Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
33dRipperPro.exe
windows7-x64
13dRipperPro.exe
windows10-2004-x64
1Bulk Downloader.exe
windows7-x64
1Bulk Downloader.exe
windows10-2004-x64
1Command Li...es.cmd
windows7-x64
1Command Li...es.cmd
windows10-2004-x64
1Data/3dripper.exe
windows7-x64
1Data/3dripper.exe
windows10-2004-x64
1Data/3dripper.exe
windows7-x64
1Data/3dripper.exe
windows10-2004-x64
1Data/DecryptTex.exe
windows7-x64
7Data/DecryptTex.exe
windows10-2004-x64
7Data/Noesi...is.exe
windows7-x64
3Data/Noesi...is.exe
windows10-2004-x64
3Data/Noesi...gl.dll
windows7-x64
3Data/Noesi...gl.dll
windows10-2004-x64
3Data/Noesi...is.dll
windows7-x64
3Data/Noesi...is.dll
windows10-2004-x64
3Data/Noesi...on.dll
windows7-x64
3Data/Noesi...on.dll
windows10-2004-x64
3Data/Noesi...bx.dll
windows7-x64
3Data/Noesi...bx.dll
windows10-2004-x64
3Data/Noesi...iew.py
windows7-x64
3Data/Noesi...iew.py
windows10-2004-x64
3Data/Noesi...sis.py
windows7-x64
3Data/Noesi...sis.py
windows10-2004-x64
3Data/cares.dll
windows7-x64
1Data/cares.dll
windows10-2004-x64
1Data/colla...mt.dll
windows7-x64
1Data/colla...mt.dll
windows10-2004-x64
1Data/gdal201.dll
windows7-x64
1Data/gdal201.dll
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
19/06/2024, 15:18
Behavioral task
behavioral1
Sample
3dRipperPro.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
3dRipperPro.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
Bulk Downloader.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
Bulk Downloader.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
Command Line Examples.cmd
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
Command Line Examples.cmd
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
Data/3dripper.exe
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
Data/3dripper.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
Data/3dripper.exe
Resource
win7-20240419-en
Behavioral task
behavioral10
Sample
Data/3dripper.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
Data/DecryptTex.exe
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
Data/DecryptTex.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Data/Noesis/Noesis.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
Data/Noesis/Noesis.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
Data/Noesis/noegl_opengl.dll
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
Data/Noesis/noegl_opengl.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
Data/Noesis/noesis.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Data/Noesis/noesis.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
Data/Noesis/plugins/NoesisPython.dll
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
Data/Noesis/plugins/NoesisPython.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
Data/Noesis/plugins/autodesk_fbx.dll
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
Data/Noesis/plugins/autodesk_fbx.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
Data/Noesis/plugins/python/fmt_artstation_mview.py
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
Data/Noesis/plugins/python/fmt_artstation_mview.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
Data/Noesis/plugins/python/inc_noesis.py
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
Data/Noesis/plugins/python/inc_noesis.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
Data/cares.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
Data/cares.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
Data/collada-dom2.4-dp-vc141-mt.dll
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
Data/collada-dom2.4-dp-vc141-mt.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
Data/gdal201.dll
Resource
win7-20240611-en
Behavioral task
behavioral32
Sample
Data/gdal201.dll
Resource
win10v2004-20240508-en
General
-
Target
Data/DecryptTex.exe
-
Size
21.9MB
-
MD5
d3b193a11118b4f16d23c7f751d4cbfb
-
SHA1
012d625ffcb291ebdfce7be7009bb9232bc4099b
-
SHA256
f255a15a18b6b9745ae74cf3d9689d6dcfbece4e3d01e9bb5eb3ed2854e21524
-
SHA512
30d4d3ab03c0218c98a5f8bf723894fd7cb0484b81299ce697ee9ca0018bc685896f7354e9ced22dc41a087eb1eb35d74e0a90434fd4da20729e6dc8506c663f
-
SSDEEP
393216:sPJscZFZs0InEroXHWe/ZODNoWruy3VU3o+qDPv2q9ANWW+N14S2qWqgAjlFw4qL:utZDmErUHWeGrugO4PXANWWftrAMV
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 236 DecryptTex.exe 236 DecryptTex.exe 236 DecryptTex.exe 236 DecryptTex.exe 236 DecryptTex.exe 236 DecryptTex.exe 236 DecryptTex.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1120 wrote to memory of 236 1120 DecryptTex.exe 29 PID 1120 wrote to memory of 236 1120 DecryptTex.exe 29 PID 1120 wrote to memory of 236 1120 DecryptTex.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Data\DecryptTex.exe"C:\Users\Admin\AppData\Local\Temp\Data\DecryptTex.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\Data\DecryptTex.exe"C:\Users\Admin\AppData\Local\Temp\Data\DecryptTex.exe"2⤵
- Loads dropped DLL
PID:236
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5721b60b85094851c06d572f0bd5d88cd
SHA14d0ee4d717aeb9c35da8621a545d3e2b9f19b4e7
SHA256dac867476caa42ff8df8f5dfe869ffd56a18dadee17d47889afb69ed6519afbf
SHA512430a91fcecde4c8cc4ac7eb9b4c6619243ab244ee88c34c9e93ca918e54bd42b08aca8ea4475d4c0f5fa95241e4aacb3206cbae863e92d15528c8e7c9f45601b
-
Filesize
14KB
MD51ed0b196ab58edb58fcf84e1739c63ce
SHA1ac7d6c77629bdee1df7e380cc9559e09d51d75b7
SHA2568664222823e122fca724620fd8b72187fc5336c737d891d3cef85f4f533b8de2
SHA512e1fa7f14f39c97aaa3104f3e13098626b5f7cfd665ba52dcb2312a329639aaf5083a9177e4686d11c4213e28acc40e2c027988074b6cc13c5016d5c5e9ef897b
-
Filesize
11KB
MD57e8b61d27a9d04e28d4dae0bfa0902ed
SHA1861a7b31022915f26fb49c79ac357c65782c9f4b
SHA2561ef06c600c451e66e744b2ca356b7f4b7b88ba2f52ec7795858d21525848ac8c
SHA5121c5b35026937b45beb76cb8d79334a306342c57a8e36cc15d633458582fc8f7d9ab70ace7a92144288c6c017f33ecfc20477a04432619b40a21c9cda8d249f6d
-
Filesize
4.2MB
MD5384349987b60775d6fc3a6d202c3e1bd
SHA1701cb80c55f859ad4a31c53aa744a00d61e467e5
SHA256f281c2e252ed59dd96726dbb2de529a2b07b818e9cc3799d1ffa9883e3028ed8
SHA5126bf3ef9f08f4fc07461b6ea8d9822568ad0a0f211e471b990f62c6713adb7b6be28b90f206a4ec0673b92bae99597d1c7785381e486f6091265c7df85ff0f9b5
-
Filesize
1011KB
MD5849959a003fa63c5a42ae87929fcd18b
SHA1d1b80b3265e31a2b5d8d7da6183146bbd5fb791b
SHA2566238cbfe9f57c142b75e153c399c478d492252fda8cb40ee539c2dcb0f2eb232
SHA51264958dabdb94d21b59254c2f074db5d51e914ddbc8437452115dff369b0c134e50462c3fdbbc14b6fa809a6ee19ab2fb83d654061601cc175cddcb7d74778e09
-
Filesize
11KB
MD55a72a803df2b425d5aaff21f0f064011
SHA14b31963d981c07a7ab2a0d1a706067c539c55ec5
SHA256629e52ba4e2dca91b10ef7729a1722888e01284eed7dda6030d0a1ec46c94086
SHA512bf44997c405c2ba80100eb0f2ff7304938fc69e4d7ae3eac52b3c236c3188e80c9f18bda226b5f4fde0112320e74c198ad985f9ffd7cea99aca22980c39c7f69
-
Filesize
11KB
MD591a2ae3c4eb79cf748e15a58108409ad
SHA1d402b9df99723ea26a141bfc640d78eaf0b0111b
SHA256b0eda99eabd32fefecc478fd9fe7439a3f646a864fdab4ec3c1f18574b5f8b34
SHA5128527af610c1e2101b6f336a142b1a85ac9c19bb3af4ad4a245cfb6fd602dc185da0f7803358067099475102f3a8f10a834dc75b56d3e6ded2ed833c00ad217ed