Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3Setup/Inst...er.exe
windows10-2004-x64
10Setup/Inst...cef.js
windows10-2004-x64
3Setup/Inst...ent.js
windows10-2004-x64
3Setup/Inst...ef.dll
windows10-2004-x64
3Setup/Inst...cef.js
windows10-2004-x64
3Setup/Inst...ent.js
windows10-2004-x64
3Setup/Inst...ef.dll
windows10-2004-x64
3Setup/Inst...cef.js
windows10-2004-x64
3Setup/Inst...ent.js
windows10-2004-x64
3Setup/Inst...ef.dll
windows10-2004-x64
3Setup/Inst...cef.js
windows10-2004-x64
3Setup/Inst...ent.js
windows10-2004-x64
7Setup/Inst...ef.dll
windows10-2004-x64
3Setup/Inst...64.dll
windows10-2004-x64
1Setup/Inst...IM.dll
windows10-2004-x64
4Resubmissions
20/08/2024, 16:34
240820-t3gplssdje 10Analysis
-
max time kernel
430s -
max time network
1163s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 16:34
Static task
static1
Behavioral task
behavioral1
Sample
Setup/Installer/Installer.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Setup/Installer/data/Config/cef.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Setup/Installer/data/Config/cef_100_percent.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Setup/Installer/data/Config/libcef.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Setup/Installer/data/Data/cef.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
Setup/Installer/data/Data/cef_100_percent.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Setup/Installer/data/Data/libcef.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
Setup/Installer/data/INFO/cef.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Setup/Installer/data/INFO/cef_100_percent.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
Setup/Installer/data/INFO/libcef.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Setup/Installer/data/cash/cef.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
Setup/Installer/data/cash/cef_100_percent.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Setup/Installer/data/cash/libcef.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
Setup/Installer/dllhelper64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Setup/Installer/resources/AdobePIM.dll
Resource
win10v2004-20240802-en
General
-
Target
Setup/Installer/resources/AdobePIM.dll
-
Size
2.1MB
-
MD5
beb8e03bb664c6715efb2523d48a10a8
-
SHA1
a366eef76eb31fca69c0e4ad9f4ca1c8747dbf87
-
SHA256
e9df32510cecde28b237510f8e04c6861b2b27bc38886450e26e9f57044ccacf
-
SHA512
36b291fc2b808cec4668fb091f80afcdcadc7dec464b3da4364ac6213657378626fd12cd9e578206c9d3293aeb07e9b9807c9ef5576da1f1a1b2dfb4990b695d
-
SSDEEP
49152:g15hDTdnSb8oibZAPxoVxBFxo8GMcsNWsniXNTOfZ1D8LnU24M:g15hndnSOOyxBjo8GMcsNWtS1inUK
Malware Config
Signatures
-
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Adobe\OOBE\PDApp\pim.db rundll32.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\OOBE\PDApp\pim.db-journal rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4092 wrote to memory of 3096 4092 rundll32.exe 87 PID 4092 wrote to memory of 3096 4092 rundll32.exe 87 PID 4092 wrote to memory of 3096 4092 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Setup\Installer\resources\AdobePIM.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Setup\Installer\resources\AdobePIM.dll,#12⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3096
-