Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
41s -
max time network
45s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2023, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
Five Nights At Candy's/FiveNightsAtCandys.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Five Nights At Candy's/FiveNightsAtCandys.exe
Resource
win10v2004-20230220-en
General
-
Target
Five Nights At Candy's/FiveNightsAtCandys.exe
-
Size
106.4MB
-
MD5
6f18b6bbcbebbc68b620ce770884dc74
-
SHA1
b23281b5d18e5f02350dd6efd5ee5abe3fe9ae64
-
SHA256
7a2870a2eba6bee4a335826934230d48cf40c9fbeed25e83f6adc99686bf9dc1
-
SHA512
afb5cd66999710258cb8b5c85ff1cd167ca71b804ee12bfe444fe2ff25b9708470239b517c720750cbee2ff46a24c92c501059c0ec922fad2852486fef7f64f0
-
SSDEEP
3145728:52eNARAOWFLcSBhBOaTW3P0C4bMWgnz/pu4ibVS:5ra+cABOaTWsfTgnz/3yo
Malware Config
Signatures
-
Loads dropped DLL 10 IoCs
pid Process 4172 FiveNightsAtCandys.exe 4172 FiveNightsAtCandys.exe 4172 FiveNightsAtCandys.exe 4172 FiveNightsAtCandys.exe 4172 FiveNightsAtCandys.exe 4172 FiveNightsAtCandys.exe 4172 FiveNightsAtCandys.exe 4172 FiveNightsAtCandys.exe 4172 FiveNightsAtCandys.exe 4172 FiveNightsAtCandys.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1675742406-747946869-1029867430-1000\{CC9D65EC-1098-4D58-93D7-408938D02C42} svchost.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1675742406-747946869-1029867430-1000\{D92113B7-5804-4A1B-8CF7-D978D04BCA81} svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4140 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4140 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4172 FiveNightsAtCandys.exe 216 OpenWith.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Five Nights At Candy's\FiveNightsAtCandys.exe"C:\Users\Admin\AppData\Local\Temp\Five Nights At Candy's\FiveNightsAtCandys.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4172
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:216
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
PID:4596
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3c4 0x3bc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4140
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Checks processor information in registry
- Modifies registry class
PID:2200
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD59f064bdcb066daa428db0ed9e33e785d
SHA13c0df73cf247ce49d1010fe0e2f722424fe43f4f
SHA256090925a4cd961f22b1ecd2fba4ce04ab063e26507a1dc09b1d6a40c4860a8777
SHA5124a510ce13c379e8cb5ccb9f9c69e28e9440f48156c8c4c1fef6987495cace7c028d45530ac961f47786e8f503f90c54310cb1ccf43d7fd584506461c1bd616d5
-
Filesize
64KB
MD5b1bce28b7dd711f299785f35b5d30d9e
SHA154948c118fd5866c7b6c3efada3ae4b87548e392
SHA2561a2e6bd6ce00288a3fcfa6d1544e32b00543559ac8ffcddc17aa2e19bd3a71aa
SHA5124d22e9dfef85869502f7f9372c918c006575dfa405daebe075a9618907b0139ada75465e8ea1694c07dcd1b0c5f6d26411a6cdfb6603f9ee5643d04b8de5dd7a
-
Filesize
64KB
MD5b1bce28b7dd711f299785f35b5d30d9e
SHA154948c118fd5866c7b6c3efada3ae4b87548e392
SHA2561a2e6bd6ce00288a3fcfa6d1544e32b00543559ac8ffcddc17aa2e19bd3a71aa
SHA5124d22e9dfef85869502f7f9372c918c006575dfa405daebe075a9618907b0139ada75465e8ea1694c07dcd1b0c5f6d26411a6cdfb6603f9ee5643d04b8de5dd7a
-
Filesize
28KB
MD56464b32ef16f0026334fbd2a8f2b6b62
SHA1efd9199bdf6e056d446efa32700fc00f27782d31
SHA256a0bc50d0fc19e83a7ce7892c29540818a47a2085ae512bf102d2891ee59a81d3
SHA51211d9c94c3bbf9d659f82d06492216f150025c4cd9129f887b19cf1cac4e9fbb779c48e4405a6821ac559bcad167e415243d043d52e492453d2f507d1c1a61c0b
-
Filesize
1.1MB
MD5280eccc6206500938ac9daa5baadbf1a
SHA119217ffbfa924b795a90fddfc3c5a1e4e0e88301
SHA256ca8b234eb31dae750b33f89aab906362c898074e32e9042ea8fdf50cec2d5766
SHA512913fff38b373dc37dbca9eec8d3b164c2613a02ba34abcbbd5de06c67407e0a2fa7fac5e1d1a6adaa772138a21343594fdcb08ddea67431081f81ea6f13da58d
-
Filesize
459KB
MD54c240ac059ebca98706100798ab42133
SHA128fbb81a59fc892c58ea9c0b9277a0181de0c523
SHA2563d81578a59699b82d812c59db7ef03b141da1700dc2ef20c5728feb83af08e4b
SHA5125869f161de4df77c53631b82b6ebfca8cf71749592c0c83a6a1f3683c52c0e6ac5c764df3bc2d19db7fb84f9635abfd235d0c57ca7c6827930bb48eeb4dc7a59
-
Filesize
130KB
MD5e925b7e0be07bc86cb8042168077bb04
SHA1233c160b5264e1fa4f3b3ad6464207c09f698d26
SHA256848d266c7676a5f59e66386d76679b97d2934166a8d829d5d000b217ab7a34cf
SHA5120063b350116bfa478ecda081ae364e08c84cb97a337ff0b6e0d442653976c2663b8b2b430cca694f1a75fd93414d264b46da1331e7aadc2cdd424d69db27c31a
-
Filesize
130KB
MD5e925b7e0be07bc86cb8042168077bb04
SHA1233c160b5264e1fa4f3b3ad6464207c09f698d26
SHA256848d266c7676a5f59e66386d76679b97d2934166a8d829d5d000b217ab7a34cf
SHA5120063b350116bfa478ecda081ae364e08c84cb97a337ff0b6e0d442653976c2663b8b2b430cca694f1a75fd93414d264b46da1331e7aadc2cdd424d69db27c31a
-
Filesize
8KB
MD5f76739536860a0bdb4a7e3bbb0c06d08
SHA1b21581aa36eda87db8845caf58c668749e26b29f
SHA25641136b09b033a20b9acc430620ea095ff76afbdc7aebe7f26f7d2b4315afddef
SHA5126e65f23a4c1e3b0068b190f9aaaedcfa0466b0185cd6bbafa5f6f6940c8bc332e7c8c611d1b3b63bb2c5fcda48bbe2a678d81a3819940ecc0c701d6fec4194c7
-
Filesize
8KB
MD5f76739536860a0bdb4a7e3bbb0c06d08
SHA1b21581aa36eda87db8845caf58c668749e26b29f
SHA25641136b09b033a20b9acc430620ea095ff76afbdc7aebe7f26f7d2b4315afddef
SHA5126e65f23a4c1e3b0068b190f9aaaedcfa0466b0185cd6bbafa5f6f6940c8bc332e7c8c611d1b3b63bb2c5fcda48bbe2a678d81a3819940ecc0c701d6fec4194c7
-
Filesize
23B
MD5ac5fe05c30d9109331e49d861e27d2d0
SHA10a45162a5b5c52adef45888807dcb2c8a6decfab
SHA256a29524c39fab348f5df04f83495c654aa90fb3f30be2c4ecb9ff24e55a6fcc7b
SHA512b64f43169f578b6f122dbd82ae3ddf87a094ec280284417cd12b5d55454eb829f501a906816029a54f98aea02ff8132daa62fac20763fd529c3169f9e9e0932c
-
Filesize
190B
MD5b0d27eaec71f1cd73b015f5ceeb15f9d
SHA162264f8b5c2f5034a1e4143df6e8c787165fbc2f
SHA25686d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2
SHA5127b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c
-
Filesize
190B
MD5b0d27eaec71f1cd73b015f5ceeb15f9d
SHA162264f8b5c2f5034a1e4143df6e8c787165fbc2f
SHA25686d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2
SHA5127b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c