Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3tmpz16y76kd.exe
windows7-x64
4tmpz16y76kd.exe
windows10-2004-x64
4$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
37za.dll
windows7-x64
17za.dll
windows10-2004-x64
17za.exe
windows7-x64
17za.exe
windows10-2004-x64
1ipscan-3.9...up.exe
windows7-x64
7ipscan-3.9...up.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 19:50
Static task
static1
Behavioral task
behavioral1
Sample
tmpz16y76kd.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
tmpz16y76kd.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
7za.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
7za.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
7za.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
7za.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
ipscan-3.9.1-setup.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
ipscan-3.9.1-setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
General
-
Target
tmpz16y76kd.exe
-
Size
18.5MB
-
MD5
4bba5b7d3713e8b9d73ff1955211e971
-
SHA1
9473104a1aefb0daabe41a92d75705be7e2daaf3
-
SHA256
09b5e780227caa97a042be17450ead0242fd7f58f513158e26678c811d67e264
-
SHA512
78e36c1f75de9b33b3216b957b2523e8553bb59db3b0fe407040ba0441700d05476a16a367af12f321a5e9f06634d347732480511e6faca53bb06e78e8286424
-
SSDEEP
393216:EE2LeetrWJzdiEIMzqD3ZUswv2h/ojcCOvzXr98ASNg+:EE2dtr+dlzqNHZh/ogj8ASq+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 228 ipscan-3.9.1-setup.exe -
Loads dropped DLL 3 IoCs
pid Process 228 ipscan-3.9.1-setup.exe 228 ipscan-3.9.1-setup.exe 228 ipscan-3.9.1-setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpz16y76kd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipscan-3.9.1-setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1128 wrote to memory of 228 1128 tmpz16y76kd.exe 88 PID 1128 wrote to memory of 228 1128 tmpz16y76kd.exe 88 PID 1128 wrote to memory of 228 1128 tmpz16y76kd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmpz16y76kd.exe"C:\Users\Admin\AppData\Local\Temp\tmpz16y76kd.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\ProgramData\Microsoft\WindowsUpdate24\ipscan-3.9.1-setup.exeC:\ProgramData\Microsoft\WindowsUpdate24\ipscan-3.9.1-setup.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17.6MB
MD50995262c8adde90ec6d9e039b3d7293d
SHA1089ff4aee406f894c0ce2166d253c141a4c8fa32
SHA256223aa5d93a00b41bf92935b00cb94bb2970c681fc44c9c75f245a236d617d9bb
SHA512bdbf9fb817878295b2105e2eafcd3932680b4fff64825ca4f859ca10def823f89865e735593f7ea138bdc5f09bd913dd0b71f2ca5aff191068ad6538b0a69d1c
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
Filesize
4KB
MD52f69afa9d17a5245ec9b5bb03d56f63c
SHA1e0a133222136b3d4783e965513a690c23826aec9
SHA256e54989d2b83e7282d0bec56b098635146aab5d5a283f1f89486816851ef885a0
SHA512bfd4af50e41ebc56e30355c722c2a55540a5bbddb68f1522ef7aabfe4f5f2a20e87fa9677ee3cdb3c0bf5bd3988b89d1224d32c9f23342a16e46c542d8dc0926
-
Filesize
9KB
MD56c3f8c94d0727894d706940a8a980543
SHA10d1bcad901be377f38d579aafc0c41c0ef8dcefd
SHA25656b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2
SHA5122094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355