Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
1citracximaker.7z
windows7-x64
3citracximaker.7z
windows10-2004-x64
3Citra-CXI-...616.7z
windows7-x64
3Citra-CXI-...616.7z
windows10-2004-x64
3citra-cxi-maker.bat
windows7-x64
1citra-cxi-maker.bat
windows10-2004-x64
1readme.txt
windows7-x64
1readme.txt
windows10-2004-x64
1tools/3dstool.exe
windows7-x64
1tools/3dstool.exe
windows10-2004-x64
1tools/ctrtool.exe
windows7-x64
1tools/ctrtool.exe
windows10-2004-x64
1tools/xxd.exe
windows7-x64
1tools/xxd.exe
windows10-2004-x64
1Citra-CXI-...23.zip
windows7-x64
1Citra-CXI-...23.zip
windows10-2004-x64
1Citra-CXI-...15.zip
windows7-x64
1Citra-CXI-...15.zip
windows10-2004-x64
1GameBrew.url
windows7-x64
6GameBrew.url
windows10-2004-x64
4Analysis
-
max time kernel
150s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
29/03/2023, 14:11
Static task
static1
Behavioral task
behavioral1
Sample
citracximaker.7z
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
citracximaker.7z
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Citra-CXI-Maker-v1.1-20200616.7z
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Citra-CXI-Maker-v1.1-20200616.7z
Resource
win10v2004-20230221-en
Behavioral task
behavioral5
Sample
citra-cxi-maker.bat
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
citra-cxi-maker.bat
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
readme.txt
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
readme.txt
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
tools/3dstool.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
tools/3dstool.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral11
Sample
tools/ctrtool.exe
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
tools/ctrtool.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
tools/xxd.exe
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
tools/xxd.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
Citra-CXI-Maker-v1.2-20200623.zip
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
Citra-CXI-Maker-v1.2-20200623.zip
Resource
win10v2004-20230221-en
Behavioral task
behavioral17
Sample
Citra-CXI-Maker-v1.3-20210215.zip
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
Citra-CXI-Maker-v1.3-20210215.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
GameBrew.url
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
GameBrew.url
Resource
win10v2004-20230220-en
General
-
Target
Citra-CXI-Maker-v1.1-20200616.7z
-
Size
606KB
-
MD5
3923f27b6f800622ffcd9f0a674420cc
-
SHA1
e778554f5f88dcd4af696bf69bc094322cf6bb84
-
SHA256
c80038ebad55d5a1b12bac2692bde7a8cd8dc971c974045b04e96423ce7a37a4
-
SHA512
c05134913e0bd502db904499e3f9d8ef806845a9404511282d3c80bd2012519b4295d6eac6dcf1a4ac805f4b8932fc8392cd9bc276a60f7b439c72799a46c665
-
SSDEEP
12288:EWNvYwQCBRzgS3r5jZ3qGTKgijDJn1aDqA+sd1d3z//hpHtNFAjELmhn1a/:EWB6CBRz33rVtTlONOqA+GZpHG1A
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\7z_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\7z_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\7z_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\.7z\ = "7z_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\.7z rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\7z_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\7z_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\7z_auto_file\ rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1688 AcroRd32.exe 1688 AcroRd32.exe 1688 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 972 wrote to memory of 672 972 cmd.exe 28 PID 972 wrote to memory of 672 972 cmd.exe 28 PID 972 wrote to memory of 672 972 cmd.exe 28 PID 672 wrote to memory of 1688 672 rundll32.exe 29 PID 672 wrote to memory of 1688 672 rundll32.exe 29 PID 672 wrote to memory of 1688 672 rundll32.exe 29 PID 672 wrote to memory of 1688 672 rundll32.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Citra-CXI-Maker-v1.1-20200616.7z1⤵
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Citra-CXI-Maker-v1.1-20200616.7z2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Citra-CXI-Maker-v1.1-20200616.7z"3⤵
- Suspicious use of SetWindowsHookEx
PID:1688
-
-