Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
3powerbombe...7c.zip
windows7-x64
6powerbombe...7c.zip
windows10-2004-x64
1FMODGMS.dll
windows7-x64
1FMODGMS.dll
windows10-2004-x64
1Power Bomberman.exe
windows7-x64
1Power Bomberman.exe
windows10-2004-x64
1SDL.dll
windows7-x64
1SDL.dll
windows10-2004-x64
1data.win
windows7-x64
3data.win
windows10-2004-x64
3fmod.dll
windows7-x64
3fmod.dll
windows10-2004-x64
3joydll.dll
windows7-x64
1joydll.dll
windows10-2004-x64
1Analysis
-
max time kernel
102s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 18:56
Static task
static1
Behavioral task
behavioral1
Sample
powerbomberman077c.zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
powerbomberman077c.zip
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
FMODGMS.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
FMODGMS.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Power Bomberman.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Power Bomberman.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
SDL.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
SDL.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
data.win
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
data.win
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
fmod.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
fmod.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
joydll.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
joydll.dll
Resource
win10v2004-20231222-en
General
-
Target
data.win
-
Size
48.2MB
-
MD5
3c9b62abdbaf0741c244acfb8d9cd3e8
-
SHA1
e1e8a3df77b689f7e533f4b3da5ec08ab66ecd4e
-
SHA256
bada049b1b77f4366a1ca96c968a1f77fe73f3a6b61f3335d7cd3813d52f5869
-
SHA512
1cd41078a71ac090ae9e253ad64be7d4e041fcf398313fbfdce09480d06bb457c667c8072a5176c27f621ecd29a3a2c6e3fa2e3cf56e767746da0b13966c7cd7
-
SSDEEP
393216:QB0/WAcn/P3y+EVuJnOheruyx70xNMWdaS8Nv+p3e2gp1FUJbs+ka3R10:Q+/ISwnOsn70nDdkvm3e2gtgbs+FRG
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\win_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\win_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\win_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.win rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\win_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\win_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.win\ = "win_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\win_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2644 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2644 AcroRd32.exe 2644 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1540 wrote to memory of 1876 1540 cmd.exe 29 PID 1540 wrote to memory of 1876 1540 cmd.exe 29 PID 1540 wrote to memory of 1876 1540 cmd.exe 29 PID 1876 wrote to memory of 2644 1876 rundll32.exe 30 PID 1876 wrote to memory of 2644 1876 rundll32.exe 30 PID 1876 wrote to memory of 2644 1876 rundll32.exe 30 PID 1876 wrote to memory of 2644 1876 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\data.win1⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\data.win2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\data.win"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c843eee57dbb673684040db0d9493b21
SHA1ad6ffa1fdbab42cd9388610e800855a15ff7dacd
SHA256d6c9ca93c4134e5961e607f69b42ede9b0fa3f3b2b0e5cdb2b4bce37de1b685d
SHA512b3c73c4cffeaa579ac30a2a068623635587559b4c8112d1ec2a34ab295c62970077c32b0b72670cc62e8ab1f9301cc526d62faa68cec435ee88b7908d7f01e64