Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
3powerbombe...7c.zip
windows7-x64
6powerbombe...7c.zip
windows10-2004-x64
1FMODGMS.dll
windows7-x64
1FMODGMS.dll
windows10-2004-x64
1Power Bomberman.exe
windows7-x64
1Power Bomberman.exe
windows10-2004-x64
1SDL.dll
windows7-x64
1SDL.dll
windows10-2004-x64
1data.win
windows7-x64
3data.win
windows10-2004-x64
3fmod.dll
windows7-x64
3fmod.dll
windows10-2004-x64
3joydll.dll
windows7-x64
1joydll.dll
windows10-2004-x64
1Analysis
-
max time kernel
95s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 18:56
Static task
static1
Behavioral task
behavioral1
Sample
powerbomberman077c.zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
powerbomberman077c.zip
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
FMODGMS.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
FMODGMS.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Power Bomberman.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Power Bomberman.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
SDL.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
SDL.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
data.win
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
data.win
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
fmod.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
fmod.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
joydll.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
joydll.dll
Resource
win10v2004-20231222-en
General
-
Target
fmod.dll
-
Size
1.4MB
-
MD5
3399d23de039f78edb383113a81444b5
-
SHA1
6f1463c9e6a9224cc3767257a363ef2e186d00af
-
SHA256
d2e4a4ffcc703ecf3caaf773ea7151976d9fc9d788ab7913b10ebd50d802b43b
-
SHA512
694725abff26e33f40bc20bdef4bd7def3511480700eab0ada9c37b7ccf19dcb9185bf0155b0fd3c6043bb57bd338885acbcb2659ac03f7dde70630280b25457
-
SSDEEP
24576:PdM6IhC21GpMdMl4Y6VkY+Vj0VMFyBUKkN7RI/H0+HTYfVoUju:PdyqMdMl4Ya8j0KbwHwK
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3304 3456 WerFault.exe 90 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2596 wrote to memory of 3456 2596 rundll32.exe 90 PID 2596 wrote to memory of 3456 2596 rundll32.exe 90 PID 2596 wrote to memory of 3456 2596 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fmod.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fmod.dll,#12⤵PID:3456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3456 -s 6723⤵
- Program crash
PID:3304
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3456 -ip 34561⤵PID:3864