Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 20:49
Behavioral task
behavioral1
Sample
RPA截流大师红薯一键克隆/HPSocket4C_.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
RPA截流大师红薯一键克隆/HPSocket4C_.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
RPA截流大师红薯一键克隆/RPA截流大师红薯一键克隆.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
RPA截流大师红薯一键克隆/RPA截流大师红薯一键克隆.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
RPA截流大师红薯一键克隆/Temp.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
RPA截流大师红薯一键克隆/Temp.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
RPA截流大师红薯一键克隆/libwebp.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
RPA截流大师红薯一键克隆/libwebp.dll
Resource
win10v2004-20240802-en
General
-
Target
RPA截流大师红薯一键克隆/Temp.exe
-
Size
3.7MB
-
MD5
73b7be415c37e381a8c61f1e55a884a4
-
SHA1
1cd8eb77e9dd04835342a7253181892638359956
-
SHA256
4a5da7639f04d6e5b13856877140e4bce5346cea037187c45cab045844114872
-
SHA512
51c33a753def581a8f99e063b3952f8f6fcc1c5b736b77455c1f711da8deca19e976a94424982013941d138367b8327df8e6c6752f4a2bb574b706408905d234
-
SSDEEP
98304:ah88IjKp7BPOxad+N5c76EOUG00bfCU2gpNk/bEgNULb06q:ah88IjSVGxoYHEJGxjCQk/bF+Lrq
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Temp.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main Temp.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Temp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Temp.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe 2556 Temp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RPA截流大师红薯一键克隆\Temp.exe"C:\Users\Admin\AppData\Local\Temp\RPA截流大师红薯一键克隆\Temp.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556