Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3Clear_glas...p1.exe
windows7-x64
5Clear_glas...p1.exe
windows10-2004-x64
5Clear_glas...le.dll
windows7-x64
1Clear_glas...le.dll
windows10-2004-x64
1Clear_glas...le.dll
windows7-x64
3Clear_glas...le.dll
windows10-2004-x64
1Clear_glas...pp.exe
windows7-x64
10Clear_glas...pp.exe
windows10-2004-x64
10Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/11/2024, 22:06
Static task
static1
Behavioral task
behavioral1
Sample
Clear_glass_red_metalic_windows7/Choose Theme/Theme Setup1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Clear_glass_red_metalic_windows7/Choose Theme/Theme Setup1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Clear_glass_red_metalic_windows7/Common Tasks/Bottom Common Tasks/Shellstyle.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Clear_glass_red_metalic_windows7/Common Tasks/Bottom Common Tasks/Shellstyle.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Clear_glass_red_metalic_windows7/Common Tasks/Left Dark Blue Common Tasks/Shellstyle.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Clear_glass_red_metalic_windows7/Common Tasks/Left Dark Blue Common Tasks/Shellstyle.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Clear_glass_red_metalic_windows7/Setup App.exe
Resource
win7-20241010-en
General
-
Target
Clear_glass_red_metalic_windows7/Common Tasks/Left Dark Blue Common Tasks/Shellstyle.dll
-
Size
1.5MB
-
MD5
610c915cdd28f73dbd5e78ab2578a8d1
-
SHA1
0912c32bd5bd756d40a44427d7c089995c61c7ed
-
SHA256
a7b07ef1a03123dae13d8008fa205055def4e37c0150ba1edbd7ceae7bb619da
-
SHA512
f087f68c84cbabff0a5ba2f35b19e871c31227e5e71ef8e9421a7708af66fe941bfaa123859dab24cd9d372d1b63dc79d8b723cad9dbaa57c0df1c89771f34a6
-
SSDEEP
24576:uNk7//0woYrzE4OIHQSh3ulgDcQ85etgmqc:gAX0BYrzROIH/3ulgQsZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1452 wrote to memory of 2384 1452 rundll32.exe 30 PID 1452 wrote to memory of 2384 1452 rundll32.exe 30 PID 1452 wrote to memory of 2384 1452 rundll32.exe 30 PID 1452 wrote to memory of 2384 1452 rundll32.exe 30 PID 1452 wrote to memory of 2384 1452 rundll32.exe 30 PID 1452 wrote to memory of 2384 1452 rundll32.exe 30 PID 1452 wrote to memory of 2384 1452 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Clear_glass_red_metalic_windows7\Common Tasks\Left Dark Blue Common Tasks\Shellstyle.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Clear_glass_red_metalic_windows7\Common Tasks\Left Dark Blue Common Tasks\Shellstyle.dll",#12⤵
- System Location Discovery: System Language Discovery
PID:2384
-