Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
RDR2CHEAT/...er.exe
windows10-1703-x64
7RDR2CHEAT/...op.dll
windows10-1703-x64
1RDR2CHEAT/...op.dll
windows10-1703-x64
1RDR2CHEAT/...op.dll
windows10-1703-x64
1RDR2CHEAT/...op.dll
windows10-1703-x64
1RDR2CHEAT/...op.dll
windows10-1703-x64
1RDR2CHEAT/...op.dll
windows10-1703-x64
1RDR2CHEAT/...op.dll
windows10-1703-x64
1RDR2CHEAT/...op.dll
windows10-1703-x64
1RDR2CHEAT/...op.dll
windows10-1703-x64
1RDR2CHEAT/...op.dll
windows10-1703-x64
1RDR2CHEAT/...te.dll
windows10-1703-x64
1RDR2CHEAT/...ll.xml
windows10-1703-x64
1RDR2CHEAT/...te.dll
windows10-1703-x64
1RDR2CHEAT/...ll.xml
windows10-1703-x64
1RDR2CHEAT/...te.dll
windows10-1703-x64
1RDR2CHEAT/...ll.xml
windows10-1703-x64
1RDR2CHEAT/...te.dll
windows10-1703-x64
1RDR2CHEAT/...ll.xml
windows10-1703-x64
1RDR2CHEAT/...te.dll
windows10-1703-x64
1RDR2CHEAT/...ll.xml
windows10-1703-x64
1Resubmissions
11/10/2023, 00:51
231011-a7gevsbe37 1011/10/2023, 00:50
231011-a652tshd41 1031/01/2023, 09:06
230131-k21xeshe3z 7Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
31/01/2023, 09:06
Static task
static1
Behavioral task
behavioral1
Sample
RDR2CHEAT/PrimeXLauncher.exe
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
RDR2CHEAT/build/net20/x64/SQLite.Interop.dll
Resource
win10-20220812-en
Behavioral task
behavioral3
Sample
RDR2CHEAT/build/net20/x86/SQLite.Interop.dll
Resource
win10-20220901-en
Behavioral task
behavioral4
Sample
RDR2CHEAT/build/net40/x64/SQLite.Interop.dll
Resource
win10-20220812-en
Behavioral task
behavioral5
Sample
RDR2CHEAT/build/net40/x86/SQLite.Interop.dll
Resource
win10-20220812-en
Behavioral task
behavioral6
Sample
RDR2CHEAT/build/net45/x64/SQLite.Interop.dll
Resource
win10-20220812-en
Behavioral task
behavioral7
Sample
RDR2CHEAT/build/net45/x86/SQLite.Interop.dll
Resource
win10-20220901-en
Behavioral task
behavioral8
Sample
RDR2CHEAT/build/net451/x64/SQLite.Interop.dll
Resource
win10-20220812-en
Behavioral task
behavioral9
Sample
RDR2CHEAT/build/net451/x86/SQLite.Interop.dll
Resource
win10-20220812-en
Behavioral task
behavioral10
Sample
RDR2CHEAT/build/net46/x64/SQLite.Interop.dll
Resource
win10-20220812-en
Behavioral task
behavioral11
Sample
RDR2CHEAT/build/net46/x86/SQLite.Interop.dll
Resource
win10-20220901-en
Behavioral task
behavioral12
Sample
RDR2CHEAT/lib/net20/System.Data.SQLite.dll
Resource
win10-20220812-en
Behavioral task
behavioral13
Sample
RDR2CHEAT/lib/net20/System.Data.SQLite.dll.xml
Resource
win10-20220812-en
Behavioral task
behavioral14
Sample
RDR2CHEAT/lib/net40/System.Data.SQLite.dll
Resource
win10-20220901-en
Behavioral task
behavioral15
Sample
RDR2CHEAT/lib/net40/System.Data.SQLite.dll.xml
Resource
win10-20220812-en
Behavioral task
behavioral16
Sample
RDR2CHEAT/lib/net45/System.Data.SQLite.dll
Resource
win10-20220812-en
Behavioral task
behavioral17
Sample
RDR2CHEAT/lib/net45/System.Data.SQLite.dll.xml
Resource
win10-20220812-en
Behavioral task
behavioral18
Sample
RDR2CHEAT/lib/net451/System.Data.SQLite.dll
Resource
win10-20220901-en
Behavioral task
behavioral19
Sample
RDR2CHEAT/lib/net451/System.Data.SQLite.dll.xml
Resource
win10-20220812-en
Behavioral task
behavioral20
Sample
RDR2CHEAT/lib/net46/System.Data.SQLite.dll
Resource
win10-20220812-en
Behavioral task
behavioral21
Sample
RDR2CHEAT/lib/net46/System.Data.SQLite.dll.xml
Resource
win10-20220812-en
General
-
Target
RDR2CHEAT/PrimeXLauncher.exe
-
Size
159KB
-
MD5
0c2de2a3c96398428b0ce53ee8be212f
-
SHA1
348a9089ecdc242b2d729f642a70794d74c9a06b
-
SHA256
1331d10811b5b02f55f7a6fa0e957543c2c2ea5c9817518f97905b6038dfed93
-
SHA512
b767bb3487ddca3bfd8d998b675d149f06473190755d8b0402469ddfebfc4121384bd65107850036b67f72429bd8fca399b9b3ec54f088a49935f20ca5d3f0a3
-
SSDEEP
3072:OaAzRVKaMvVMLGXVJYkwOQKlTXSRBI1IVZQLv0e0Ut:OaAzRV9MMIF1IVZQLv
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2708 PrimeXLauncher.exe 2708 PrimeXLauncher.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2708 PrimeXLauncher.exe Token: SeDebugPrivilege 4400 firefox.exe Token: SeDebugPrivilege 4400 firefox.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 4400 firefox.exe 4400 firefox.exe 4400 firefox.exe 4400 firefox.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4400 firefox.exe 4400 firefox.exe 4400 firefox.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4400 firefox.exe 4400 firefox.exe 4400 firefox.exe 4400 firefox.exe 4400 firefox.exe 4400 firefox.exe 4400 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3484 wrote to memory of 4400 3484 firefox.exe 71 PID 3484 wrote to memory of 4400 3484 firefox.exe 71 PID 3484 wrote to memory of 4400 3484 firefox.exe 71 PID 3484 wrote to memory of 4400 3484 firefox.exe 71 PID 3484 wrote to memory of 4400 3484 firefox.exe 71 PID 3484 wrote to memory of 4400 3484 firefox.exe 71 PID 3484 wrote to memory of 4400 3484 firefox.exe 71 PID 3484 wrote to memory of 4400 3484 firefox.exe 71 PID 3484 wrote to memory of 4400 3484 firefox.exe 71 PID 4400 wrote to memory of 4812 4400 firefox.exe 72 PID 4400 wrote to memory of 4812 4400 firefox.exe 72 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 5024 4400 firefox.exe 74 PID 4400 wrote to memory of 4520 4400 firefox.exe 75 PID 4400 wrote to memory of 4520 4400 firefox.exe 75 PID 4400 wrote to memory of 4520 4400 firefox.exe 75 PID 4400 wrote to memory of 4520 4400 firefox.exe 75 PID 4400 wrote to memory of 4520 4400 firefox.exe 75 PID 4400 wrote to memory of 4520 4400 firefox.exe 75 PID 4400 wrote to memory of 4520 4400 firefox.exe 75 PID 4400 wrote to memory of 4520 4400 firefox.exe 75 PID 4400 wrote to memory of 4520 4400 firefox.exe 75 PID 4400 wrote to memory of 4520 4400 firefox.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\RDR2CHEAT\PrimeXLauncher.exe"C:\Users\Admin\AppData\Local\Temp\RDR2CHEAT\PrimeXLauncher.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4312
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4400.0.945536853\974990206" -parentBuildID 20200403170909 -prefsHandle 1536 -prefMapHandle 1528 -prefsLen 1 -prefMapSize 220115 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4400 "\\.\pipe\gecko-crash-server-pipe.4400" 1628 gpu3⤵PID:4812
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4400.3.999519027\1662905133" -childID 1 -isForBrowser -prefsHandle 2340 -prefMapHandle 2332 -prefsLen 156 -prefMapSize 220115 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4400 "\\.\pipe\gecko-crash-server-pipe.4400" 2208 tab3⤵PID:5024
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4400.13.1260672105\1442429108" -childID 2 -isForBrowser -prefsHandle 3432 -prefMapHandle 3428 -prefsLen 6938 -prefMapSize 220115 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4400 "\\.\pipe\gecko-crash-server-pipe.4400" 3444 tab3⤵PID:4520
-
-