Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3OFW1_SDK/D...m1.vbs
windows7-x64
1OFW1_SDK/D...m1.vbs
windows10-2004-x64
1OFW1_SDK/D...32.dll
windows7-x64
3OFW1_SDK/D...32.dll
windows10-2004-x64
3OFW1_SDK/D...CK.dll
windows7-x64
3OFW1_SDK/D...CK.dll
windows10-2004-x64
3OFW1_SDK/D...VB.exe
windows7-x64
3OFW1_SDK/D...VB.exe
windows10-2004-x64
3OFW1_SDK/D...CX.dll
windows7-x64
3OFW1_SDK/D...CX.dll
windows10-2004-x64
3OFW1_SDK/D...CX.dll
windows7-x64
3OFW1_SDK/D...CX.dll
windows10-2004-x64
3OFW1_SDK/D...pk.dll
windows7-x64
7OFW1_SDK/D...pk.dll
windows10-2004-x64
7OFW1_SDK/D...��.doc
windows7-x64
4OFW1_SDK/D...��.doc
windows10-2004-x64
1OFW1_SDK/D...��.doc
windows7-x64
4OFW1_SDK/D...��.doc
windows10-2004-x64
1OFW1_SDK/D...m1.vbs
windows7-x64
1OFW1_SDK/D...m1.vbs
windows10-2004-x64
1OFW1_SDK/D...32.dll
windows7-x64
3OFW1_SDK/D...32.dll
windows10-2004-x64
3OFW1_SDK/D...CK.dll
windows7-x64
3OFW1_SDK/D...CK.dll
windows10-2004-x64
3OFW1_SDK/D...in.doc
windows7-x64
4OFW1_SDK/D...in.doc
windows10-2004-x64
1OFW1_SDK/D...W1.doc
windows7-x64
4OFW1_SDK/D...W1.doc
windows10-2004-x64
1OFW1_SDK/D...VB.exe
windows7-x64
3OFW1_SDK/D...VB.exe
windows10-2004-x64
3OFW1_SDK/D...CX.dll
windows7-x64
3OFW1_SDK/D...CX.dll
windows10-2004-x64
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 11:38
Static task
static1
Behavioral task
behavioral1
Sample
OFW1_SDK/Demo_VB_CN/Form1.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
OFW1_SDK/Demo_VB_CN/Form1.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
OFW1_SDK/Demo_VB_CN/MSCOMM32.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
OFW1_SDK/Demo_VB_CN/MSCOMM32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
OFW1_SDK/Demo_VB_CN/MSWINSCK.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
OFW1_SDK/Demo_VB_CN/MSWINSCK.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
OFW1_SDK/Demo_VB_CN/OFW1_Demo_VB.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
OFW1_SDK/Demo_VB_CN/OFW1_Demo_VB.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
OFW1_SDK/Demo_VB_CN/OFW1_OCX.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
OFW1_SDK/Demo_VB_CN/OFW1_OCX.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
OFW1_SDK/Demo_VB_CN/OFW1_OCX.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
OFW1_SDK/Demo_VB_CN/OFW1_OCX.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
OFW1_SDK/Demo_VB_CN/lpk.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
OFW1_SDK/Demo_VB_CN/lpk.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
OFW1_SDK/Demo_VB_CN/消费机操作说明书.doc
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
OFW1_SDK/Demo_VB_CN/消费机操作说明书.doc
Resource
win10v2004-20240910-en
Behavioral task
behavioral17
Sample
OFW1_SDK/Demo_VB_CN/说明.doc
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
OFW1_SDK/Demo_VB_CN/说明.doc
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
OFW1_SDK/Demo_VB_TW/Form1.vbs
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
OFW1_SDK/Demo_VB_TW/Form1.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
OFW1_SDK/Demo_VB_TW/MSCOMM32.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
OFW1_SDK/Demo_VB_TW/MSCOMM32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
OFW1_SDK/Demo_VB_TW/MSWINSCK.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
OFW1_SDK/Demo_VB_TW/MSWINSCK.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
OFW1_SDK/Demo_VB_TW/Mach_Explain.doc
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
OFW1_SDK/Demo_VB_TW/Mach_Explain.doc
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
OFW1_SDK/Demo_VB_TW/OFW1.doc
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
OFW1_SDK/Demo_VB_TW/OFW1.doc
Resource
win10v2004-20240910-en
Behavioral task
behavioral29
Sample
OFW1_SDK/Demo_VB_TW/OFW1_Demo_VB.exe
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
OFW1_SDK/Demo_VB_TW/OFW1_Demo_VB.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
OFW1_SDK/Demo_VB_TW/OFW1_OCX.dll
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
OFW1_SDK/Demo_VB_TW/OFW1_OCX.dll
Resource
win10v2004-20240802-en
General
-
Target
OFW1_SDK/Demo_VB_CN/lpk.dll
-
Size
219KB
-
MD5
f3998164a6f4278d01b3844cfd27244e
-
SHA1
29bc5a76f2bd7584369c495a1158fc7845d9ef69
-
SHA256
04d7ebc2f995235ec110323c79ce3385b04e345efc53d02a832ec4505d76fef8
-
SHA512
ecaf74d9b0c7c6f987565e2418feaee910eecddb5535d30b2000ad4fbb7abda5035f094a746d386f915cb22c51a0e4715bb6d689ba82d16c188f545d58099f83
-
SSDEEP
6144:oZBEUByHS5FgjVjiNacNU0jc+343MTTSUX:oZBEW5sdKNpc+34GT
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral13/files/0x0005000000019450-13.dat acprotect -
Executes dropped EXE 2 IoCs
pid Process 2572 hrlBE9E.tmp 2688 gkmiuy.exe -
Loads dropped DLL 4 IoCs
pid Process 2392 rundll32.exe 2392 rundll32.exe 2572 hrlBE9E.tmp 2688 gkmiuy.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\gkmiuy.exe hrlBE9E.tmp File opened for modification C:\Windows\SysWOW64\gkmiuy.exe hrlBE9E.tmp -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2688 set thread context of 2444 2688 gkmiuy.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gkmiuy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hrlBE9E.tmp -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2572 hrlBE9E.tmp 2688 gkmiuy.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2392 2348 rundll32.exe 30 PID 2348 wrote to memory of 2392 2348 rundll32.exe 30 PID 2348 wrote to memory of 2392 2348 rundll32.exe 30 PID 2348 wrote to memory of 2392 2348 rundll32.exe 30 PID 2348 wrote to memory of 2392 2348 rundll32.exe 30 PID 2348 wrote to memory of 2392 2348 rundll32.exe 30 PID 2348 wrote to memory of 2392 2348 rundll32.exe 30 PID 2392 wrote to memory of 2572 2392 rundll32.exe 31 PID 2392 wrote to memory of 2572 2392 rundll32.exe 31 PID 2392 wrote to memory of 2572 2392 rundll32.exe 31 PID 2392 wrote to memory of 2572 2392 rundll32.exe 31 PID 2688 wrote to memory of 2444 2688 gkmiuy.exe 33 PID 2688 wrote to memory of 2444 2688 gkmiuy.exe 33 PID 2688 wrote to memory of 2444 2688 gkmiuy.exe 33 PID 2688 wrote to memory of 2444 2688 gkmiuy.exe 33 PID 2688 wrote to memory of 2444 2688 gkmiuy.exe 33 PID 2688 wrote to memory of 2444 2688 gkmiuy.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\OFW1_SDK\Demo_VB_CN\lpk.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\OFW1_SDK\Demo_VB_CN\lpk.dll,#12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\hrlBE9E.tmpC:\Users\Admin\AppData\Local\Temp\hrlBE9E.tmp3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2572
-
-
-
C:\Windows\SysWOW64\gkmiuy.exeC:\Windows\SysWOW64\gkmiuy.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD575c52c0f1e588f26d0760356a7e967a6
SHA147eb0cde06bd86e1323b478d150b734bd69395fe
SHA256b1d7420ce6aed9e2b65941d7cc405ea5c593b6b2dd4d9dd0d09de55af2b163a3
SHA5121507da44a313ef66288ecc7fd1c39b9cb0f871d6f0dac812992cc5f8bdec928ebe506169cd487a882c1ef0a57a35fa362a7537c2d585c3eb399ae8cf83c19f66
-
Filesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9