Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
32/Activity.dll
windows7-x64
32/Activity.dll
windows10-2004-x64
32/LogViewer.exe
windows7-x64
102/LogViewer.exe
windows10-2004-x64
102/MouseHook.dll
windows7-x64
32/MouseHook.dll
windows10-2004-x64
32/RunOnce.exe
windows7-x64
32/RunOnce.exe
windows10-2004-x64
32/USBFind.dll
windows7-x64
32/USBFind.dll
windows10-2004-x64
32/iSafeProtect.dll
windows7-x64
32/iSafeProtect.dll
windows10-2004-x64
32/msadoex.dll
windows7-x64
12/msadoex.dll
windows10-2004-x64
12/pdata.exe
windows7-x64
12/pdata.exe
windows10-2004-x64
12/winsrv.exe
windows7-x64
102/winsrv.exe
windows10-2004-x64
102/zlib1d.dll
windows7-x64
32/zlib1d.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2025, 03:29 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2/Activity.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2/Activity.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
2/LogViewer.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
2/LogViewer.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral5
Sample
2/MouseHook.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
2/MouseHook.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
2/RunOnce.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
2/RunOnce.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral9
Sample
2/USBFind.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
2/USBFind.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral11
Sample
2/iSafeProtect.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
2/iSafeProtect.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral13
Sample
2/msadoex.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
2/msadoex.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral15
Sample
2/pdata.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
2/pdata.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral17
Sample
2/winsrv.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
2/winsrv.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral19
Sample
2/zlib1d.dll
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
2/zlib1d.dll
Resource
win10v2004-20241007-en
General
-
Target
2/Activity.dll
-
Size
224KB
-
MD5
fb6917b50eeb4fa7984d11a971a3f833
-
SHA1
76f30a2a8224bebb9e192d35029addd7ffd927e5
-
SHA256
3c0ba45c164ed40f1aebcf5eff985512e4ef001fe87e276502bbfdff1955194c
-
SHA512
87e9d9095901db98bdeaa3db38426f68c3583c6db0e590873381a2aa2baef0f1362fa28fa0ee99e2cee5f3b62baa4f41501320951a691df8b868dd1125c84c49
-
SSDEEP
1536:W9CkrTPI8F4tucyFMjhB260Nz0btA9n5OlxTSNg5xxuKTWJS3wcP/kM2j29ekkcg:W8yTP5qucjhB2pNz0JCB5jczrYos
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1340 wrote to memory of 3028 1340 rundll32.exe 83 PID 1340 wrote to memory of 3028 1340 rundll32.exe 83 PID 1340 wrote to memory of 3028 1340 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2\Activity.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2\Activity.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3028
-
Network
-
Remote address:8.8.8.8:53Request131.31.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.35.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.153.16.2.in-addr.arpaIN PTRResponse13.153.16.2.in-addr.arpaIN PTRa2-16-153-13deploystaticakamaitechnologiescom
-
GEThttps://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90Remote address:95.101.143.201:443RequestGET /th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90 HTTP/2.0
host: www.bing.com
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-type: image/png
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QWthbWFp"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
content-length: 1107
date: Mon, 03 Feb 2025 03:30:02 GMT
alt-svc: h3=":443"; ma=93600
x-cdn-traceid: 0.d78f655f.1738553402.106d455
-
Remote address:8.8.8.8:53Request201.143.101.95.in-addr.arpaIN PTRResponse201.143.101.95.in-addr.arpaIN PTRa95-101-143-201deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request56.163.245.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request56.163.245.4.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request56.163.245.4.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request166.190.18.2.in-addr.arpaIN PTRResponse166.190.18.2.in-addr.arpaIN PTRa2-18-190-166deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request241.42.69.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request11.153.16.2.in-addr.arpaIN PTRResponse11.153.16.2.in-addr.arpaIN PTRa2-16-153-11deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request23.236.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request131.72.42.20.in-addr.arpaIN PTRResponse
-
95.101.143.201:443https://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90tls, http21.5kB 7.8kB 18 13
HTTP Request
GET https://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90HTTP Response
200
-
72 B 158 B 1 1
DNS Request
131.31.126.40.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
26.35.223.20.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
13.153.16.2.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
201.143.101.95.in-addr.arpa
-
213 B 157 B 3 1
DNS Request
56.163.245.4.in-addr.arpa
DNS Request
56.163.245.4.in-addr.arpa
DNS Request
56.163.245.4.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
166.190.18.2.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
241.42.69.40.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
11.153.16.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
23.236.111.52.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
131.72.42.20.in-addr.arpa