Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
3powerbombe...7c.zip
windows7-x64
6powerbombe...7c.zip
windows10-2004-x64
1FMODGMS.dll
windows7-x64
1FMODGMS.dll
windows10-2004-x64
1Power Bomberman.exe
windows7-x64
1Power Bomberman.exe
windows10-2004-x64
1SDL.dll
windows7-x64
1SDL.dll
windows10-2004-x64
1data.win
windows7-x64
3data.win
windows10-2004-x64
3fmod.dll
windows7-x64
3fmod.dll
windows10-2004-x64
3joydll.dll
windows7-x64
1joydll.dll
windows10-2004-x64
1Analysis
-
max time kernel
135s -
max time network
165s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 18:56
Static task
static1
Behavioral task
behavioral1
Sample
powerbomberman077c.zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
powerbomberman077c.zip
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
FMODGMS.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
FMODGMS.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Power Bomberman.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Power Bomberman.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
SDL.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
SDL.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
data.win
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
data.win
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
fmod.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
fmod.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
joydll.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
joydll.dll
Resource
win10v2004-20231222-en
General
-
Target
FMODGMS.dll
-
Size
180KB
-
MD5
be68f44a1b532da3ec52ca1ba4c6d7d4
-
SHA1
214e6c4ed11b10db523718e2f1fbf16ad7a24de3
-
SHA256
9d1de6c1e9262048eb4c417ed9fe497cc7548ede802475f079345c0f7cd9335c
-
SHA512
e94a2eb628c1bd3f7bae2c311c3b74c4cb159cf16ce2d45bfeea9fb8233b31711fbdd3d51ff9b5cd5e2e9fd0877faa349481afd8817a50b800ce7ce26b65a859
-
SSDEEP
3072:NAucEC4pE4a8bsP/f3A/0n72LRGkYu9biUXI/yfnGsAg0FuXVrt73VBDrSYg:KucECtq0n34kCLQkYEmRPsAOFrJlprSF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2732 chrome.exe 2732 chrome.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2164 2188 rundll32.exe 28 PID 2188 wrote to memory of 2164 2188 rundll32.exe 28 PID 2188 wrote to memory of 2164 2188 rundll32.exe 28 PID 2188 wrote to memory of 2164 2188 rundll32.exe 28 PID 2188 wrote to memory of 2164 2188 rundll32.exe 28 PID 2188 wrote to memory of 2164 2188 rundll32.exe 28 PID 2188 wrote to memory of 2164 2188 rundll32.exe 28 PID 2732 wrote to memory of 1912 2732 chrome.exe 32 PID 2732 wrote to memory of 1912 2732 chrome.exe 32 PID 2732 wrote to memory of 1912 2732 chrome.exe 32 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 1816 2732 chrome.exe 34 PID 2732 wrote to memory of 872 2732 chrome.exe 35 PID 2732 wrote to memory of 872 2732 chrome.exe 35 PID 2732 wrote to memory of 872 2732 chrome.exe 35 PID 2732 wrote to memory of 2968 2732 chrome.exe 36 PID 2732 wrote to memory of 2968 2732 chrome.exe 36 PID 2732 wrote to memory of 2968 2732 chrome.exe 36 PID 2732 wrote to memory of 2968 2732 chrome.exe 36 PID 2732 wrote to memory of 2968 2732 chrome.exe 36 PID 2732 wrote to memory of 2968 2732 chrome.exe 36 PID 2732 wrote to memory of 2968 2732 chrome.exe 36 PID 2732 wrote to memory of 2968 2732 chrome.exe 36 PID 2732 wrote to memory of 2968 2732 chrome.exe 36 PID 2732 wrote to memory of 2968 2732 chrome.exe 36 PID 2732 wrote to memory of 2968 2732 chrome.exe 36 PID 2732 wrote to memory of 2968 2732 chrome.exe 36
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\FMODGMS.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\FMODGMS.dll,#12⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6c89758,0x7fef6c89768,0x7fef6c897782⤵PID:1912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1120 --field-trial-handle=1236,i,13120484540343001793,4227821610251809098,131072 /prefetch:22⤵PID:1816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1576 --field-trial-handle=1236,i,13120484540343001793,4227821610251809098,131072 /prefetch:82⤵PID:872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1644 --field-trial-handle=1236,i,13120484540343001793,4227821610251809098,131072 /prefetch:82⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2184 --field-trial-handle=1236,i,13120484540343001793,4227821610251809098,131072 /prefetch:12⤵PID:488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2168 --field-trial-handle=1236,i,13120484540343001793,4227821610251809098,131072 /prefetch:12⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3308 --field-trial-handle=1236,i,13120484540343001793,4227821610251809098,131072 /prefetch:22⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1116 --field-trial-handle=1236,i,13120484540343001793,4227821610251809098,131072 /prefetch:12⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3500 --field-trial-handle=1236,i,13120484540343001793,4227821610251809098,131072 /prefetch:82⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3628 --field-trial-handle=1236,i,13120484540343001793,4227821610251809098,131072 /prefetch:82⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:2852
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13fc67688,0x13fc67698,0x13fc676a83⤵PID:2556
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3916 --field-trial-handle=1236,i,13120484540343001793,4227821610251809098,131072 /prefetch:82⤵PID:2708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4036 --field-trial-handle=1236,i,13120484540343001793,4227821610251809098,131072 /prefetch:12⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2576 --field-trial-handle=1236,i,13120484540343001793,4227821610251809098,131072 /prefetch:12⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD55036f7c363373f5d9cc2b6519806feae
SHA13caf2148a2eb7c82f9aff0f3a2f4594ee70327bf
SHA256715c5d3e3839c1b47c3008e8a89f929e60858ee379724a20775003c692e9fd6c
SHA5124661cd6fb02dccc48a42fe127b1e88f7e794cd4eb1d8a5a8f5075f772dad63211efa349bab579c5bb81bfb2c4b1be201c6725a56f617f8913a2235e3565fe645
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD5f5d718c6ea831c005618b6ea51750d1f
SHA12c56aec825fd1819fb7b171493dba05f8c7e3bd6
SHA2564010f622e6da84dd027699aa4a3164c624c0a7416bcd8234d576a199636b67ef
SHA512dd2594e29703bb692549329cc81e4e831bd49758b2f42aa50dfc8bea5bde0125dba0502e0d1bf17d9c3fe86228c0060fbbe2b7634c118909c29b3c6380a16781
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2