Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7v/9PbHH.dll
windows7-x64
7v/9PbHH.dll
windows10-2004-x64
7v/Skin.dll
windows7-x64
5v/Skin.dll
windows10-2004-x64
5v/VEzOD.dll
windows7-x64
7v/VEzOD.dll
windows10-2004-x64
7v/War3Shout.exe
windows7-x64
5v/War3Shout.exe
windows10-2004-x64
5v/pe.dll
windows7-x64
5v/pe.dll
windows10-2004-x64
5v/v.exe
windows7-x64
7v/v.exe
windows10-2004-x64
3启动VK.exe
windows7-x64
7启动VK.exe
windows10-2004-x64
7Analysis
-
max time kernel
140s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 09:33
Behavioral task
behavioral1
Sample
v/9PbHH.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
v/9PbHH.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
v/Skin.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
v/Skin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
v/VEzOD.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
v/VEzOD.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
v/War3Shout.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
v/War3Shout.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
v/pe.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
v/pe.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
v/v.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
v/v.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
启动VK.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
启动VK.exe
Resource
win10v2004-20241007-en
General
-
Target
v/War3Shout.exe
-
Size
34KB
-
MD5
5379ba27f462d4d0805461a9c5f7d638
-
SHA1
2ef57fe4bf6b021392d223b17c596b2cfaf3e1dd
-
SHA256
d188663c4cb249c3af45c6cbd31cc01f0a2be206b95c8500e2a96db26134e781
-
SHA512
09884f62784b15c52252dc4789feb6e0d72161e397433834ece06817ba563d17a3aed003ae53f87964075dff3a13d9b3f55fdd45bfdbf7b354e82bc6a405eb2e
-
SSDEEP
768:8/5yKouxljKvAaowrjZKaQ/qYnd6Ck9xg+nBZH2MlwWe:65VouxljKvZnZHNdWMOr
Malware Config
Signatures
-
resource yara_rule behavioral8/memory/3332-0-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral8/memory/3332-36-0x0000000000400000-0x000000000041B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language War3Shout.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3332 War3Shout.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3332 War3Shout.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3332 War3Shout.exe 3332 War3Shout.exe 3332 War3Shout.exe 3332 War3Shout.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
787B
MD54f66d5bc5e19680768840c83022d0c7f
SHA1abd22084b05f5ea0748b5141fcc4e5346b333cf8
SHA25687e7458b22fd954df09ae9e42d536c4d798d7e057253aebbf45bdd4052e8563f
SHA5127decdc31f271106dded1658c3b5e0194f9a9054d60e9414254fa8a52a0ec215be4821e3c78713f0f40b1f5156842d630e433e5bbc2897e1736d500f806511786