso6979.tmp\nsResize.dll

    Filesize

    4KB

    MD5

    a8655e0ca9e079edc631838273afc087

    SHA1

    20c4468e90f961c499870cfa6a179c82f6d72675

    SHA256

    eeb2705599c3075e652762e74c88d3cb482e01ad8cae65f02022f91aebf13cb5

    SHA512

    383201fc7f0d15f0d02ae638e411becac61eb5f475020220035ba6df560aee23cbb90082e6827aeaba434e150c08df87914e3cea308ed197f86d560eacc369e1

  • C:\Users\Admin\AppData\Local\Temp\nso6979.tmp\yandexbarpage2.ini

    Filesize

    5KB

    MD5

    3bcdf0c5e84343391b81547680838346

    SHA1

    7ee35cb44755dced6bb11ab936221085de3e2ea2

    SHA256

    e0b746be28f9d4475e23f92144ea601b816d4d678c41f16fb224a0e77074bded

    SHA512

    e4201bc48b17d44c9def545474d2aa70b34f44fe325c48fdf29130f0d0b434df0e8297c0b5b03201d66c5124f5732d0faf60c07c106bb9666a5f0557d4af72c6

  • C:\Users\Admin\AppData\Local\Temp\nso6979.tmp\yandexbarpage2.ini

    Filesize

    5KB

    MD5

    8760beff16d8bb0ee0467dfc0376177c

    SHA1

    77537a44c8d093947453c4356027ab35a8a61b0e

    SHA256

    2fd782548411c25917f584296c821422a32ed5fe26752cafaa647bb87a68d989

    SHA512

    c77620f62aaf0d8696ee2eaba26d91a85bbc6b41b1c29dda1aa4fab4ba72c10dc5f806f8f4172ad04953bdfe487fe8f3a9559814378d40805bd39623ed20bce0

  • memory/4272-81-0x0000000074D20000-0x0000000074D29000-memory.dmp

    Filesize

    36KB

  • memory/4272-53-0x0000000074D20000-0x0000000074D29000-memory.dmp

    Filesize

    36KB

  • memory/4272-100-0x0000000074D20000-0x0000000074D29000-memory.dmp

    Filesize

    36KB

  • memory/4272-87-0x0000000074D20000-0x0000000074D29000-memory.dmp

    Filesize

    36KB

  • memory/4272-86-0x0000000074D20000-0x0000000074D29000-memory.dmp

    Filesize

    36KB

  • memory/4272-83-0x0000000074D20000-0x0000000074D29000-memory.dmp

    Filesize

    36KB

  • memory/4272-82-0x0000000074D20000-0x0000000074D29000-memory.dmp

    Filesize

    36KB

  • memory/4272-20-0x0000000074D20000-0x0000000074D29000-memory.dmp

    Filesize

    36KB

  • memory/4272-77-0x0000000074D20000-0x0000000074D29000-memory.dmp

    Filesize

    36KB

  • memory/4272-63-0x0000000074D20000-0x0000000074D29000-memory.dmp

    Filesize

    36KB

  • memory/4272-57-0x0000000074D20000-0x0000000074D29000-memory.dmp

    Filesize

    36KB

  • memory/4272-99-0x0000000074D20000-0x0000000074D29000-memory.dmp

    Filesize

    36KB

  • memory/4272-369-0x0000000074D20000-0x0000000074D29000-memory.dmp

    Filesize

    36KB

  • memory/4272-370-0x0000000074D20000-0x0000000074D29000-memory.dmp

    Filesize

    36KB

  • memory/4272-371-0x0000000074D20000-0x0000000074D29000-memory.dmp

    Filesize

    36KB

  • memory/4272-372-0x0000000074D20000-0x0000000074D29000-memory.dmp

    Filesize

    36KB

  • memory/4272-373-0x0000000074D20000-0x0000000074D29000-memory.dmp

    Filesize

    36KB

  • memory/4272-374-0x0000000074D20000-0x0000000074D29000-memory.dmp

    Filesize

    36KB

  • memory/4272-378-0x0000000074D20000-0x0000000074D29000-memory.dmp

    Filesize

    36KB

  • memory/4272-377-0x0000000074D20000-0x0000000074D29000-memory.dmp

    Filesize

    36KB

  • memory/4272-376-0x0000000074D20000-0x0000000074D29000-memory.dmp

    Filesize

    36KB

  • memory/4272-375-0x0000000074D20000-0x0000000074D29000-memory.dmp

    Filesize

    36KB