Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 20:49
Behavioral task
behavioral1
Sample
RPA截流大师红薯一键克隆/HPSocket4C_.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
RPA截流大师红薯一键克隆/HPSocket4C_.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
RPA截流大师红薯一键克隆/RPA截流大师红薯一键克隆.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
RPA截流大师红薯一键克隆/RPA截流大师红薯一键克隆.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
RPA截流大师红薯一键克隆/Temp.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
RPA截流大师红薯一键克隆/Temp.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
RPA截流大师红薯一键克隆/libwebp.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
RPA截流大师红薯一键克隆/libwebp.dll
Resource
win10v2004-20240802-en
General
-
Target
RPA截流大师红薯一键克隆/HPSocket4C_.dll
-
Size
2.8MB
-
MD5
1cf6b966365f29d060154fa5eb5c7f72
-
SHA1
bb110d37a96878c8c024a450d0b09cc28ef03cf0
-
SHA256
0e11b955048104466ed8d86db346628c1b30118ae116fa0428b0c34f486d8cf3
-
SHA512
6bc266813f4518f1b5e958c047972072d6d43996add9587b3c3b7ac64e2406784a2240cc9b815f29208b9b3ef77e0b647a1201ef39aab10eb3bec297294d2dad
-
SSDEEP
49152:Xq1RHWr0AZYw7BC/5Xn1O/C/0QqO8CVMGZ/FXGp8YYIwSX:Xq+ew7wXnc/YXVMGzpYY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4492 wrote to memory of 4884 4492 rundll32.exe 83 PID 4492 wrote to memory of 4884 4492 rundll32.exe 83 PID 4492 wrote to memory of 4884 4492 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\RPA截流大师红薯一键克隆\HPSocket4C_.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\RPA截流大师红薯一键克隆\HPSocket4C_.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4884
-