Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3hdl4.exe
windows7-x64
7hdl4.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3nogba.exe
windows7-x64
3nogba.exe
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7新云软件.url
windows7-x64
1新云软件.url
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 20:34
Static task
static1
Behavioral task
behavioral1
Sample
hdl4.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
hdl4.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
nogba.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
nogba.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
uninst.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
uninst.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
新云软件.url
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
新云软件.url
Resource
win10v2004-20240802-en
General
-
Target
uninst.exe
-
Size
65KB
-
MD5
79555a3d69e66899e98fa5252fba608f
-
SHA1
66a7b470e5f0a0534aa65fd3c724301d4366fef6
-
SHA256
04f4a4ef816a929cc64fa7deaa142fdd02e9b6e89511d7c79c3cf9d382647a7a
-
SHA512
61bee7a7847f1b94f349d5fa8bb6b994aa0c0ef10c8bd8b6ffeb0ead2a94a1b39e0f8c957a20d4713a49e937835a184001312e60e907bdd7b05b40645b748800
-
SSDEEP
1536:sppal05FyuC/jL052PgFEla4ZJJcC2gBZZZ3gxLSAOMbfj:sp8l05FyX0mpa4ZJJcrswSApf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1068 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 1068 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral8/files/0x0007000000023408-4.dat nsis_installer_1 behavioral8/files/0x0007000000023408-4.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2528 wrote to memory of 1068 2528 uninst.exe 87 PID 2528 wrote to memory of 1068 2528 uninst.exe 87 PID 2528 wrote to memory of 1068 2528 uninst.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD579555a3d69e66899e98fa5252fba608f
SHA166a7b470e5f0a0534aa65fd3c724301d4366fef6
SHA25604f4a4ef816a929cc64fa7deaa142fdd02e9b6e89511d7c79c3cf9d382647a7a
SHA51261bee7a7847f1b94f349d5fa8bb6b994aa0c0ef10c8bd8b6ffeb0ead2a94a1b39e0f8c957a20d4713a49e937835a184001312e60e907bdd7b05b40645b748800