Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    483s
  • max time network
    517s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    14/02/2023, 20:10

General

  • Target

    Keep.Talking.and.Nobody.Explodes.v1.8.3/ktane.exe

  • Size

    635KB

  • MD5

    93ab078adee0ddebd762223603759dce

  • SHA1

    8b787cd7c5b435a003a1759189aae2af63ca2df6

  • SHA256

    094ca8ab7509ebac057a03fb7649b12ac18dc2ebde2410a88953f94164ca5197

  • SHA512

    84fef9bed2f83dada4e918b175764e10d18a53a1659c76d523f99997aaf1c400d9a8fec6a228394c925ac692d1a6f4e59ca284398b86b06ea563fc708e4ab477

  • SSDEEP

    3072:UT01yJRVYulZo4YJZeUnqW7lfTh2gKO5hTndPO8:U9fYunoPZx1F5hTndPb

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops desktop.ini file(s) 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Keep.Talking.and.Nobody.Explodes.v1.8.3\ktane.exe
    "C:\Users\Admin\AppData\Local\Temp\Keep.Talking.and.Nobody.Explodes.v1.8.3\ktane.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:4464
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x2f4 0x4fc
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3580
  • C:\Windows\System32\GameBarPresenceWriter.exe
    "C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer
    1⤵
      PID:4732
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:3744
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
      1⤵
      • Drops desktop.ini file(s)
      • Checks processor information in registry
      • Modifies registry class
      PID:1348

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4464-132-0x000002566B650000-0x000002566B750000-memory.dmp

      Filesize

      1024KB

    • memory/4464-133-0x000002566B060000-0x000002566B160000-memory.dmp

      Filesize

      1024KB

    • memory/4464-134-0x0000025672C50000-0x0000025672D50000-memory.dmp

      Filesize

      1024KB

    • memory/4464-135-0x0000025670240000-0x0000025670250000-memory.dmp

      Filesize

      64KB

    • memory/4464-136-0x0000025623810000-0x0000025623910000-memory.dmp

      Filesize

      1024KB

    • memory/4464-137-0x000002562EBF0000-0x000002562FB02000-memory.dmp

      Filesize

      15.1MB

    • memory/4464-140-0x000002562EBF0000-0x000002562FB02000-memory.dmp

      Filesize

      15.1MB

    • memory/4464-141-0x0000025672C50000-0x0000025672D50000-memory.dmp

      Filesize

      1024KB

    • memory/4464-142-0x0000025623810000-0x0000025623910000-memory.dmp

      Filesize

      1024KB

    • memory/4464-143-0x000002562EBF0000-0x000002562FB02000-memory.dmp

      Filesize

      15.1MB

    • memory/4464-144-0x000002563C360000-0x000002563C460000-memory.dmp

      Filesize

      1024KB

    • memory/4464-145-0x000002563C360000-0x000002563C460000-memory.dmp

      Filesize

      1024KB