Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3b49c213803...7f.exe
windows7-x64
7b49c213803...7f.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Analysis
-
max time kernel
134s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2024, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
b49c2138036d7e76af3298f1911798608bd841de4dfb8688b04f2e34d505a27f.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b49c2138036d7e76af3298f1911798608bd841de4dfb8688b04f2e34d505a27f.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
General
-
Target
b49c2138036d7e76af3298f1911798608bd841de4dfb8688b04f2e34d505a27f.exe
-
Size
289KB
-
MD5
6d51c0dedf349badba95936f8a37740c
-
SHA1
fcc4d1c24f80e12b4bd9dd6cb5a3bb83af2cfce6
-
SHA256
b49c2138036d7e76af3298f1911798608bd841de4dfb8688b04f2e34d505a27f
-
SHA512
b30d9016b55285a5c013de6a073fdc1dbc3a5af7fd1cad86e3450959dc8bba24f20f1afc28fbbc12004df2f998203adfe793b57464e9c6a6106e7dce3852eba0
-
SSDEEP
6144:Xe3481SVWxJy7vou2pg+0ZzcjcNi8isBTyLbwqjG:OoUx8whSRcgu2GLb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1304 Au_.exe -
Loads dropped DLL 2 IoCs
pid Process 1304 Au_.exe 1304 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b49c2138036d7e76af3298f1911798608bd841de4dfb8688b04f2e34d505a27f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x00070000000234ae-3.dat nsis_installer_1 behavioral2/files/0x00070000000234ae-3.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1304 Au_.exe 1304 Au_.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 536 wrote to memory of 1304 536 b49c2138036d7e76af3298f1911798608bd841de4dfb8688b04f2e34d505a27f.exe 84 PID 536 wrote to memory of 1304 536 b49c2138036d7e76af3298f1911798608bd841de4dfb8688b04f2e34d505a27f.exe 84 PID 536 wrote to memory of 1304 536 b49c2138036d7e76af3298f1911798608bd841de4dfb8688b04f2e34d505a27f.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\b49c2138036d7e76af3298f1911798608bd841de4dfb8688b04f2e34d505a27f.exe"C:\Users\Admin\AppData\Local\Temp\b49c2138036d7e76af3298f1911798608bd841de4dfb8688b04f2e34d505a27f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58614c450637267afacad1645e23ba24a
SHA1e7b7b09b5bbc13e910aa36316d9cc5fc5d4dcdc2
SHA2560fa04f06a6de18d316832086891e9c23ae606d7784d5d5676385839b21ca2758
SHA512af46cd679097584ff9a1d894a729b6397f4b3af17dff3e6f07bef257bc7e48ffa341d82daf298616cd5df1450fc5ab7435cacb70f27302b6db193f01a9f8391b
-
Filesize
20KB
MD5c498ae64b4971132bba676873978de1e
SHA192e4009cd776b6c8616d8bffade7668ef3cb3c27
SHA2565552bdde7e4113393f683ef501e4cc84dccc071bdc51391ea7fa3e7c1d49e4e8
SHA5128e5ca35493f749a39ceae6796d2658ba10f7d8d9ceca45bb4365b338fabd1dfa9b9f92e33f50c91b0273e66adfbce4b98b09c15fd2473f8b214ed797462333d7
-
Filesize
289KB
MD56d51c0dedf349badba95936f8a37740c
SHA1fcc4d1c24f80e12b4bd9dd6cb5a3bb83af2cfce6
SHA256b49c2138036d7e76af3298f1911798608bd841de4dfb8688b04f2e34d505a27f
SHA512b30d9016b55285a5c013de6a073fdc1dbc3a5af7fd1cad86e3450959dc8bba24f20f1afc28fbbc12004df2f998203adfe793b57464e9c6a6106e7dce3852eba0