Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
1BeamNG.drive.exe
windows7-x64
3BeamNG.drive.exe
windows10-2004-x64
6BeamNG.drive.exe
android-9-x86
BeamNG.drive.exe
android-10-x64
BeamNG.drive.exe
android-11-x64
BeamNG.drive.exe
ubuntu-18.04-amd64
BeamNG.drive.exe
debian-9-armhf
BeamNG.drive.exe
debian-9-mips
BeamNG.drive.exe
debian-9-mipsel
Analysis
-
max time kernel
30s -
max time network
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
17/02/2023, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
BeamNG.drive.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
BeamNG.drive.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
BeamNG.drive.exe
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral4
Sample
BeamNG.drive.exe
Resource
android-x64-20220823-en
Behavioral task
behavioral5
Sample
BeamNG.drive.exe
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral6
Sample
BeamNG.drive.exe
Resource
ubuntu1804-amd64-20221111-en
Behavioral task
behavioral7
Sample
BeamNG.drive.exe
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral8
Sample
BeamNG.drive.exe
Resource
debian9-mipsbe-20221111-en
Behavioral task
behavioral9
Sample
BeamNG.drive.exe
Resource
debian9-mipsel-en-20211208
General
-
Target
BeamNG.drive.exe
-
Size
3.2MB
-
MD5
894e69a7ebc542878aedcd7ca3cdd7d4
-
SHA1
c69ae4bd40d5765310989c0bfb78abeb2cb9a918
-
SHA256
b55c6df0b0541868d71ba62851b5dbdeac7c2d43cdae9d968f4a06e50c5dcc0d
-
SHA512
beefa7429131eb123c385e2b7b043e97810428ee64213ce4e40ea30d5fe1577ae71bf821e1bbfae40c47af43b3e9de3860de1e17e740fb37674b52797f239caf
-
SSDEEP
49152:5T7FqeYCjuBRJH7oReJpsyip7pzIadGA8d5wL9EJaK:5TkeYCjo7ocatzIad7iiL9O
Malware Config
Signatures
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\beamng\shell BeamNG.drive.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\beamng\shell\open BeamNG.drive.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\beamng\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\BeamNG.drive.exe\" -command \"%1\"" BeamNG.drive.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\beamng BeamNG.drive.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\beamng\ = "URL:beamng Protocol" BeamNG.drive.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\beamng\URL Protocol BeamNG.drive.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\beamng\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\BeamNG.drive.exe,0" BeamNG.drive.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\beamng\DefaultIcon BeamNG.drive.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\beamng\shell\open\command BeamNG.drive.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4246620582-653642754-1174164128-1000\{AFD04A06-9F66-4DFB-B416-274810B8D96B} svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4396 OpenWith.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\BeamNG.drive.exe"C:\Users\Admin\AppData\Local\Temp\BeamNG.drive.exe"1⤵
- Modifies registry class
PID:4880
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵PID:4416
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4396
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
PID:4364