Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 22:51
Static task
static1
Behavioral task
behavioral1
Sample
FiveNightsatFreddys.exe
Resource
win10-20231020-en
Behavioral task
behavioral2
Sample
FiveNightsatFreddys.exe
Resource
win10v2004-20231023-en
General
-
Target
FiveNightsatFreddys.exe
-
Size
220.4MB
-
MD5
e942cdc6064176fb97108f215569d1ea
-
SHA1
9a183ce0eb4b28ba417aaae53545cbf440fcb17b
-
SHA256
88f33da3c76245f6b28fb534a73eb0e71f722dcef834713443021129c0079655
-
SHA512
ec5e66264079ba082087634763c0ff8030cb36a3f5e13accf68b78c308e682917b45d85e4252aa05f898ccfcdb831c7f0d3f1d90fcfd14cd7abbfdeea2a0730a
-
SSDEEP
6291456:2/uBRk9d1kRH8X+TaR9ryLlss8IHO3NV1WKWkxgk4W53o6mjxL:2/uM9d1kN8uqryLanNV1TWLk4W53o6kL
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 2636 FiveNightsatFreddys.exe 2636 FiveNightsatFreddys.exe 2636 FiveNightsatFreddys.exe 2636 FiveNightsatFreddys.exe 2636 FiveNightsatFreddys.exe 2636 FiveNightsatFreddys.exe 2636 FiveNightsatFreddys.exe 2636 FiveNightsatFreddys.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-984744499-3605095035-265325720-1000\{4B4497E8-53CF-419B-87C7-9D9E8D4A253E} svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2636 FiveNightsatFreddys.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2984 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2984 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2636 FiveNightsatFreddys.exe 3476 OpenWith.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FiveNightsatFreddys.exe"C:\Users\Admin\AppData\Local\Temp\FiveNightsatFreddys.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2636
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵PID:2404
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:3476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
PID:2392
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x304 0x4f41⤵
- Suspicious use of AdjustPrivilegeToken
PID:2984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD59f064bdcb066daa428db0ed9e33e785d
SHA13c0df73cf247ce49d1010fe0e2f722424fe43f4f
SHA256090925a4cd961f22b1ecd2fba4ce04ab063e26507a1dc09b1d6a40c4860a8777
SHA5124a510ce13c379e8cb5ccb9f9c69e28e9440f48156c8c4c1fef6987495cace7c028d45530ac961f47786e8f503f90c54310cb1ccf43d7fd584506461c1bd616d5
-
Filesize
64KB
MD5b1bce28b7dd711f299785f35b5d30d9e
SHA154948c118fd5866c7b6c3efada3ae4b87548e392
SHA2561a2e6bd6ce00288a3fcfa6d1544e32b00543559ac8ffcddc17aa2e19bd3a71aa
SHA5124d22e9dfef85869502f7f9372c918c006575dfa405daebe075a9618907b0139ada75465e8ea1694c07dcd1b0c5f6d26411a6cdfb6603f9ee5643d04b8de5dd7a
-
Filesize
64KB
MD5b1bce28b7dd711f299785f35b5d30d9e
SHA154948c118fd5866c7b6c3efada3ae4b87548e392
SHA2561a2e6bd6ce00288a3fcfa6d1544e32b00543559ac8ffcddc17aa2e19bd3a71aa
SHA5124d22e9dfef85869502f7f9372c918c006575dfa405daebe075a9618907b0139ada75465e8ea1694c07dcd1b0c5f6d26411a6cdfb6603f9ee5643d04b8de5dd7a
-
Filesize
28KB
MD58d086569a8b80fb85db3c9c93af299b5
SHA1143ec5000967c64b994b4ff7eab9e429bff2d109
SHA256a5618b90999455b6f8abe3b2849c96175427d27680a46c4386c94bebfb7727cc
SHA5123eeff9e820a8f87493b7748c48197655be9a4a0fef1854dd2dba2cf04427bd15e927efb79a6dd2c9c9eb665c1e716d85c1fcd5b032aab17a175d8da601fda1e9
-
Filesize
1.1MB
MD5216edca5011d2de83e3ab5e01bbbdbda
SHA149291814036dd68c81cb3479f6fd1b976b1ca30d
SHA2561c0ec3ce3eacdcff742ed0fa88f8f942acec23383f13e5a049d83bd54a30cd07
SHA512649905476ac60ebc29466d95a2835313afc708a0fec1715b62e1fc9fd643c8dc6d8a1c5bc44e74e546be7cf28547c0e03f4364ef780c546f04b8cd71fcd55335
-
Filesize
459KB
MD53d377182bf625d57d50df332db8a09fa
SHA10fdb0f6c3c5d90e395ecd65f204e39a5a98ab19e
SHA2560ce3a723492b37f10d3e142feff4b10396c8955b5365a3afbafd75a473a6af35
SHA512625b43ba5f96fd31e387a2dedd67599ef340da9b77279f18ae0a0fbf9aa9640f428fd442c0fe9edc465b2310b004d7015953e762405e54a354224d4f5f35cc8e
-
Filesize
8KB
MD5f76739536860a0bdb4a7e3bbb0c06d08
SHA1b21581aa36eda87db8845caf58c668749e26b29f
SHA25641136b09b033a20b9acc430620ea095ff76afbdc7aebe7f26f7d2b4315afddef
SHA5126e65f23a4c1e3b0068b190f9aaaedcfa0466b0185cd6bbafa5f6f6940c8bc332e7c8c611d1b3b63bb2c5fcda48bbe2a678d81a3819940ecc0c701d6fec4194c7
-
Filesize
8KB
MD5f76739536860a0bdb4a7e3bbb0c06d08
SHA1b21581aa36eda87db8845caf58c668749e26b29f
SHA25641136b09b033a20b9acc430620ea095ff76afbdc7aebe7f26f7d2b4315afddef
SHA5126e65f23a4c1e3b0068b190f9aaaedcfa0466b0185cd6bbafa5f6f6940c8bc332e7c8c611d1b3b63bb2c5fcda48bbe2a678d81a3819940ecc0c701d6fec4194c7
-
Filesize
190B
MD5b0d27eaec71f1cd73b015f5ceeb15f9d
SHA162264f8b5c2f5034a1e4143df6e8c787165fbc2f
SHA25686d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2
SHA5127b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c