Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
3dfsetup222.exe
windows10-1703-x64
7Lang/lang-1041.dll
windows10-1703-x64
1Lang/lang-1043.dll
windows10-1703-x64
1Lang/lang-1044.dll
windows10-1703-x64
1Lang/lang-1045.dll
windows10-1703-x64
1Lang/lang-1046.dll
windows10-1703-x64
1Lang/lang-1048.dll
windows10-1703-x64
1Lang/lang-1049.dll
windows10-1703-x64
1Lang/lang-1050.dll
windows10-1703-x64
1Lang/lang-1051.dll
windows10-1703-x64
1Lang/lang-1052.dll
windows10-1703-x64
1Lang/lang-1053.dll
windows10-1703-x64
1Lang/lang-1055.dll
windows10-1703-x64
1Lang/lang-1057.dll
windows10-1703-x64
1Lang/lang-1058.dll
windows10-1703-x64
1Lang/lang-1059.dll
windows10-1703-x64
1Lang/lang-1060.dll
windows10-1703-x64
1Lang/lang-1061.dll
windows10-1703-x64
1Lang/lang-1062.dll
windows10-1703-x64
1Lang/lang-1063.dll
windows10-1703-x64
1Lang/lang-1065.dll
windows10-1703-x64
1Lang/lang-1066.dll
windows10-1703-x64
1Lang/lang-1067.dll
windows10-1703-x64
1Lang/lang-1071.dll
windows10-1703-x64
1Lang/lang-1079.dll
windows10-1703-x64
1Lang/lang-2052.dll
windows10-1703-x64
1Lang/lang-2070.dll
windows10-1703-x64
1Lang/lang-5146.dll
windows10-1703-x64
1Lang/lang-9999.dll
windows10-1703-x64
1df.exe
windows10-1703-x64
3df64.exe
windows10-1703-x64
1uninst.exe
windows10-1703-x64
8Analysis
-
max time kernel
194s -
max time network
262s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
03/09/2024, 13:50
Static task
static1
Behavioral task
behavioral1
Sample
dfsetup222.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Lang/lang-1041.dll
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Lang/lang-1043.dll
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
Lang/lang-1044.dll
Resource
win10-20240611-en
Behavioral task
behavioral5
Sample
Lang/lang-1045.dll
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
Lang/lang-1046.dll
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
Lang/lang-1048.dll
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
Lang/lang-1049.dll
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
Lang/lang-1050.dll
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
Lang/lang-1051.dll
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
Lang/lang-1052.dll
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
Lang/lang-1053.dll
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
Lang/lang-1055.dll
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
Lang/lang-1057.dll
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
Lang/lang-1058.dll
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
Lang/lang-1059.dll
Resource
win10-20240404-en
Behavioral task
behavioral17
Sample
Lang/lang-1060.dll
Resource
win10-20240611-en
Behavioral task
behavioral18
Sample
Lang/lang-1061.dll
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
Lang/lang-1062.dll
Resource
win10-20240404-en
Behavioral task
behavioral20
Sample
Lang/lang-1063.dll
Resource
win10-20240404-en
Behavioral task
behavioral21
Sample
Lang/lang-1065.dll
Resource
win10-20240404-en
Behavioral task
behavioral22
Sample
Lang/lang-1066.dll
Resource
win10-20240404-en
Behavioral task
behavioral23
Sample
Lang/lang-1067.dll
Resource
win10-20240404-en
Behavioral task
behavioral24
Sample
Lang/lang-1071.dll
Resource
win10-20240611-en
Behavioral task
behavioral25
Sample
Lang/lang-1079.dll
Resource
win10-20240404-en
Behavioral task
behavioral26
Sample
Lang/lang-2052.dll
Resource
win10-20240404-en
Behavioral task
behavioral27
Sample
Lang/lang-2070.dll
Resource
win10-20240404-en
Behavioral task
behavioral28
Sample
Lang/lang-5146.dll
Resource
win10-20240611-en
Behavioral task
behavioral29
Sample
Lang/lang-9999.dll
Resource
win10-20240404-en
Behavioral task
behavioral30
Sample
df.exe
Resource
win10-20240404-en
Behavioral task
behavioral31
Sample
df64.exe
Resource
win10-20240404-en
Behavioral task
behavioral32
Sample
uninst.exe
Resource
win10-20240404-en
General
-
Target
uninst.exe
-
Size
162KB
-
MD5
8714e02ab8492fa906242a4aac7b6f12
-
SHA1
70a660aa2a693f7fddc51edf0673c5e8a978dc6d
-
SHA256
063cde0afeb24ad52bc95f162167375305fa6ba843283b5fdc86e3da81939b79
-
SHA512
de260607ab21c5a1307e466950f5436756c1e171a853d2261c22e3f753e063eebffb338ff9d8a1cd9e52259324925b729c1cd3cf7965813e6a35a43196957748
-
SSDEEP
3072:1IS23BZO7kF1g+d2uumUvobAEoTG4X2EO9H311wz0mQZgwMSR:SS2PzdimUwIO9HLmigtSR
Malware Config
Signatures
-
Uses Session Manager for persistence 2 TTPs 1 IoCs
Creates Session Manager registry key to run executable early in system boot.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Session Manager\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 defraggler64.exe -
Executes dropped EXE 1 IoCs
pid Process 3676 Au_.exe -
Loads dropped DLL 5 IoCs
pid Process 3676 Au_.exe 3676 Au_.exe 3676 Au_.exe 3676 Au_.exe 3676 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4144 wrote to memory of 3676 4144 uninst.exe 73 PID 4144 wrote to memory of 3676 4144 uninst.exe 73 PID 4144 wrote to memory of 3676 4144 uninst.exe 73 PID 3676 wrote to memory of 1372 3676 Au_.exe 74 PID 3676 wrote to memory of 1372 3676 Au_.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\defraggler64.exeC:\Users\Admin\AppData\Local\Temp\defraggler64.exe -hostCleanup3⤵
- Uses Session Manager for persistence
PID:1372
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162KB
MD58714e02ab8492fa906242a4aac7b6f12
SHA170a660aa2a693f7fddc51edf0673c5e8a978dc6d
SHA256063cde0afeb24ad52bc95f162167375305fa6ba843283b5fdc86e3da81939b79
SHA512de260607ab21c5a1307e466950f5436756c1e171a853d2261c22e3f753e063eebffb338ff9d8a1cd9e52259324925b729c1cd3cf7965813e6a35a43196957748
-
Filesize
5KB
MD547352ef3e79fa0f07ec3b96df9249d05
SHA1ca445110f0097aa9b856aed9fd4955215534cf9a
SHA256d36d90f370080609b1615f30b3d075a584bd0de6740da01fb61bbebc4eaf575d
SHA512949774824bc08bf50df2e20711822505192d0180b12aa618e5c458fbc6187070757c6cb94974c3ea367095207070c1fcbf62599cda570a5291a69fdb4a1af607
-
Filesize
11KB
MD541a3c964232edd2d7d5edea53e8245cd
SHA176d7e1fbf15cc3da4dd63a063d6ab2f0868a2206
SHA2568b65fec615c7b371c23f8f7f344b12dc5085e40a556f96db318ed757494d62d5
SHA512fa16bd9d020602e3065afd5c0638bc37775b40eb18bfa33b4ca5babcc3e6f112ae7d43457a6e9685ddbe6e94b954a1dc43d1da7af9ca7464019a3f110af549c1
-
Filesize
4KB
MD5c1f778a6d65178d34bde4206161a98e0
SHA129719fffef1ab6fe2df47e5ed258a5e3b3a11cfc
SHA2569caf7a78f750713180cf64d18967a2b803b5580e636e59279dcaaf18ba0daa87
SHA5129c3cf25cf43f85a5f9c9ed555f12f3626ef9daeeedd4d366ada58748ead1f6e279fea977c76ae8bae1dc49bfd852e899cb137c4a006c13e9fcebf6e5e2926a4d