Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7ESET_VC52_...ol.exe
windows7-x64
7ESET_VC52_...ol.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3ESET_VC52_RegTool.exe
windows7-x64
7ESET_VC52_RegTool.exe
windows10-2004-x64
7VC52_ESET_IDInfo.exe
windows7-x64
7VC52_ESET_IDInfo.exe
windows10-2004-x64
7Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 10:05
Behavioral task
behavioral1
Sample
ESET_VC52_RegTool/ESET_VC52_RegTool.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ESET_VC52_RegTool/ESET_VC52_RegTool.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Banner.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Banner.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
ESET_VC52_RegTool.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
ESET_VC52_RegTool.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
VC52_ESET_IDInfo.exe
Resource
win7-20240704-en
General
-
Target
$PLUGINSDIR/Banner.dll
-
Size
4KB
-
MD5
91c9ee5005ac6cb4ec79a3b039b4c8df
-
SHA1
95a9c018b501b6697beca846a33955909c3f97be
-
SHA256
05838c8f81efbb98679010158f29cefd88a34fb1fe5d603e839dd406235ddf29
-
SHA512
41cc45a64fbe64cd83e704e87193004245f5d29f4f880921d041e5f2ceec86ca0653146e6477642eba73875b9d5f0d773b540436b19e4797def9c15d7618474b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3312 wrote to memory of 4604 3312 rundll32.exe 84 PID 3312 wrote to memory of 4604 3312 rundll32.exe 84 PID 3312 wrote to memory of 4604 3312 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\Banner.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\Banner.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4604
-