Overview
overview
9Static
static
7TGX V4 - v...ll.dll
windows7-x64
1TGX V4 - v...ll.dll
windows10-2004-x64
1TGX V4 - v...PC.dll
windows7-x64
3TGX V4 - v...PC.dll
windows10-2004-x64
3TGX V4 - v...on.dll
windows7-x64
9TGX V4 - v...on.dll
windows10-2004-x64
9TGX V4 - v...on.dll
windows7-x64
1TGX V4 - v...on.dll
windows10-2004-x64
3TGX V4 - v...it.dll
windows7-x64
1TGX V4 - v...it.dll
windows10-2004-x64
1TGX V4 - v...on.dll
windows7-x64
1TGX V4 - v...on.dll
windows10-2004-x64
1TGX V4 - v...3.0.js
windows7-x64
1TGX V4 - v...3.0.js
windows10-2004-x64
1TGX V4 - v...bot.js
windows7-x64
1TGX V4 - v...bot.js
windows10-2004-x64
1TGX V4 - v...bot.js
windows7-x64
1TGX V4 - v...bot.js
windows10-2004-x64
1TGX V4 - v... v2.js
windows7-x64
1TGX V4 - v... v2.js
windows10-2004-x64
1TGX V4 - v...rer.js
windows7-x64
1TGX V4 - v...rer.js
windows10-2004-x64
1TGX V4 - v...y 2.js
windows7-x64
1TGX V4 - v...y 2.js
windows10-2004-x64
1TGX V4 - v... V3.js
windows7-x64
1TGX V4 - v... V3.js
windows10-2004-x64
1TGX V4 - v...on.dll
windows7-x64
1TGX V4 - v...on.dll
windows10-2004-x64
1TGX V4 - v...GX.exe
windows7-x64
6TGX V4 - v...GX.exe
windows10-2004-x64
8TGX V4 - v...us.dll
windows7-x64
1TGX V4 - v...us.dll
windows10-2004-x64
3Analysis
-
max time kernel
28s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/02/2023, 09:59
Behavioral task
behavioral1
Sample
TGX V4 - v1.7.6/Cake.Powershell.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
TGX V4 - v1.7.6/Cake.Powershell.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
TGX V4 - v1.7.6/DiscordRPC.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
TGX V4 - v1.7.6/DiscordRPC.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
TGX V4 - v1.7.6/Electron.dll
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
TGX V4 - v1.7.6/Electron.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
TGX V4 - v1.7.6/Evon.dll
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
TGX V4 - v1.7.6/Evon.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
TGX V4 - v1.7.6/ICSharpCode.AvalonEdit.dll
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
TGX V4 - v1.7.6/ICSharpCode.AvalonEdit.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
TGX V4 - v1.7.6/Newtonsoft.Json.dll
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
TGX V4 - v1.7.6/Newtonsoft.Json.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
TGX V4 - v1.7.6/Scripts/Aimbot 3.0.js
Resource
win7-20220901-en
Behavioral task
behavioral14
Sample
TGX V4 - v1.7.6/Scripts/Aimbot 3.0.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
TGX V4 - v1.7.6/Scripts/Aimbot.js
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
TGX V4 - v1.7.6/Scripts/Aimbot.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
TGX V4 - v1.7.6/Scripts/CC Aimbot.js
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
TGX V4 - v1.7.6/Scripts/CC Aimbot.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral19
Sample
TGX V4 - v1.7.6/Scripts/Dex Explorer v2.js
Resource
win7-20221111-en
Behavioral task
behavioral20
Sample
TGX V4 - v1.7.6/Scripts/Dex Explorer v2.js
Resource
win10v2004-20220901-en
Behavioral task
behavioral21
Sample
TGX V4 - v1.7.6/Scripts/Dex Explorer.js
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
TGX V4 - v1.7.6/Scripts/Dex Explorer.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral23
Sample
TGX V4 - v1.7.6/Scripts/Mad City 2.js
Resource
win7-20221111-en
Behavioral task
behavioral24
Sample
TGX V4 - v1.7.6/Scripts/Mad City 2.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral25
Sample
TGX V4 - v1.7.6/Scripts/TopKek V3.js
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
TGX V4 - v1.7.6/Scripts/TopKek V3.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
TGX V4 - v1.7.6/System.Management.Automation.dll
Resource
win7-20220901-en
Behavioral task
behavioral28
Sample
TGX V4 - v1.7.6/System.Management.Automation.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral29
Sample
TGX V4 - v1.7.6/TGX.exe
Resource
win7-20221111-en
Behavioral task
behavioral30
Sample
TGX V4 - v1.7.6/TGX.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
TGX V4 - v1.7.6/Zeus.dll
Resource
win7-20220812-en
Behavioral task
behavioral32
Sample
TGX V4 - v1.7.6/Zeus.dll
Resource
win10v2004-20221111-en
General
-
Target
TGX V4 - v1.7.6/Electron.dll
-
Size
10.7MB
-
MD5
422033e61c2e450c76066c28496979d2
-
SHA1
a2de1fbc7ad1c4049dd0f307428ab443cb7708e0
-
SHA256
c61dc15192473b4ddfbf4ddeab4f112f83990dc18a96853a2001098d40f77512
-
SHA512
3006fd98be5db6bb5b63b15787a37d741c821add95d860a4f735c2a80a4181383370410573e1ab609d27376e3f9cc58e1cba522ea4083b259f7fbb3c4dad6107
-
SSDEEP
196608:93bB67MXg4AcLcf8SXzZ4mbTyrdk0qDi+2cahKaY26XNhWOhdzldTR:93bGMXgRK2XKYTq+0qmDK2IbWY
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1528 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1204 1528 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1528 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1348 wrote to memory of 1528 1348 rundll32.exe 27 PID 1348 wrote to memory of 1528 1348 rundll32.exe 27 PID 1348 wrote to memory of 1528 1348 rundll32.exe 27 PID 1348 wrote to memory of 1528 1348 rundll32.exe 27 PID 1348 wrote to memory of 1528 1348 rundll32.exe 27 PID 1348 wrote to memory of 1528 1348 rundll32.exe 27 PID 1348 wrote to memory of 1528 1348 rundll32.exe 27 PID 1528 wrote to memory of 1204 1528 rundll32.exe 28 PID 1528 wrote to memory of 1204 1528 rundll32.exe 28 PID 1528 wrote to memory of 1204 1528 rundll32.exe 28 PID 1528 wrote to memory of 1204 1528 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\TGX V4 - v1.7.6\Electron.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\TGX V4 - v1.7.6\Electron.dll",#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 2043⤵
- Program crash
PID:1204
-
-