Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7v/9PbHH.dll
windows7-x64
7v/9PbHH.dll
windows10-2004-x64
7v/Skin.dll
windows7-x64
5v/Skin.dll
windows10-2004-x64
5v/VEzOD.dll
windows7-x64
7v/VEzOD.dll
windows10-2004-x64
7v/War3Shout.exe
windows7-x64
5v/War3Shout.exe
windows10-2004-x64
5v/pe.dll
windows7-x64
5v/pe.dll
windows10-2004-x64
5v/v.exe
windows7-x64
7v/v.exe
windows10-2004-x64
3启动VK.exe
windows7-x64
7启动VK.exe
windows10-2004-x64
7Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 09:33
Behavioral task
behavioral1
Sample
v/9PbHH.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
v/9PbHH.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
v/Skin.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
v/Skin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
v/VEzOD.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
v/VEzOD.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
v/War3Shout.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
v/War3Shout.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
v/pe.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
v/pe.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
v/v.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
v/v.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
启动VK.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
启动VK.exe
Resource
win10v2004-20241007-en
General
-
Target
v/VEzOD.dll
-
Size
904KB
-
MD5
253243efa1f7f981be13536bf0b37ee8
-
SHA1
71456fe201419f4d6003d8ca175ce70a04ae0190
-
SHA256
60b4b829baa82ef80f2f7a5f307480b0d59fb5a1f1d436bb5534143936803308
-
SHA512
a58ae4053d6db9c449d05c58217a2314ef95a6d2eb93e8c0b254b34e18a626f61bfd4400e3d8d99bafe786b693cc7ac06f77fc0800f07f28ea0fced085ec2545
-
SSDEEP
24576:henowC/krhizl52AJdYjwF1OD5spbKzzg:heAhUA/Jpb
Malware Config
Signatures
-
resource yara_rule behavioral5/memory/2076-1-0x0000000010000000-0x00000000100E7000-memory.dmp vmprotect behavioral5/memory/2076-3-0x0000000010000000-0x00000000100E7000-memory.dmp vmprotect -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\vv1234.txt rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2076 1724 rundll32.exe 30 PID 1724 wrote to memory of 2076 1724 rundll32.exe 30 PID 1724 wrote to memory of 2076 1724 rundll32.exe 30 PID 1724 wrote to memory of 2076 1724 rundll32.exe 30 PID 1724 wrote to memory of 2076 1724 rundll32.exe 30 PID 1724 wrote to memory of 2076 1724 rundll32.exe 30 PID 1724 wrote to memory of 2076 1724 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\v\VEzOD.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\v\VEzOD.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2076
-