Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
10/12/2023, 18:40
Static task
static1
Behavioral task
behavioral1
Sample
tuc4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
tuc4.exe
Resource
win10v2004-20231130-en
General
-
Target
tuc4.exe
-
Size
6.9MB
-
MD5
e5f9baf2d41dfedc6d946afef0bf4f2a
-
SHA1
6c7790c9e79645be54a103918d62390589fab135
-
SHA256
a16840fd50d21d9d6849db446ec7702e96f4f854c1efbf77d6b5698662e98750
-
SHA512
e6cae330c88ad2b1695b7df3b140d823d2cda40e889c5f18a7ccd66d09a92353f088421476acfd37bb52134095557066d686d67a38d087bd5a41ec9ebac7c376
-
SSDEEP
98304:KQ+Vxb2IGx8i09D7OWCLPMTeQm5MT1k/lmrpt9l4Rx2UXwDieSC0kWppgK6TrzuG:UVx6OdDqWwWeQm5+kYrMCUX6m7y5Trzj
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4044 tuc4.tmp 1604 crtgame.exe 4716 crtgame.exe -
Loads dropped DLL 3 IoCs
pid Process 4044 tuc4.tmp 4044 tuc4.tmp 4044 tuc4.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 63 IoCs
description ioc Process File created C:\Program Files (x86)\CRTGame\bin\x86\is-LL9NG.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-5IP0H.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-V4DT8.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-KINLQ.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-JHCQ2.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-4U661.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-2F9B0.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-8OEGV.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\is-U8NIK.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\uninstall\is-O3BPP.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-4FFJV.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-34QQ4.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\lessmsi\is-OG1UP.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-VL6AO.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-DD7I6.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-IEMMT.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-70LEI.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-2IGDI.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-9DVR7.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-5EEH4.tmp tuc4.tmp File opened for modification C:\Program Files (x86)\CRTGame\uninstall\unins000.dat tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-66HD2.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-49S90.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-G1UGO.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-36NE1.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\plugins\internal\is-71I0L.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-5KT6U.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-6UM8D.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-PIOPU.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-2PD69.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-DKPEI.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-DCOGK.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-LCPJG.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-164CN.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\plugins\internal\is-T8Q2G.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\stuff\is-6B0CD.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\stuff\is-9LQD2.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-G2EG4.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-8MPUI.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-45TUO.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\uninstall\unins000.dat tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-C5CLC.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-7QB7S.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-NJH3C.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-U8F8G.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\stuff\is-OONVF.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-4NCO9.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-GG0B3.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-F2HOI.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-HHB7H.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-92ISA.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-DVFKK.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-N95TP.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-95F31.tmp tuc4.tmp File opened for modification C:\Program Files (x86)\CRTGame\crtgame.exe tuc4.tmp File created C:\Program Files (x86)\CRTGame\stuff\is-QB3GR.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-MP5GM.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-CIOR6.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-M29P4.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-53CQ0.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-VLO6C.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-0LDTQ.tmp tuc4.tmp File created C:\Program Files (x86)\CRTGame\bin\x86\is-4QKB4.tmp tuc4.tmp -
Runs net.exe
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4044 tuc4.tmp -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2848 wrote to memory of 4044 2848 tuc4.exe 89 PID 2848 wrote to memory of 4044 2848 tuc4.exe 89 PID 2848 wrote to memory of 4044 2848 tuc4.exe 89 PID 4044 wrote to memory of 5072 4044 tuc4.tmp 93 PID 4044 wrote to memory of 5072 4044 tuc4.tmp 93 PID 4044 wrote to memory of 5072 4044 tuc4.tmp 93 PID 4044 wrote to memory of 1604 4044 tuc4.tmp 94 PID 4044 wrote to memory of 1604 4044 tuc4.tmp 94 PID 4044 wrote to memory of 1604 4044 tuc4.tmp 94 PID 4044 wrote to memory of 3920 4044 tuc4.tmp 98 PID 4044 wrote to memory of 3920 4044 tuc4.tmp 98 PID 4044 wrote to memory of 3920 4044 tuc4.tmp 98 PID 4044 wrote to memory of 4716 4044 tuc4.tmp 96 PID 4044 wrote to memory of 4716 4044 tuc4.tmp 96 PID 4044 wrote to memory of 4716 4044 tuc4.tmp 96 PID 3920 wrote to memory of 2796 3920 net.exe 99 PID 3920 wrote to memory of 2796 3920 net.exe 99 PID 3920 wrote to memory of 2796 3920 net.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\tuc4.exe"C:\Users\Admin\AppData\Local\Temp\tuc4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\is-JHKNV.tmp\tuc4.tmp"C:\Users\Admin\AppData\Local\Temp\is-JHKNV.tmp\tuc4.tmp" /SL5="$900B2,6990755,54272,C:\Users\Admin\AppData\Local\Temp\tuc4.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:5072
-
-
C:\Program Files (x86)\CRTGame\crtgame.exe"C:\Program Files (x86)\CRTGame\crtgame.exe" -i3⤵
- Executes dropped EXE
PID:1604
-
-
C:\Program Files (x86)\CRTGame\crtgame.exe"C:\Program Files (x86)\CRTGame\crtgame.exe" -s3⤵
- Executes dropped EXE
PID:4716
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 103⤵
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 104⤵PID:2796
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5eff3707bae286ca2f766edfaa026173e
SHA148720215339fc7b5d3a6d13eb81ef99d34d915bf
SHA25625b57b9d56eee0a63842a2410ffa26e64d2341749e01975eca8cb23afcfd3782
SHA512fb60d07adbdb436f7ca748ffcad21dc89336d5ea95899cda28d35ed9c316c7b98c5cb47bf1e6d0f5e4cdb6d8a037b811e6bcc27185a3eed3aabecae8bf0074e6
-
Filesize
1.2MB
MD503c49c98ae10d4ab2b70208f81d9716e
SHA12b9e144ca87f107879fa4347eb7fdd845056294c
SHA2564f5dcfe26bc35d76942ea2b2ad325e96ddf8fe17d9f3b46bc6f038c93adac871
SHA51203f879bf8b82ea4fca9d8f4072ffa41fc141a660316443d6c89b307cdbe81667e5a2dbc8c2b5354f570fa8ae8b51f6bd7281f1b4ab501aa78bcce06c9fdeafca
-
Filesize
835KB
MD51e2cf1820de2ac3df794e624d23ad16b
SHA158e3b8df1e2866dd39c84b40bd74871be1e90553
SHA2562a24bbf4f9b06c540e3dd2a37750052fb48ca74cc3857f6b239d58c33fdcc2ae
SHA5122f26346ed2ba722142cad3f47dd923eb0e306810363855bf5f4f6a4fad6c641551ae89dbadf15fa45a8bb22eade69a5875852b664f569b27866fa38e33f59ed9
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303
-
Filesize
687KB
MD5f448d7f4b76e5c9c3a4eaff16a8b9b73
SHA131808f1ffa84c954376975b7cdb0007e6b762488
SHA2567233b85eb0f8b3aa5cae3811d727aa8742fec4d1091c120a0fe15006f424cc49
SHA512f8197458cd2764c0b852dac34f9bf361110a7dc86903024a97c7bcd3f77b148342bf45e3c2b60f6af8198ae3b83938dbaad5e007d71a0f88006f3a0618cf36f4