Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 16:57 UTC

General

  • Target

    lolxc/LOL星辰辅助V9.4【超强脚本+超强躲避】/lolxc.dll

  • Size

    369KB

  • MD5

    fbc493308cfa830a22ccdb67d86b705e

  • SHA1

    e6706182f48800cba8a6339f00b3ccac9fd4ec6d

  • SHA256

    b7d03cbb5c0201020c9775e7027969e7f076ff0250702427c172d19e19a10c34

  • SHA512

    76a8d5988a94aba8abbabba27fcec5c374c46586f94cdee17b1880307fcc829795449bf284afc0f4e44794124a954dcb96caf846a0eba3cda14427bb72909911

  • SSDEEP

    6144:o34tMU0GBeE8HmknK2h01GRny0zSyKO8MRWt8:i4t4/JHmd001GRng1BK

Score
7/10

Malware Config

Signatures

  • UPX packed file 20 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 25 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\lolxc\LOL星辰辅助V9.4【超强脚本+超强躲避】\lolxc.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\lolxc\LOL星辰辅助V9.4【超强脚本+超强躲避】\lolxc.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2324-0-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2324-2-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2324-3-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2324-1-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2324-4-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2324-5-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2324-6-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2324-7-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2324-8-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2324-9-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2324-10-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2324-11-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2324-12-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2324-13-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2324-14-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2324-15-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2324-16-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2324-17-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2324-18-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

  • memory/2324-19-0x0000000010000000-0x00000000100FC000-memory.dmp

    Filesize

    1008KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.