Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
10/08/2023, 09:46
Static task
static1
Behavioral task
behavioral1
Sample
bdf5c486211d8650da2c86e4864ee997ff6c752a53b52f9abf37b848ef90ee39.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
bdf5c486211d8650da2c86e4864ee997ff6c752a53b52f9abf37b848ef90ee39.exe
Resource
win10v2004-20230703-en
General
-
Target
bdf5c486211d8650da2c86e4864ee997ff6c752a53b52f9abf37b848ef90ee39.exe
-
Size
5.8MB
-
MD5
6fd9544ef1050f410c24a3c71a293b10
-
SHA1
a99a35d13239ef43191113a3279425b51a5e38cc
-
SHA256
bdf5c486211d8650da2c86e4864ee997ff6c752a53b52f9abf37b848ef90ee39
-
SHA512
9ae03af9daf66f0056e8aec5a628f4c0870c22157e64d20ac485b2d0f8758ecbe91c6e8f71ac185b86273364fd691e03b4c3cf792ddd9697c450b6adaeac3762
-
SSDEEP
98304:AqVQ4tml/iUm4XHb8vFtYkQorSz9rAmLJHORm6UJamI3LeojzZARZpkAdcc6IjWF:/J+jX7oDnrSpru+W3KMZkvdagNXhJs0I
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/1432-10046-0x0000000000400000-0x000000000051F000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 1432 GameLoadep.exe 2716 Terms.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe 1432 GameLoadep.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Terms.exe GameLoadep.exe File opened for modification C:\Program Files (x86)\Terms.exe GameLoadep.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\GameLoadep.exe bdf5c486211d8650da2c86e4864ee997ff6c752a53b52f9abf37b848ef90ee39.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1432 GameLoadep.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2284 bdf5c486211d8650da2c86e4864ee997ff6c752a53b52f9abf37b848ef90ee39.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2284 bdf5c486211d8650da2c86e4864ee997ff6c752a53b52f9abf37b848ef90ee39.exe 2284 bdf5c486211d8650da2c86e4864ee997ff6c752a53b52f9abf37b848ef90ee39.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2284 wrote to memory of 1432 2284 bdf5c486211d8650da2c86e4864ee997ff6c752a53b52f9abf37b848ef90ee39.exe 28 PID 2284 wrote to memory of 1432 2284 bdf5c486211d8650da2c86e4864ee997ff6c752a53b52f9abf37b848ef90ee39.exe 28 PID 2284 wrote to memory of 1432 2284 bdf5c486211d8650da2c86e4864ee997ff6c752a53b52f9abf37b848ef90ee39.exe 28 PID 2284 wrote to memory of 1432 2284 bdf5c486211d8650da2c86e4864ee997ff6c752a53b52f9abf37b848ef90ee39.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdf5c486211d8650da2c86e4864ee997ff6c752a53b52f9abf37b848ef90ee39.exe"C:\Users\Admin\AppData\Local\Temp\bdf5c486211d8650da2c86e4864ee997ff6c752a53b52f9abf37b848ef90ee39.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\GameLoadep.exeC:\Windows\GameLoadep.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1432
-
-
C:\Program Files (x86)\Terms.exe"C:\Program Files (x86)\Terms.exe"1⤵
- Executes dropped EXE
PID:2716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
864KB
MD5645a7e5dc4adc68141447b01cb9cec49
SHA12f83beeb3031aa238c8eba4ae04398ff38274780
SHA25676931bce0663f68f95a46414d389042181c690749eed44cb09aae325a0b9ef17
SHA512fdf56fcacc1b43c94bd2811ad3926706f7382fc1d3e20c58b050cf254019c3b6226d0ffa8d4ba6aec259d3a99cb63d06d02156dd6dabab59b91418ba462885de
-
Filesize
864KB
MD5645a7e5dc4adc68141447b01cb9cec49
SHA12f83beeb3031aa238c8eba4ae04398ff38274780
SHA25676931bce0663f68f95a46414d389042181c690749eed44cb09aae325a0b9ef17
SHA512fdf56fcacc1b43c94bd2811ad3926706f7382fc1d3e20c58b050cf254019c3b6226d0ffa8d4ba6aec259d3a99cb63d06d02156dd6dabab59b91418ba462885de
-
Filesize
864KB
MD5645a7e5dc4adc68141447b01cb9cec49
SHA12f83beeb3031aa238c8eba4ae04398ff38274780
SHA25676931bce0663f68f95a46414d389042181c690749eed44cb09aae325a0b9ef17
SHA512fdf56fcacc1b43c94bd2811ad3926706f7382fc1d3e20c58b050cf254019c3b6226d0ffa8d4ba6aec259d3a99cb63d06d02156dd6dabab59b91418ba462885de
-
Filesize
864KB
MD5645a7e5dc4adc68141447b01cb9cec49
SHA12f83beeb3031aa238c8eba4ae04398ff38274780
SHA25676931bce0663f68f95a46414d389042181c690749eed44cb09aae325a0b9ef17
SHA512fdf56fcacc1b43c94bd2811ad3926706f7382fc1d3e20c58b050cf254019c3b6226d0ffa8d4ba6aec259d3a99cb63d06d02156dd6dabab59b91418ba462885de