Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7lolxc/LOL�....4.exe
windows7-x64
7lolxc/LOL�....4.exe
windows10-2004-x64
7lolxc/LOL�...XC.dll
windows7-x64
7lolxc/LOL�...XC.dll
windows10-2004-x64
7lolxc/LOL�...xc.dll
windows7-x64
7lolxc/LOL�...xc.dll
windows10-2004-x64
7lolxc/LOL�...��.url
windows7-x64
1lolxc/LOL�...��.url
windows10-2004-x64
1lolxc/LOL�...��.bat
windows7-x64
1lolxc/LOL�...��.bat
windows10-2004-x64
1lolxc/LOL�...��.url
windows7-x64
1lolxc/LOL�...��.url
windows10-2004-x64
1lolxc/下�...��.url
windows7-x64
1lolxc/下�...��.url
windows10-2004-x64
1Analysis
-
max time kernel
140s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 16:57 UTC
Behavioral task
behavioral1
Sample
lolxc/LOL星辰辅助V9.4【超强脚本+超强躲避】/LOL星辰辅助超强脚本9.4.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
lolxc/LOL星辰辅助V9.4【超强脚本+超强躲避】/LOL星辰辅助超强脚本9.4.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
lolxc/LOL星辰辅助V9.4【超强脚本+超强躲避】/XC.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
lolxc/LOL星辰辅助V9.4【超强脚本+超强躲避】/XC.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
lolxc/LOL星辰辅助V9.4【超强脚本+超强躲避】/lolxc.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
lolxc/LOL星辰辅助V9.4【超强脚本+超强躲避】/lolxc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
lolxc/LOL星辰辅助V9.4【超强脚本+超强躲避】/使用说明/必须安装的组件.url
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
lolxc/LOL星辰辅助V9.4【超强脚本+超强躲避】/使用说明/必须安装的组件.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
lolxc/LOL星辰辅助V9.4【超强脚本+超强躲避】/使用说明/插件注册失败打开.bat
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
lolxc/LOL星辰辅助V9.4【超强脚本+超强躲避】/使用说明/插件注册失败打开.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
lolxc/LOL星辰辅助V9.4【超强脚本+超强躲避】/免费天卡赠送.url
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
lolxc/LOL星辰辅助V9.4【超强脚本+超强躲避】/免费天卡赠送.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
lolxc/下载银行-提供免费绿色软件下载.url
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
lolxc/下载银行-提供免费绿色软件下载.url
Resource
win10v2004-20240802-en
General
-
Target
lolxc/LOL星辰辅助V9.4【超强脚本+超强躲避】/lolxc.dll
-
Size
369KB
-
MD5
fbc493308cfa830a22ccdb67d86b705e
-
SHA1
e6706182f48800cba8a6339f00b3ccac9fd4ec6d
-
SHA256
b7d03cbb5c0201020c9775e7027969e7f076ff0250702427c172d19e19a10c34
-
SHA512
76a8d5988a94aba8abbabba27fcec5c374c46586f94cdee17b1880307fcc829795449bf284afc0f4e44794124a954dcb96caf846a0eba3cda14427bb72909911
-
SSDEEP
6144:o34tMU0GBeE8HmknK2h01GRny0zSyKO8MRWt8:i4t4/JHmd001GRng1BK
Malware Config
Signatures
-
resource yara_rule behavioral5/memory/2324-0-0x0000000010000000-0x00000000100FC000-memory.dmp upx behavioral5/memory/2324-2-0x0000000010000000-0x00000000100FC000-memory.dmp upx behavioral5/memory/2324-3-0x0000000010000000-0x00000000100FC000-memory.dmp upx behavioral5/memory/2324-1-0x0000000010000000-0x00000000100FC000-memory.dmp upx behavioral5/memory/2324-4-0x0000000010000000-0x00000000100FC000-memory.dmp upx behavioral5/memory/2324-5-0x0000000010000000-0x00000000100FC000-memory.dmp upx behavioral5/memory/2324-6-0x0000000010000000-0x00000000100FC000-memory.dmp upx behavioral5/memory/2324-7-0x0000000010000000-0x00000000100FC000-memory.dmp upx behavioral5/memory/2324-8-0x0000000010000000-0x00000000100FC000-memory.dmp upx behavioral5/memory/2324-9-0x0000000010000000-0x00000000100FC000-memory.dmp upx behavioral5/memory/2324-10-0x0000000010000000-0x00000000100FC000-memory.dmp upx behavioral5/memory/2324-11-0x0000000010000000-0x00000000100FC000-memory.dmp upx behavioral5/memory/2324-12-0x0000000010000000-0x00000000100FC000-memory.dmp upx behavioral5/memory/2324-13-0x0000000010000000-0x00000000100FC000-memory.dmp upx behavioral5/memory/2324-14-0x0000000010000000-0x00000000100FC000-memory.dmp upx behavioral5/memory/2324-15-0x0000000010000000-0x00000000100FC000-memory.dmp upx behavioral5/memory/2324-16-0x0000000010000000-0x00000000100FC000-memory.dmp upx behavioral5/memory/2324-17-0x0000000010000000-0x00000000100FC000-memory.dmp upx behavioral5/memory/2324-18-0x0000000010000000-0x00000000100FC000-memory.dmp upx behavioral5/memory/2324-19-0x0000000010000000-0x00000000100FC000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 25 IoCs
pid Process 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe 2324 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2324 2320 rundll32.exe 29 PID 2320 wrote to memory of 2324 2320 rundll32.exe 29 PID 2320 wrote to memory of 2324 2320 rundll32.exe 29 PID 2320 wrote to memory of 2324 2320 rundll32.exe 29 PID 2320 wrote to memory of 2324 2320 rundll32.exe 29 PID 2320 wrote to memory of 2324 2320 rundll32.exe 29 PID 2320 wrote to memory of 2324 2320 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\lolxc\LOL星辰辅助V9.4【超强脚本+超强躲避】\lolxc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\lolxc\LOL星辰辅助V9.4【超强脚本+超强躲避】\lolxc.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2324
-