Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7lolxc/LOL�....4.exe
windows7-x64
7lolxc/LOL�....4.exe
windows10-2004-x64
7lolxc/LOL�...XC.dll
windows7-x64
7lolxc/LOL�...XC.dll
windows10-2004-x64
7lolxc/LOL�...xc.dll
windows7-x64
7lolxc/LOL�...xc.dll
windows10-2004-x64
7lolxc/LOL�...��.url
windows7-x64
1lolxc/LOL�...��.url
windows10-2004-x64
1lolxc/LOL�...��.bat
windows7-x64
1lolxc/LOL�...��.bat
windows10-2004-x64
1lolxc/LOL�...��.url
windows7-x64
1lolxc/LOL�...��.url
windows10-2004-x64
1lolxc/下�...��.url
windows7-x64
1lolxc/下�...��.url
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 16:57
Behavioral task
behavioral1
Sample
lolxc/LOL星辰辅助V9.4【超强脚本+超强躲避】/LOL星辰辅助超强脚本9.4.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
lolxc/LOL星辰辅助V9.4【超强脚本+超强躲避】/LOL星辰辅助超强脚本9.4.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
lolxc/LOL星辰辅助V9.4【超强脚本+超强躲避】/XC.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
lolxc/LOL星辰辅助V9.4【超强脚本+超强躲避】/XC.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
lolxc/LOL星辰辅助V9.4【超强脚本+超强躲避】/lolxc.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
lolxc/LOL星辰辅助V9.4【超强脚本+超强躲避】/lolxc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
lolxc/LOL星辰辅助V9.4【超强脚本+超强躲避】/使用说明/必须安装的组件.url
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
lolxc/LOL星辰辅助V9.4【超强脚本+超强躲避】/使用说明/必须安装的组件.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
lolxc/LOL星辰辅助V9.4【超强脚本+超强躲避】/使用说明/插件注册失败打开.bat
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
lolxc/LOL星辰辅助V9.4【超强脚本+超强躲避】/使用说明/插件注册失败打开.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
lolxc/LOL星辰辅助V9.4【超强脚本+超强躲避】/免费天卡赠送.url
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
lolxc/LOL星辰辅助V9.4【超强脚本+超强躲避】/免费天卡赠送.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
lolxc/下载银行-提供免费绿色软件下载.url
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
lolxc/下载银行-提供免费绿色软件下载.url
Resource
win10v2004-20240802-en
General
-
Target
lolxc/LOL星辰辅助V9.4【超强脚本+超强躲避】/LOL星辰辅助超强脚本9.4.exe
-
Size
13.9MB
-
MD5
33bce60b3b53716fb12d7731ea5fa5e6
-
SHA1
05c22f10b85c96008f87ff689adcf9b017278084
-
SHA256
a8838e3154fbdf8c0e1cbbb265926d703c90e9064f2e07cccc8cd99dd1b223db
-
SHA512
ab75dcb7d930f9833aa6c9c0b24b20220e296835b0d07f8c8d6bd968ff86298f753b6af2a853b3ecacdcac7590083193b2c8729de29e92beb9f7965aea9e107a
-
SSDEEP
196608:zT4tNUGi3iRO7pjPovaaMV2WFcqlBT9gbD7JVuWGRuGOlO8RZDX9:4TCiR2pr+aaMVbqf7ZTrZDX9
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3060-47-0x00000000012A0000-0x00000000012DE000-memory.dmp upx behavioral1/memory/3060-45-0x00000000012A0000-0x00000000012DE000-memory.dmp upx behavioral1/memory/3060-35-0x00000000012A0000-0x00000000012DE000-memory.dmp upx behavioral1/memory/3060-29-0x00000000012A0000-0x00000000012DE000-memory.dmp upx behavioral1/memory/3060-27-0x00000000012A0000-0x00000000012DE000-memory.dmp upx behavioral1/memory/3060-16-0x00000000012A0000-0x00000000012DE000-memory.dmp upx behavioral1/memory/3060-15-0x00000000012A0000-0x00000000012DE000-memory.dmp upx behavioral1/memory/3060-57-0x00000000012A0000-0x00000000012DE000-memory.dmp upx behavioral1/memory/3060-55-0x00000000012A0000-0x00000000012DE000-memory.dmp upx behavioral1/memory/3060-53-0x00000000012A0000-0x00000000012DE000-memory.dmp upx behavioral1/memory/3060-51-0x00000000012A0000-0x00000000012DE000-memory.dmp upx behavioral1/memory/3060-49-0x00000000012A0000-0x00000000012DE000-memory.dmp upx behavioral1/memory/3060-43-0x00000000012A0000-0x00000000012DE000-memory.dmp upx behavioral1/memory/3060-41-0x00000000012A0000-0x00000000012DE000-memory.dmp upx behavioral1/memory/3060-39-0x00000000012A0000-0x00000000012DE000-memory.dmp upx behavioral1/memory/3060-37-0x00000000012A0000-0x00000000012DE000-memory.dmp upx behavioral1/memory/3060-33-0x00000000012A0000-0x00000000012DE000-memory.dmp upx behavioral1/memory/3060-31-0x00000000012A0000-0x00000000012DE000-memory.dmp upx behavioral1/memory/3060-25-0x00000000012A0000-0x00000000012DE000-memory.dmp upx behavioral1/memory/3060-23-0x00000000012A0000-0x00000000012DE000-memory.dmp upx behavioral1/memory/3060-21-0x00000000012A0000-0x00000000012DE000-memory.dmp upx behavioral1/memory/3060-19-0x00000000012A0000-0x00000000012DE000-memory.dmp upx behavioral1/memory/3060-17-0x00000000012A0000-0x00000000012DE000-memory.dmp upx -
resource yara_rule behavioral1/memory/3060-0-0x0000000000400000-0x000000000121A000-memory.dmp vmprotect behavioral1/memory/3060-10-0x0000000000400000-0x000000000121A000-memory.dmp vmprotect behavioral1/memory/3060-68-0x0000000000400000-0x000000000121A000-memory.dmp vmprotect behavioral1/memory/3060-73-0x0000000000400000-0x000000000121A000-memory.dmp vmprotect behavioral1/memory/3060-72-0x0000000000400000-0x000000000121A000-memory.dmp vmprotect behavioral1/memory/3060-75-0x0000000000400000-0x000000000121A000-memory.dmp vmprotect behavioral1/memory/3060-79-0x0000000000400000-0x000000000121A000-memory.dmp vmprotect behavioral1/memory/3060-80-0x0000000000400000-0x000000000121A000-memory.dmp vmprotect behavioral1/memory/3060-82-0x0000000000400000-0x000000000121A000-memory.dmp vmprotect behavioral1/memory/3060-81-0x0000000000400000-0x000000000121A000-memory.dmp vmprotect behavioral1/memory/3060-78-0x0000000000400000-0x000000000121A000-memory.dmp vmprotect behavioral1/memory/3060-77-0x0000000000400000-0x000000000121A000-memory.dmp vmprotect behavioral1/memory/3060-76-0x0000000000400000-0x000000000121A000-memory.dmp vmprotect behavioral1/memory/3060-74-0x0000000000400000-0x000000000121A000-memory.dmp vmprotect behavioral1/memory/3060-71-0x0000000000400000-0x000000000121A000-memory.dmp vmprotect behavioral1/memory/3060-69-0x0000000000400000-0x000000000121A000-memory.dmp vmprotect behavioral1/memory/3060-70-0x0000000000400000-0x000000000121A000-memory.dmp vmprotect behavioral1/memory/3060-67-0x0000000000400000-0x000000000121A000-memory.dmp vmprotect behavioral1/memory/3060-66-0x0000000000400000-0x000000000121A000-memory.dmp vmprotect behavioral1/memory/3060-65-0x0000000000400000-0x000000000121A000-memory.dmp vmprotect behavioral1/memory/3060-64-0x0000000000400000-0x000000000121A000-memory.dmp vmprotect behavioral1/memory/3060-61-0x0000000000400000-0x000000000121A000-memory.dmp vmprotect behavioral1/memory/3060-63-0x0000000000400000-0x000000000121A000-memory.dmp vmprotect behavioral1/memory/3060-62-0x0000000000400000-0x000000000121A000-memory.dmp vmprotect behavioral1/memory/3060-60-0x0000000000400000-0x000000000121A000-memory.dmp vmprotect behavioral1/memory/3060-58-0x0000000000400000-0x000000000121A000-memory.dmp vmprotect behavioral1/memory/3060-83-0x0000000000400000-0x000000000121A000-memory.dmp vmprotect -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LOL星辰辅助超强脚本9.4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3060 LOL星辰辅助超强脚本9.4.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3060 LOL星辰辅助超强脚本9.4.exe 3060 LOL星辰辅助超强脚本9.4.exe 3060 LOL星辰辅助超强脚本9.4.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2648 3060 LOL星辰辅助超强脚本9.4.exe 30 PID 3060 wrote to memory of 2648 3060 LOL星辰辅助超强脚本9.4.exe 30 PID 3060 wrote to memory of 2648 3060 LOL星辰辅助超强脚本9.4.exe 30 PID 3060 wrote to memory of 2648 3060 LOL星辰辅助超强脚本9.4.exe 30 PID 3060 wrote to memory of 2648 3060 LOL星辰辅助超强脚本9.4.exe 30 PID 3060 wrote to memory of 2648 3060 LOL星辰辅助超强脚本9.4.exe 30 PID 3060 wrote to memory of 2648 3060 LOL星辰辅助超强脚本9.4.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\lolxc\LOL星辰辅助V9.4【超强脚本+超强躲避】\LOL星辰辅助超强脚本9.4.exe"C:\Users\Admin\AppData\Local\Temp\lolxc\LOL星辰辅助V9.4【超强脚本+超强躲避】\LOL星辰辅助超强脚本9.4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 "C:\Users\Admin\AppData\Local\Temp\lolxc\LOL????V9.4?????+?????\XC.dll" /s2⤵
- System Location Discovery: System Language Discovery
PID:2648
-