Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
1Transfer.zip
windows10-2004-x64
1Transfer/control.lua
windows10-2004-x64
3Transfer/d...n.json
windows10-2004-x64
3Transfer/freeplay.js
windows10-2004-x64
1Transfer/info.json
windows10-2004-x64
3Transfer/l...it.dat
windows10-2004-x64
3Transfer/level.dat0
windows10-2004-x64
3Transfer/level.dat1
windows10-2004-x64
3Transfer/level.dat10
windows10-2004-x64
3Transfer/level.dat11
windows10-2004-x64
3Transfer/level.dat12
windows10-2004-x64
3Transfer/level.dat2
windows10-2004-x64
3Transfer/level.dat3
windows10-2004-x64
3Transfer/level.dat4
windows10-2004-x64
3Transfer/level.dat5
windows10-2004-x64
3Transfer/level.dat6
windows10-2004-x64
3Transfer/level.dat7
windows10-2004-x64
3Transfer/level.dat8
windows10-2004-x64
3Transfer/level.dat9
windows10-2004-x64
3Transfer/l...tadata
windows10-2004-x64
3Transfer/l...ay.cfg
windows10-2004-x64
3Transfer/l...ay.cfg
windows10-2004-x64
3Transfer/l...ay.cfg
windows10-2004-x64
3Transfer/l...ay.cfg
windows10-2004-x64
3Transfer/l...ay.cfg
windows10-2004-x64
3Transfer/l...ay.cfg
windows10-2004-x64
3Transfer/l...ay.cfg
windows10-2004-x64
3Transfer/l...ay.cfg
windows10-2004-x64
3Transfer/l...ay.cfg
windows10-2004-x64
3Transfer/l...ay.cfg
windows10-2004-x64
3Transfer/l...ay.cfg
windows10-2004-x64
3Transfer/preview.jpg
windows10-2004-x64
3Resubmissions
18/01/2024, 21:47
240118-1m8ayshghp 318/01/2024, 21:42
240118-1kd94ahgdk 118/01/2024, 21:39
240118-1h5dhaafa4 1Analysis
-
max time kernel
286s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 21:47
Static task
static1
Behavioral task
behavioral1
Sample
Transfer.zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
Transfer/control.lua
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Transfer/description.json
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
Transfer/freeplay.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Transfer/info.json
Resource
win10v2004-20231215-en
Behavioral task
behavioral6
Sample
Transfer/level-init.dat
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
Transfer/level.dat0
Resource
win10v2004-20231215-en
Behavioral task
behavioral8
Sample
Transfer/level.dat1
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
Transfer/level.dat10
Resource
win10v2004-20231215-en
Behavioral task
behavioral10
Sample
Transfer/level.dat11
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
Transfer/level.dat12
Resource
win10v2004-20231215-en
Behavioral task
behavioral12
Sample
Transfer/level.dat2
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
Transfer/level.dat3
Resource
win10v2004-20231215-en
Behavioral task
behavioral14
Sample
Transfer/level.dat4
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
Transfer/level.dat5
Resource
win10v2004-20231215-en
Behavioral task
behavioral16
Sample
Transfer/level.dat6
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
Transfer/level.dat7
Resource
win10v2004-20231215-en
Behavioral task
behavioral18
Sample
Transfer/level.dat8
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
Transfer/level.dat9
Resource
win10v2004-20231215-en
Behavioral task
behavioral20
Sample
Transfer/level.datmetadata
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
Transfer/locale/af/freeplay.cfg
Resource
win10v2004-20231215-en
Behavioral task
behavioral22
Sample
Transfer/locale/ar/freeplay.cfg
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
Transfer/locale/be/freeplay.cfg
Resource
win10v2004-20231215-en
Behavioral task
behavioral24
Sample
Transfer/locale/bg/freeplay.cfg
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
Transfer/locale/ca/freeplay.cfg
Resource
win10v2004-20231215-en
Behavioral task
behavioral26
Sample
Transfer/locale/cs/freeplay.cfg
Resource
win10v2004-20231222-en
Behavioral task
behavioral27
Sample
Transfer/locale/da/freeplay.cfg
Resource
win10v2004-20231215-en
Behavioral task
behavioral28
Sample
Transfer/locale/de/freeplay.cfg
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
Transfer/locale/el/freeplay.cfg
Resource
win10v2004-20231215-en
Behavioral task
behavioral30
Sample
Transfer/locale/en/freeplay.cfg
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
Transfer/locale/es-ES/freeplay.cfg
Resource
win10v2004-20231215-en
Behavioral task
behavioral32
Sample
Transfer/preview.jpg
Resource
win10v2004-20231215-en
General
-
Target
Transfer/control.lua
-
Size
118B
-
MD5
30deda636e264b3d01d8d26095a26652
-
SHA1
4e866186ebe297f1038fd325b09df1a1f5e2fdd1
-
SHA256
74a4db89a7c23f8d449bf1b3d5d3b62db2d7232e5e7a6652e848f5b80627a734
-
SHA512
a31a96ed6cddb81abd6b8b654a928150835bcfc4536738d69c7fc3dd813b8c50e7c23ed68a15e40daf313ab8d1496c49fd5d3aff476c620d5234a9f180bdf996
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 18 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\lua_auto_file\shell\edit\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\lua_auto_file\shell\open\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\.lua OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\䶡ꋬ⾱⏜ OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\lua_auto_file\shell\edit\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\묍戌ᴀ蠀撀ோɶ OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\細ৌɶ OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\lua_auto_file\shell\edit OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\.lua\ = "lua_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\lua_auto_file OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\細ৌɶ\ = "lua_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\lua_auto_file\shell\open OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\lua_auto_file\shell\open\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\䶡ꋬ⾱⏜\ = "lua_auto_file" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\묍戌ᴀ蠀撀ோɶ\ = "lua_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\lua_auto_file\shell OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 464 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1012 OpenWith.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 1012 OpenWith.exe 1012 OpenWith.exe 1012 OpenWith.exe 1012 OpenWith.exe 1012 OpenWith.exe 1012 OpenWith.exe 1012 OpenWith.exe 1012 OpenWith.exe 1012 OpenWith.exe 1012 OpenWith.exe 1012 OpenWith.exe 1012 OpenWith.exe 1012 OpenWith.exe 1012 OpenWith.exe 1012 OpenWith.exe 1012 OpenWith.exe 1012 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1012 wrote to memory of 464 1012 OpenWith.exe 99 PID 1012 wrote to memory of 464 1012 OpenWith.exe 99
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Transfer\control.lua1⤵
- Modifies registry class
PID:2008
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Transfer\control.lua2⤵
- Opens file in notepad (likely ransom note)
PID:464
-