Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
5#10302024.exe
windows7-x64
7#10302024.exe
windows10-2004-x64
7102924_5830760.exe
windows7-x64
7102924_5830760.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3103024_37663.exe
windows7-x64
7103024_37663.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3240827 YON...SS.exe
windows7-x64
3240827 YON...SS.exe
windows10-2004-x64
8AWB #281024..scr
windows7-x64
8AWB #281024..scr
windows10-2004-x64
8EE85716273pdf.vbs
windows7-x64
8EE85716273pdf.vbs
windows10-2004-x64
8Produccion.exe
windows7-x64
10Produccion.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Quotation.exe
windows7-x64
10Quotation.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3報價請�...��.vbs
windows7-x64
8報價請�...��.vbs
windows10-2004-x64
8Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/12/2024, 21:27
Static task
static1
Behavioral task
behavioral1
Sample
#10302024.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
#10302024.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
102924_5830760.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
102924_5830760.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
103024_37663.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
103024_37663.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
240827 YONG SHUN - GMDSS.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
240827 YONG SHUN - GMDSS.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
AWB #281024..scr
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
AWB #281024..scr
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
EE85716273pdf.vbs
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
EE85716273pdf.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Produccion.exe
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
Produccion.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Quotation.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Quotation.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
報價請求 - 樣本目錄.vbs
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
報價請求 - 樣本目錄.vbs
Resource
win10v2004-20241007-en
General
-
Target
#10302024.exe
-
Size
1.5MB
-
MD5
432523c2a91f208ce00e9aa553c25883
-
SHA1
00fc307df8d7970dc4ca4c9f786d025d1032aeee
-
SHA256
a131f667cc1c8ab17777294ffc556a8b45dd726452ccc10d716daa39d256d3a6
-
SHA512
7a1e1f31b79bb9eff8a7463b7bb40aeb837584c990bce85b6189c07597c6bc12e17fecd1c09f53b163640b9f5e36cf6968c19499a7bf8a6d9210c9523361b31d
-
SSDEEP
24576:NqDEvCTbMWu7rQYlBQcBiT6rprG8aIkLEdvEkGI66/aVKJvoWXrVTSNa:NTvC/MTQYxsWR7aIkwdvEkS6NlrV6
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\asset.vbs asset.exe -
Executes dropped EXE 1 IoCs
pid Process 2320 asset.exe -
Loads dropped DLL 1 IoCs
pid Process 2016 #10302024.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0009000000016d13-4.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2320 set thread context of 2744 2320 asset.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language #10302024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asset.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2320 asset.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe -
Suspicious use of SendNotifyMessage 37 IoCs
pid Process 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2016 #10302024.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe 2320 asset.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2320 2016 #10302024.exe 31 PID 2016 wrote to memory of 2320 2016 #10302024.exe 31 PID 2016 wrote to memory of 2320 2016 #10302024.exe 31 PID 2016 wrote to memory of 2320 2016 #10302024.exe 31 PID 2320 wrote to memory of 2744 2320 asset.exe 32 PID 2320 wrote to memory of 2744 2320 asset.exe 32 PID 2320 wrote to memory of 2744 2320 asset.exe 32 PID 2320 wrote to memory of 2744 2320 asset.exe 32 PID 2320 wrote to memory of 2744 2320 asset.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\#10302024.exe"C:\Users\Admin\AppData\Local\Temp\#10302024.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\phytographic\asset.exe"C:\Users\Admin\AppData\Local\Temp\#10302024.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\#10302024.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD5db231c9da35e0e3ecfd240a65fdf72ed
SHA1ceefa140880f3ddae612c94f35301fe66a8800a1
SHA256c262ff3b36f521fae4dd2f7845b155c629aced3fb1ae9a548d562439c478ede2
SHA512732a3016f3e04667bf52968a1bfe8d99673110698bc29701c5cf63035000e1b4d7106540ff597af82b8ecead82d0ea7bde3e2ed5438621d4ad31f07042aa455c
-
Filesize
1.5MB
MD5432523c2a91f208ce00e9aa553c25883
SHA100fc307df8d7970dc4ca4c9f786d025d1032aeee
SHA256a131f667cc1c8ab17777294ffc556a8b45dd726452ccc10d716daa39d256d3a6
SHA5127a1e1f31b79bb9eff8a7463b7bb40aeb837584c990bce85b6189c07597c6bc12e17fecd1c09f53b163640b9f5e36cf6968c19499a7bf8a6d9210c9523361b31d