Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3ChilkatDotNet46.dll
windows7-x64
1ChilkatDotNet46.dll
windows10-2004-x64
1DUX4.dll
windows7-x64
1DUX4.dll
windows10-2004-x64
1SQLi Dumpe...T].exe
windows7-x64
7SQLi Dumpe...T].exe
windows10-2004-x64
7Settings.js
windows7-x64
3Settings.js
windows10-2004-x64
3SkinSoft.V...er.dll
windows7-x64
1SkinSoft.V...er.dll
windows10-2004-x64
1YouTube.lnk
windows7-x64
3YouTube.lnk
windows10-2004-x64
7bufferGeop.bin
windows7-x64
3bufferGeop.bin
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 15:43
Static task
static1
Behavioral task
behavioral1
Sample
ChilkatDotNet46.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ChilkatDotNet46.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
DUX4.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
DUX4.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
SQLi Dumper v.9.7 [Cracked By PC-RET].exe
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
SQLi Dumper v.9.7 [Cracked By PC-RET].exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
Settings.js
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
Settings.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
SkinSoft.VisualStyler.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
SkinSoft.VisualStyler.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
YouTube.lnk
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
YouTube.lnk
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
bufferGeop.bin
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
bufferGeop.bin
Resource
win10v2004-20240508-en
General
-
Target
bufferGeop.bin
-
Size
1.3MB
-
MD5
cb9ad69965f9f4cff8572983f60be67c
-
SHA1
5f49d5a1c915b08d54bca33bc0d52244f523e5a5
-
SHA256
56c7079dc309168d9c41dd4a7a61033acd264a120ca8d2e2182abb5b9ae6b0a3
-
SHA512
0f8543e976b75d20028d75e15590185106679317d110f0a7796ec9e1fb7fc50374b9866c0e208520df0bb03fef8a34d1e287b9894ac491d5f76f0eb876faa2fe
-
SSDEEP
24576:fV8G3DKTAme9ffU+bApdZdbEmniPX5b7U48QZ3tRV9dkUBQd:jTGAmQ4U1BUnQjpdkEI
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\bin_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\bin_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\bin_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\bin_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\bin_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.bin rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.bin\ = "bin_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\bin_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2592 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2592 AcroRd32.exe 2592 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1516 wrote to memory of 3068 1516 cmd.exe 29 PID 1516 wrote to memory of 3068 1516 cmd.exe 29 PID 1516 wrote to memory of 3068 1516 cmd.exe 29 PID 3068 wrote to memory of 2592 3068 rundll32.exe 30 PID 3068 wrote to memory of 2592 3068 rundll32.exe 30 PID 3068 wrote to memory of 2592 3068 rundll32.exe 30 PID 3068 wrote to memory of 2592 3068 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\bufferGeop.bin1⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bufferGeop.bin2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\bufferGeop.bin"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2592
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d2023beff15951049278efb28e612a43
SHA1ea215884d6488a188b3a2e3a97cd118f8767ba6e
SHA25667c9eb302bb5179c65013b031dcedc4e0254487ce9f02f1ca3a51dd560fc3b5c
SHA51255895a4684aeed0629795da82b5a5efd0b1af1d08c5c4904360a544b8afa2dd488a34cf00f5e1721f4642c679ded02b7827f1336ca288a45fd9eb5959835ed26