Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
35ce368d291...fN.exe
windows7-x64
75ce368d291...fN.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$TEMP/4204...pt.exe
windows7-x64
7$TEMP/4204...pt.exe
windows10-2004-x64
7$1/ALOTSettings.exe
windows7-x64
3$1/ALOTSettings.exe
windows10-2004-x64
3$1/alotappbar.dll
windows7-x64
3$1/alotappbar.dll
windows10-2004-x64
3$1/alothelper.dll
windows7-x64
3$1/alothelper.dll
windows10-2004-x64
3$1/alotservice.exe
windows7-x64
3$1/alotservice.exe
windows10-2004-x64
3$1/alotwidgets.exe
windows7-x64
3$1/alotwidgets.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/eula.html
windows7-x64
3$PLUGINSDIR/eula.html
windows10-2004-x64
3$PLUGINSDI...nt.exe
windows7-x64
3$PLUGINSDI...nt.exe
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$TEMP/4204...ff.exe
windows7-x64
3$TEMP/4204...ff.exe
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
107s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 01:47
Static task
static1
Behavioral task
behavioral1
Sample
5ce368d2918d0b47e6c655272e6ce606d45055a47af1d46fdb9eb5f34d1e0d4fN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5ce368d2918d0b47e6c655272e6ce606d45055a47af1d46fdb9eb5f34d1e0d4fN.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$TEMP/4204_adknowledgept.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$TEMP/4204_adknowledgept.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$1/ALOTSettings.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$1/ALOTSettings.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$1/alotappbar.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$1/alotappbar.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$1/alothelper.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$1/alothelper.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$1/alotservice.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$1/alotservice.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$1/alotwidgets.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$1/alotwidgets.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/eula.html
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/eula.html
Resource
win10v2004-20240910-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/installagent.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/installagent.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/installhelper.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/installhelper.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
$TEMP/4204_adknowledgept_ff.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
$TEMP/4204_adknowledgept_ff.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
General
-
Target
$TEMP/4204_adknowledgept.exe
-
Size
1.1MB
-
MD5
365a16d067623e31b20bed5165649473
-
SHA1
3034fa4971efed7e56df54df482b70e7b555537c
-
SHA256
e222a717b3c76ec83f55f88d1113f4abc6be660e809db00889d2aff404798eef
-
SHA512
412137ca836d52ef53b7e1facd982c86f3d407ed3035c96045df99788c46a170dafe5f5b54dc3ed2751137a12451ee55d72f4ec972096c29bdae06bf2789c5f9
-
SSDEEP
24576:pmJRe0AcpdtXLeMBYKwHcX4TuBIgSpOJB9nRpzqppn:pF0AOj6OX4T2IzpOJjXkp
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 3764 4204_adknowledgept.exe 3764 4204_adknowledgept.exe 3764 4204_adknowledgept.exe 3764 4204_adknowledgept.exe 3764 4204_adknowledgept.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4204_adknowledgept.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3764 4204_adknowledgept.exe 3764 4204_adknowledgept.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD56e663f1a0de94bc05d64d020da5d6f36
SHA1c5abb0033776d6ab1f07e5b3568f7d64f90e5b04
SHA256458b70e1745dc6e768d2338ccf3e6e86436488954ca3763472d8ffec4e7177e4
SHA5122a037c39f3a08d4a80494227990f36c4fef2f73c4a6ad74dcc334317a1372234c25d08d8b80d79e126881a49fa4b3f2fffe3604c959d9ceceb47acc7192cc6a5
-
Filesize
11KB
MD5b9f430f71c7144d8ff4ab94be2785aa6
SHA1c5c1e153caff7ad1d221a9acc8bbb831f05ccb05
SHA256b496e81a74ce871236abcd096fb9a6b210b456bebaa7464fa844b3241e51a655
SHA512c7ce431b6a1493fd7d1fe1b1c823ad22b582c43c8eb2fb6a471c648dd9df9953277c89932c66afd598d43ea36f4a8602e84cd175115266943071cbc8ce204099
-
Filesize
14KB
MD5da5f15770b833d2e7876db980d472b17
SHA163cf6cd7fa903646c0e86b1713a362f25b20d478
SHA256248bde8035036d6f0c3e5afc5eb247f64801111487916750bdb8e77fe287344f
SHA512d699d74ee4cf9f0a1d2e61a1d504a3604018c3c8406b513ba0e3b1d3d0e9c0095e74d0be7966c085d27cd0c118054baaf20fba591519e55c73608dae10c3d2b4
-
Filesize
756B
MD5c4f7816c112654172fd96aaf25f27e5e
SHA1511a4e6eeb24c9981cd281074cb6fa3c40e96920
SHA2561d59752e6bf1a7e7ab458407e85279d3c041c3aef114199969d2bd749fbd08e8
SHA512727199d6fa7108541f5005c7d708d21d3d4abee6eee2cc2162dbb272d7da518557746e72a43510ddc694e85705af1579c77888c418d649f5928e99e46c0424ca
-
Filesize
704B
MD5d7be577efc9ac7d108d7ec8af3180bf7
SHA175716f2450f47e8dd8973dc58336d8c9b25fd3c4
SHA256bda528f57e5d2f86762c5e3d74befa0f42e5408a704833d486cb0b86a8b845f1
SHA5124d07e28f0371fef9c4790d3efeb428b35e3f73377a3fb359127d1b360d4411f2b870a93dcfa50376435297f9ee2f802110fe5cddbe012c560521fd9f22cc4e6a
-
Filesize
254KB
MD54cf4f52c1bec27e7b0f98acb291ab8e9
SHA173b9e7e43bd79212af54c9ade8e8a813c40e6bf9
SHA2561df98f32dcea672ee2287c6b5cf5810ede6a90b1e3c9348ee36198a062711d9b
SHA512daee3a6afca82a6029e9e540e6ded992b0a1ca2903c84d1991768d447abce9c74adcb4df2f76c5d586ccc9d489a359352d362717164784dc8ba9b6b2e4e14f9c