Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/02/2023, 21:19
Static task
static1
Behavioral task
behavioral1
Sample
EA DLC Unlocker v2/ea_desktop/version.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
EA DLC Unlocker v2/ea_desktop/version.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
EA DLC Unlocker v2/origin/version.dll
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
EA DLC Unlocker v2/origin/version.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
EA DLC Unlocker v2/setup.bat
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
EA DLC Unlocker v2/setup.bat
Resource
win10v2004-20220901-en
General
-
Target
EA DLC Unlocker v2/ea_desktop/version.dll
-
Size
238KB
-
MD5
df7eabf56d49ebd775f92fa67a0071d6
-
SHA1
7dff8092b62a7f400e3aef760e643ad948d533c5
-
SHA256
d6086904aa3c47a04f9651cad2d2d4be3d50ae93b4bbc5b5b7bd63dc86eb2ec6
-
SHA512
ecfb1e8e259fbcb45c00c858a90d11a73304baea9f27474c9ffd439177098412f6009dc8f5ef48ab496e82910a5454836a7c33c3e82cbb9dfb5c3866b8a880f6
-
SSDEEP
3072:8iPe/BusENL4M8MzYg2GOPSkc+0j6kML3lHq91QQevXDDsC1fxgKT/mqs/KFQizn:LPe/BKVmqkQ6kMB5HnsSFQP
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1772 1264 WerFault.exe 27 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1648 chrome.exe 1704 chrome.exe 1704 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe 1704 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1264 wrote to memory of 1772 1264 rundll32.exe 28 PID 1264 wrote to memory of 1772 1264 rundll32.exe 28 PID 1264 wrote to memory of 1772 1264 rundll32.exe 28 PID 1704 wrote to memory of 1092 1704 chrome.exe 30 PID 1704 wrote to memory of 1092 1704 chrome.exe 30 PID 1704 wrote to memory of 1092 1704 chrome.exe 30 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 596 1704 chrome.exe 31 PID 1704 wrote to memory of 1648 1704 chrome.exe 32 PID 1704 wrote to memory of 1648 1704 chrome.exe 32 PID 1704 wrote to memory of 1648 1704 chrome.exe 32 PID 1704 wrote to memory of 1620 1704 chrome.exe 33 PID 1704 wrote to memory of 1620 1704 chrome.exe 33 PID 1704 wrote to memory of 1620 1704 chrome.exe 33 PID 1704 wrote to memory of 1620 1704 chrome.exe 33 PID 1704 wrote to memory of 1620 1704 chrome.exe 33 PID 1704 wrote to memory of 1620 1704 chrome.exe 33 PID 1704 wrote to memory of 1620 1704 chrome.exe 33 PID 1704 wrote to memory of 1620 1704 chrome.exe 33 PID 1704 wrote to memory of 1620 1704 chrome.exe 33 PID 1704 wrote to memory of 1620 1704 chrome.exe 33 PID 1704 wrote to memory of 1620 1704 chrome.exe 33 PID 1704 wrote to memory of 1620 1704 chrome.exe 33 PID 1704 wrote to memory of 1620 1704 chrome.exe 33 PID 1704 wrote to memory of 1620 1704 chrome.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\EA DLC Unlocker v2\ea_desktop\version.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1264 -s 962⤵
- Program crash
PID:1772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6614f50,0x7fef6614f60,0x7fef6614f702⤵PID:1092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1132,5707823691996728310,14675416626686196387,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1136 /prefetch:22⤵PID:596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1132,5707823691996728310,14675416626686196387,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1212 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1132,5707823691996728310,14675416626686196387,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1788 /prefetch:82⤵PID:1620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1132,5707823691996728310,14675416626686196387,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2052 /prefetch:12⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1132,5707823691996728310,14675416626686196387,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2032 /prefetch:12⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1132,5707823691996728310,14675416626686196387,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:892
-