Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
5d215cf3550...7N.exe
windows7-x64
7d215cf3550...7N.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PROGRAMFI.../m.exe
windows7-x64
8$PROGRAMFI.../m.exe
windows10-2004-x64
8$PROGRAMFI...UL.exe
windows7-x64
6$PROGRAMFI...UL.exe
windows10-2004-x64
6$PROGRAMFI...xb.exe
windows7-x64
5$PROGRAMFI...xb.exe
windows10-2004-x64
5Hash-MD5֤.exe
windows7-x64
3Hash-MD5֤.exe
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/10/2024, 22:24
Behavioral task
behavioral1
Sample
d215cf3550092e9833a3f540caca905b73460f9b0ea0f97637aea5301e9389f7N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d215cf3550092e9833a3f540caca905b73460f9b0ea0f97637aea5301e9389f7N.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PROGRAMFILES/Funshion Online/Funshion/m.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PROGRAMFILES/Funshion Online/Funshion/m.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PROGRAMFILES/Intel/yFMSUL.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PROGRAMFILES/Intel/yFMSUL.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PROGRAMFILES/Windows Media Player/jcxb.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PROGRAMFILES/Windows Media Player/jcxb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Hash-MD5֤.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Hash-MD5֤.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
uninst.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
uninst.exe
Resource
win10v2004-20241007-en
General
-
Target
$PROGRAMFILES/Funshion Online/Funshion/m.exe
-
Size
100KB
-
MD5
ffa9a7df6480ff67b5492f7a118e1b4b
-
SHA1
2fdd98953d7dbff5f027cdff4b34f33c90374101
-
SHA256
9f68c06375e0c5b624e81938ad8df51ea3053b7100c7e96adeee5e5207d2d5c3
-
SHA512
c90cac6640b7f104903003f3d2adfd7a64aea23e6465e951e155b5616b884b536227ba6b4d8be95bf9f788e607a098606c82e9925136e9397f7fe330f171fb60
-
SSDEEP
1536:WyZMSZFvknTePMZd4k4kJJM4Romu/5M7HVtfVt+gTXBUZ0qeUxVzef6i0lixG/HZ:xZMJnTeM4cJJM45DjVhDOZzxVayrrdZp
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Commdlg\ImagePath = "system\\COMMDLG.DRV" regedit.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral5/files/0x000500000001929a-27.dat acprotect -
Deletes itself 1 IoCs
pid Process 2796 MediaCenter.exe -
Executes dropped EXE 1 IoCs
pid Process 2796 MediaCenter.exe -
Loads dropped DLL 5 IoCs
pid Process 2544 m.exe 2544 m.exe 2796 MediaCenter.exe 2796 MediaCenter.exe 2796 MediaCenter.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\System32\userinit.vbs m.exe File created C:\Windows\System32\userinit.bat m.exe File created C:\Windows\System32\IEHelper.dll m.exe -
resource yara_rule behavioral5/files/0x000500000001929a-27.dat upx behavioral5/files/0x0005000000019377-57.dat upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\2.ico m.exe File created C:\Program Files (x86)\WindowsPlayer\Media\MediaCenter.exe m.exe -
Drops file in Windows directory 22 IoCs
description ioc Process File created C:\Windows\¡¡ m.exe File created C:\Windows\KB924270.log m.exe File opened for modification C:\Windows\IEHelper m.exe File created C:\Windows\KB611565.log m.exe File opened for modification C:\Windows\¡¡ m.exe File opened for modification C:\Windows\¡¡¡¡ m.exe File created C:\Windows\Iesy1 m.exe File created C:\Windows\init.bat m.exe File created C:\Windows\IEHelper m.exe File created C:\Windows\2 m.exe File created C:\Windows\r m.exe File opened for modification C:\Windows\1 m.exe File opened for modification C:\Windows\init.bat m.exe File created C:\Windows\3 m.exe File created C:\Windows\system\COMMDLG.DRV m.exe File created C:\Windows\KB611568.log m.exe File opened for modification C:\Windows\Iesy1 m.exe File created C:\Windows\1 m.exe File opened for modification C:\Windows\r m.exe File created C:\Windows\¡¡¡¡ m.exe File opened for modification C:\Windows\2 m.exe File opened for modification C:\Windows\3 m.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe -
Modifies registry class 21 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ovfile\shell\open m.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\omfile m.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\omfile\shell\open\command\ = "C:\\Program Files (x86)\\internet explorer\\iexplore.exe" m.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ov m.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ov\ = "ovfile" m.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ovfile\shell\open\command m.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ocfile\shell\open\command m.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ocfile m.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.om\ = "omfile" m.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\omfile\shell\open m.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ovfile\shell m.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ovfile\shell\open\command\ = "C:\\Program Files (x86)\\internet explorer\\iexplore.exe" m.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.oc\ = "ocfile" m.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\omfile\shell m.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ocfile\shell\open m.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ocfile\shell\open\command\ = "C:\\Program Files (x86)\\internet explorer\\iexplore.exe" m.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\omfile\shell\open\command m.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.om m.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ovfile m.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.oc m.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ocfile\shell m.exe -
Runs regedit.exe 1 IoCs
pid Process 2060 regedit.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2796 MediaCenter.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2060 2544 m.exe 31 PID 2544 wrote to memory of 2060 2544 m.exe 31 PID 2544 wrote to memory of 2060 2544 m.exe 31 PID 2544 wrote to memory of 2060 2544 m.exe 31 PID 2544 wrote to memory of 2060 2544 m.exe 31 PID 2544 wrote to memory of 2060 2544 m.exe 31 PID 2544 wrote to memory of 2060 2544 m.exe 31 PID 2544 wrote to memory of 2796 2544 m.exe 32 PID 2544 wrote to memory of 2796 2544 m.exe 32 PID 2544 wrote to memory of 2796 2544 m.exe 32 PID 2544 wrote to memory of 2796 2544 m.exe 32 PID 2544 wrote to memory of 2796 2544 m.exe 32 PID 2544 wrote to memory of 2796 2544 m.exe 32 PID 2544 wrote to memory of 2796 2544 m.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\Funshion Online\Funshion\m.exe"C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\Funshion Online\Funshion\m.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\regedit.exeregedit.exe -s C:\Windows\r2⤵
- Sets service image path in registry
- System Location Discovery: System Language Discovery
- Runs regedit.exe
PID:2060
-
-
C:\Program Files (x86)\WindowsPlayer\Media\MediaCenter.exe"C:\Program Files (x86)\WindowsPlayer\Media\MediaCenter.exe" C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\Funshion Online\Funshion\m.exe2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
294B
MD5b3da6c958962a5d9ea13e8a67415680b
SHA1bdcb4a598f4782c6130d602cbd3a2d71ec98af35
SHA2568b23d79b96401a92548ca2adf1f3e8fda5371fc3c07937ac295617d8a65600bc
SHA51272818b870c61ed9060640cfad397ab9228f08f5c06c3f9a6b1b6d9b83e1c88788f2c7fd5e4725e091d8e7cf414e81a703d97ddd1decb0d12fd7cccc8e13f1835
-
Filesize
9KB
MD5f08f5e65141be235580b9b6784f9f78a
SHA19786b4e68a6a3d1377e066f0ee7703e71d129597
SHA256e53da24fa53cd24b98848eb45a59e95f7872717d5ec400061c89aece4498b282
SHA512ed99259a77da36e14da3a1163fdb9a677135f52cacd44a4a6268f6af63e5320aa67146d81abf7b41e67921a0961189f3f510a2b97e3196dcbea354de0982e772
-
Filesize
25KB
MD583669aebc401dac229a6644c62b5dfb6
SHA19904bb4e9e64c927f84777c3250fb37d33924e6d
SHA256ae4a1cce633ccd31d4605d46c8af308c99aae25355580662e941a3d3ec275f51
SHA512a6a276d5a517a383c99a56a37cdaa02de08b8f614b08ece1fe15db645a4f2808fe763f002f34435bb4b6398d73154a407b119813a89dc04e8bb43dc80ffb6de1
-
Filesize
25KB
MD5fe7c00acee71a7c95e0296b09eae86cf
SHA172788f2393cb6d870350386ba08155f22019336c
SHA25653d674c1f2997a7d80392301b450d256668591d52a4900c660c84615ad668617
SHA512a477821d1d39e8a3ca42b59e261a66f7ade8d99c370cee58c838413b36ee828bb1d61ed3bdcf5c6b5ebbedce3fe3fbde74a516e038b6625370fa1f4f56c44f8e
-
Filesize
3KB
MD5e6675b96beafa719b6789d1a7cf4a17a
SHA1be012f7f22c006edb44b7288c67308a4010030e6
SHA25660f7afa0df6805e5fed8f31943a3fd1f6cdca9638defee9f99b28cf549f5834c
SHA51208e7f07e0bd49d5779fc927e3f3c34f58845878a2e163a653153bd09beef1a612a6a2d1d042674652df16645452516a7fe392212953d0a3445dddad97950e36a
-
Filesize
5KB
MD5fe4840ece6f2045678545b8a4b9575a6
SHA19ec7bc018241cc4966e5668185d0c86c0777e100
SHA256b54eccc0323d725353df9afecf585dd565ae2be8112f0c6d8ae69c08d23ab3cc
SHA512967a228d71d35de15468d99d4f144675fdeb631c1bfca3c3aafbb8dd405dd8adfbd1cfc220ab2784594a870c8b57b43f73af4337e3d115083cbb95e9d0a6f079
-
Filesize
720B
MD51e4a364d62af7ca2e848641f96dfbd9e
SHA16cdc070edfc1311e745e81f154f1b5fc0036c3cc
SHA2566ba029de625ee359e9a92e5c6275aa64fa033f6bfd0ea82e1400b9fd9df46d3b
SHA512ae4f52dda7728e0f4b76368cde650d5afba955a95b85f7bcf11388b63b721a4d51a4eb1b266fb9d94179331e27e8e486b5407b40b47f168644717a59edabe6a0
-
Filesize
20KB
MD547c714dd58ec8d0beaa1893bc94c30d8
SHA1aa1a06b7b0aea4a8f518bc1e92f53610bf5a3b2c
SHA256bfe09d763cb3d63ead982f1d0986d5105c1a0082dd494c8c4fbd2212ac377662
SHA5125ab074072b24adb17ce71b59521df2b68e5570863dae348c952e8e11ea2780781a73e5699a371b07f7baf704436478565687f72d5c18024e5ae30dd37eff8395