Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3ChilkatDotNet46.dll
windows7-x64
1ChilkatDotNet46.dll
windows10-2004-x64
1DUX4.dll
windows7-x64
1DUX4.dll
windows10-2004-x64
1SQLi Dumpe...T].exe
windows7-x64
7SQLi Dumpe...T].exe
windows10-2004-x64
7Settings.js
windows7-x64
3Settings.js
windows10-2004-x64
3SkinSoft.V...er.dll
windows7-x64
1SkinSoft.V...er.dll
windows10-2004-x64
1YouTube.lnk
windows7-x64
3YouTube.lnk
windows10-2004-x64
7bufferGeop.bin
windows7-x64
3bufferGeop.bin
windows10-2004-x64
3Analysis
-
max time kernel
36s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 15:43
Static task
static1
Behavioral task
behavioral1
Sample
ChilkatDotNet46.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ChilkatDotNet46.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
DUX4.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
DUX4.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
SQLi Dumper v.9.7 [Cracked By PC-RET].exe
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
SQLi Dumper v.9.7 [Cracked By PC-RET].exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
Settings.js
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
Settings.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
SkinSoft.VisualStyler.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
SkinSoft.VisualStyler.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
YouTube.lnk
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
YouTube.lnk
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
bufferGeop.bin
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
bufferGeop.bin
Resource
win10v2004-20240508-en
General
-
Target
SQLi Dumper v.9.7 [Cracked By PC-RET].exe
-
Size
3.0MB
-
MD5
1f121b5cd0526ce9b1a3ddf3414693c0
-
SHA1
1091a21b1cbb670e9a9a3c7add5239e53659159e
-
SHA256
ef2cdcef2ad200acb11aa28ff753ac53bad2559e01b4c15022ce0265dc1107b8
-
SHA512
ea044a01a4f29a2f76626c4f2680ce26d9f4b7453d557c95604305854969a2caa0f029bdc832984851978a8c156bee879589d80e46951a1844fb3180467a073b
-
SSDEEP
49152:XTH0TmAiumuCcLeYomvrveaULQ0Gi1ltdpEPU4aZn:XTH0TmAiumuC7YvrveaeQdYTniU/
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BB22E821-3309-11EF-A0CE-F6A29408B575} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 509cee9216c7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000001afd5a9497f90ad15f17b89df94c1c768fde97957270b4519fd8b433026fa818000000000e8000000002000020000000b0e1f471f94be8e62c00f4b7316cc7509b74f19deebef95b05910f6d222e78812000000030ed8c8960724fa8296a53c8614977d185b86cb21b25cbcec031e1962032124d40000000a7b4ce225a69c723699d86110e45d659e2773e86a2abb667fbe7f5211d5856f097253ab3f81211d8552102fc7a8985bd19c6e1b9828644849e8a8265b6700266 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2588 iexplore.exe 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2588 iexplore.exe 2588 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2588 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 28 PID 2952 wrote to memory of 2588 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 28 PID 2952 wrote to memory of 2588 2952 SQLi Dumper v.9.7 [Cracked By PC-RET].exe 28 PID 2588 wrote to memory of 2704 2588 iexplore.exe 29 PID 2588 wrote to memory of 2704 2588 iexplore.exe 29 PID 2588 wrote to memory of 2704 2588 iexplore.exe 29 PID 2588 wrote to memory of 2704 2588 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\SQLi Dumper v.9.7 [Cracked By PC-RET].exe"C:\Users\Admin\AppData\Local\Temp\SQLi Dumper v.9.7 [Cracked By PC-RET].exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://bhf.io/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2588 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
67KB
MD58b003c3f98f8d08968ac5d3c1cc90a60
SHA168f8d418638a81839a2ad665909916cda8efe625
SHA256d52a9c53f510237a194211aa3dc7d0f22f80fcc0593d9d77e0827ba6681b47e9
SHA512429e97c74b8e45a43d09618972f04ba46a8075867a631543eb7b7cbbb55a719cbe2e0412f3b63b989741e3807d733b2a6f3ecb735278adc5e734e18e297c4015