Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
9Static
static
83km2-20120...��.chm
windows7-x64
13km2-20120...��.chm
windows10-2004-x64
13km2-20120...cn.url
windows7-x64
13km2-20120...cn.url
windows10-2004-x64
13km2-20120...er.exe
windows7-x64
13km2-20120...er.exe
windows10-2004-x64
13km2-20120...er.exe
windows7-x64
13km2-20120...er.exe
windows10-2004-x64
13km2-20120...er.exe
windows7-x64
13km2-20120...er.exe
windows10-2004-x64
13km2-20120...te.exe
windows7-x64
13km2-20120...te.exe
windows10-2004-x64
13km2-20120...rv.exe
windows7-x64
83km2-20120...rv.exe
windows10-2004-x64
83km2-20120...al.dll
windows7-x64
13km2-20120...al.dll
windows10-2004-x64
13km2-20120...er.exe
windows7-x64
93km2-20120...er.exe
windows10-2004-x64
93km2-20120...le.dll
windows7-x64
93km2-20120...le.dll
windows10-2004-x64
93km2-20120...te.exe
windows7-x64
13km2-20120...te.exe
windows10-2004-x64
13km2-20120...te.exe
windows7-x64
13km2-20120...te.exe
windows10-2004-x64
13km2-20120...��.exe
windows7-x64
13km2-20120...��.exe
windows10-2004-x64
13km2-20120...ne.exe
windows7-x64
13km2-20120...ne.exe
windows10-2004-x64
13km2-20120...��.bat
windows7-x64
13km2-20120...��.bat
windows10-2004-x64
13km2-20120...��.exe
windows7-x64
13km2-20120...��.exe
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 14:41
Behavioral task
behavioral1
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/3K引擎M2说明书.chm
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/3K引擎M2说明书.chm
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/3km2.com.cn.url
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/3km2.com.cn.url
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/DBServer/DBServer.exe
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/DBServer/DBServer.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/GameCenter.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/GameCenter.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/LogServer/LogDataServer.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/LogServer/LogDataServer.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/LoginGate/LoginGate.exe
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/LoginGate/LoginGate.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/LoginSrv/LoginSrv.exe
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/LoginSrv/LoginSrv.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/Mir200/IPLocal.dll
Resource
win7-20220901-en
Behavioral task
behavioral16
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/Mir200/IPLocal.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/Mir200/M2Server.exe
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/Mir200/M2Server.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/Mir200/SystemModule.dll
Resource
win7-20221111-en
Behavioral task
behavioral20
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/Mir200/SystemModule.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral21
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/RunGate/RunGate.exe
Resource
win7-20221111-en
Behavioral task
behavioral22
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/RunGate/RunGate.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral23
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/SelGate/SelGate.exe
Resource
win7-20220901-en
Behavioral task
behavioral24
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/SelGate/SelGate.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral25
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/副将数据转换.exe
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/副将数据转换.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/合区工具/AllInOne.exe
Resource
win7-20220901-en
Behavioral task
behavioral28
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/合区工具/AllInOne.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral29
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/开始更新程序.bat
Resource
win7-20220901-en
Behavioral task
behavioral30
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/开始更新程序.bat
Resource
win10v2004-20220901-en
Behavioral task
behavioral31
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/数据升级.exe
Resource
win7-20220812-en
Behavioral task
behavioral32
Sample
3km2-20120528[1117]/3K20120528(0404)合击引擎/数据升级.exe
Resource
win10v2004-20220812-en
General
-
Target
3km2-20120528[1117]/3K20120528(0404)合击引擎/Mir200/M2Server.exe
-
Size
3.4MB
-
MD5
c2da6a2920b67b4c888c7209e55e484a
-
SHA1
296d2aec76116c25b3550b52d80d94440d3a783e
-
SHA256
e9be4facf1882e685aebe9703664715523c21995fdf9c19197da9a0a6adf8f4d
-
SHA512
edf04caabe60bef22e05075496eff89c40d6ecce4eb2f717a3881596bc3d0953bea594f125725893c274e84de9b9008a076a52126e2da87d1b210470d3d57144
-
SSDEEP
98304:eQ8PU3vL2A4ZMNbEhy7DpeSrsK+AZH2c4+:h8sh9y2dXfZHR1
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ M2Server.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion M2Server.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion M2Server.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Wine M2Server.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA M2Server.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 M2Server.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3km2-20120528[1117]\3K20120528(0404)合击引擎\Mir200\M2Server.exe"C:\Users\Admin\AppData\Local\Temp\3km2-20120528[1117]\3K20120528(0404)合击引擎\Mir200\M2Server.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
PID:1268