Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
5#10302024.exe
windows7-x64
7#10302024.exe
windows10-2004-x64
7102924_5830760.exe
windows7-x64
7102924_5830760.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3103024_37663.exe
windows7-x64
7103024_37663.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3240827 YON...SS.exe
windows7-x64
3240827 YON...SS.exe
windows10-2004-x64
8AWB #281024..scr
windows7-x64
8AWB #281024..scr
windows10-2004-x64
8EE85716273pdf.vbs
windows7-x64
8EE85716273pdf.vbs
windows10-2004-x64
8Produccion.exe
windows7-x64
10Produccion.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Quotation.exe
windows7-x64
10Quotation.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3報價請�...��.vbs
windows7-x64
8報價請�...��.vbs
windows10-2004-x64
8Analysis
-
max time kernel
93s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2024, 21:27
Static task
static1
Behavioral task
behavioral1
Sample
#10302024.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
#10302024.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
102924_5830760.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
102924_5830760.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
103024_37663.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
103024_37663.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
240827 YONG SHUN - GMDSS.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
240827 YONG SHUN - GMDSS.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
AWB #281024..scr
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
AWB #281024..scr
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
EE85716273pdf.vbs
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
EE85716273pdf.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Produccion.exe
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
Produccion.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Quotation.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Quotation.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
報價請求 - 樣本目錄.vbs
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
報價請求 - 樣本目錄.vbs
Resource
win10v2004-20241007-en
General
-
Target
#10302024.exe
-
Size
1.5MB
-
MD5
432523c2a91f208ce00e9aa553c25883
-
SHA1
00fc307df8d7970dc4ca4c9f786d025d1032aeee
-
SHA256
a131f667cc1c8ab17777294ffc556a8b45dd726452ccc10d716daa39d256d3a6
-
SHA512
7a1e1f31b79bb9eff8a7463b7bb40aeb837584c990bce85b6189c07597c6bc12e17fecd1c09f53b163640b9f5e36cf6968c19499a7bf8a6d9210c9523361b31d
-
SSDEEP
24576:NqDEvCTbMWu7rQYlBQcBiT6rprG8aIkLEdvEkGI66/aVKJvoWXrVTSNa:NTvC/MTQYxsWR7aIkwdvEkS6NlrV6
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\asset.vbs asset.exe -
Executes dropped EXE 1 IoCs
pid Process 1748 asset.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023c81-5.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1748 set thread context of 4240 1748 asset.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language #10302024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asset.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4240 svchost.exe 4240 svchost.exe 4240 svchost.exe 4240 svchost.exe 4240 svchost.exe 4240 svchost.exe 4240 svchost.exe 4240 svchost.exe 4240 svchost.exe 4240 svchost.exe 4240 svchost.exe 4240 svchost.exe 4240 svchost.exe 4240 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1748 asset.exe -
Suspicious use of FindShellTrayWindow 20 IoCs
pid Process 1108 #10302024.exe 1108 #10302024.exe 1108 #10302024.exe 1108 #10302024.exe 1108 #10302024.exe 1108 #10302024.exe 1108 #10302024.exe 1108 #10302024.exe 1108 #10302024.exe 1108 #10302024.exe 1748 asset.exe 1748 asset.exe 1748 asset.exe 1748 asset.exe 1748 asset.exe 1748 asset.exe 1748 asset.exe 1748 asset.exe 1748 asset.exe 1748 asset.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 1108 #10302024.exe 1108 #10302024.exe 1108 #10302024.exe 1108 #10302024.exe 1108 #10302024.exe 1108 #10302024.exe 1108 #10302024.exe 1108 #10302024.exe 1108 #10302024.exe 1108 #10302024.exe 1748 asset.exe 1748 asset.exe 1748 asset.exe 1748 asset.exe 1748 asset.exe 1748 asset.exe 1748 asset.exe 1748 asset.exe 1748 asset.exe 1748 asset.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1108 wrote to memory of 1748 1108 #10302024.exe 84 PID 1108 wrote to memory of 1748 1108 #10302024.exe 84 PID 1108 wrote to memory of 1748 1108 #10302024.exe 84 PID 1748 wrote to memory of 4240 1748 asset.exe 90 PID 1748 wrote to memory of 4240 1748 asset.exe 90 PID 1748 wrote to memory of 4240 1748 asset.exe 90 PID 1748 wrote to memory of 4240 1748 asset.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\#10302024.exe"C:\Users\Admin\AppData\Local\Temp\#10302024.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\phytographic\asset.exe"C:\Users\Admin\AppData\Local\Temp\#10302024.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\#10302024.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4240
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5432523c2a91f208ce00e9aa553c25883
SHA100fc307df8d7970dc4ca4c9f786d025d1032aeee
SHA256a131f667cc1c8ab17777294ffc556a8b45dd726452ccc10d716daa39d256d3a6
SHA5127a1e1f31b79bb9eff8a7463b7bb40aeb837584c990bce85b6189c07597c6bc12e17fecd1c09f53b163640b9f5e36cf6968c19499a7bf8a6d9210c9523361b31d