Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3LICENSE.html
windows7-x64
3LICENSE.html
windows10-2004-x64
3Unlock_Tool_2.3.exe
windows7-x64
10Unlock_Tool_2.3.exe
windows10-2004-x64
10lesseeVari...es.dll
windows7-x64
1lesseeVari...es.dll
windows10-2004-x64
1locales/re...ar.dll
windows7-x64
1locales/re...ar.dll
windows10-2004-x64
1locales/re...ge.dll
windows7-x64
1locales/re...ge.dll
windows10-2004-x64
1locales/re....1.dll
windows7-x64
1locales/re....1.dll
windows10-2004-x64
1locales/x86/ACE.dll
windows7-x64
3locales/x86/ACE.dll
windows10-2004-x64
3locales/x86/AGM.dll
windows7-x64
3locales/x86/AGM.dll
windows10-2004-x64
3locales/x86/AIDE.dll
windows7-x64
3locales/x86/AIDE.dll
windows10-2004-x64
3locales/x8...OL.dll
windows7-x64
3locales/x8...OL.dll
windows10-2004-x64
3locales/x8...32.dll
windows7-x64
3locales/x8...32.dll
windows10-2004-x64
3locales/x8...MP.dll
windows7-x64
3locales/x8...MP.dll
windows10-2004-x64
3locales/x86/BIB.dll
windows7-x64
3locales/x86/BIB.dll
windows10-2004-x64
3locales/x8...ls.dll
windows7-x64
3locales/x8...ls.dll
windows10-2004-x64
3locales/x8...pe.dll
windows7-x64
3locales/x8...pe.dll
windows10-2004-x64
3locales/x8...ib.dll
windows7-x64
3locales/x8...ib.dll
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/10/2024, 23:13
Static task
static1
Behavioral task
behavioral1
Sample
LICENSE.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
LICENSE.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Unlock_Tool_2.3.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Unlock_Tool_2.3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
lesseeVariant/modules.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
lesseeVariant/modules.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
locales/resources/app.asar.unpacked/keytar.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
locales/resources/app.asar.unpacked/keytar.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
locales/resources/app.asar.unpacked/native/tvdbridge.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
locales/resources/app.asar.unpacked/native/tvdbridge.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
locales/resources/mkl_sequential.1.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
locales/resources/mkl_sequential.1.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
locales/x86/ACE.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
locales/x86/ACE.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
locales/x86/AGM.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
locales/x86/AGM.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
locales/x86/AIDE.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
locales/x86/AIDE.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
locales/x86/Acrobat/Acrobat32OL.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
locales/x86/Acrobat/Acrobat32OL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
locales/x86/Acrobat/Onix32.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
locales/x86/Acrobat/Onix32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
locales/x86/AdobeXMP.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
locales/x86/AdobeXMP.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
locales/x86/BIB.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
locales/x86/BIB.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
locales/x86/BIBUtils.dll
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
locales/x86/BIBUtils.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
locales/x86/CoolType.dll
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
locales/x86/CoolType.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
locales/x86/JP2KLib.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
locales/x86/JP2KLib.dll
Resource
win10v2004-20241007-en
General
-
Target
locales/x86/AdobeXMP.dll
-
Size
887KB
-
MD5
7c3033588c1a187918cf3fd246069a3f
-
SHA1
2b637a9d37de604ae8e98fcbc73746ccc0402b31
-
SHA256
e958f4ed8272a96e599ff9f0a79331e7b5109104a9d20d3f760c7eb162daf7e0
-
SHA512
80d513d25477081c84af87e8127a02bb332204ad7399ac653a27ca726e446fd25518d36189bf90b10cbf34119d35501e006a2e06dbca5a96dc2348aff6b6fe91
-
SSDEEP
24576:7CaZsdfNjJaN0OdQfLCKVkDavzVi5p5bafAAy4:7ZspNQVQdkahi5zaf5R
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2356 2100 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2100 2128 rundll32.exe 30 PID 2128 wrote to memory of 2100 2128 rundll32.exe 30 PID 2128 wrote to memory of 2100 2128 rundll32.exe 30 PID 2128 wrote to memory of 2100 2128 rundll32.exe 30 PID 2128 wrote to memory of 2100 2128 rundll32.exe 30 PID 2128 wrote to memory of 2100 2128 rundll32.exe 30 PID 2128 wrote to memory of 2100 2128 rundll32.exe 30 PID 2100 wrote to memory of 2356 2100 rundll32.exe 31 PID 2100 wrote to memory of 2356 2100 rundll32.exe 31 PID 2100 wrote to memory of 2356 2100 rundll32.exe 31 PID 2100 wrote to memory of 2356 2100 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\locales\x86\AdobeXMP.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\locales\x86\AdobeXMP.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 2203⤵
- Program crash
PID:2356
-
-