Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3GameAssembly.dll
windows7-x64
1GameAssembly.dll
windows10-2004-x64
1RAM.exe
windows7-x64
1RAM.exe
windows10-2004-x64
7RAM_Data/P...ss.dll
windows7-x64
1RAM_Data/P...ss.dll
windows10-2004-x64
1RAM_Data/P...ed.dll
windows7-x64
1RAM_Data/P...ed.dll
windows10-2004-x64
1RAM_Data/R...ources
windows7-x64
1RAM_Data/R...ources
windows10-2004-x64
1RAM_Data/R..._extra
windows7-x64
1RAM_Data/R..._extra
windows10-2004-x64
1RAM_Data/R...s.json
windows7-x64
3RAM_Data/R...s.json
windows10-2004-x64
3RAM_Data/S...s.json
windows7-x64
3RAM_Data/S...s.json
windows10-2004-x64
3RAM_Data/app.info
windows7-x64
3RAM_Data/app.info
windows10-2004-x64
3RAM_Data/boot.config
windows7-x64
3RAM_Data/boot.config
windows10-2004-x64
3RAM_Data/g...nagers
windows7-x64
1RAM_Data/g...nagers
windows10-2004-x64
1RAM_Data/g...assets
windows7-x64
3RAM_Data/g...assets
windows10-2004-x64
3RAM_Data/g...s.ress
windows7-x64
3RAM_Data/g...s.ress
windows10-2004-x64
3RAM_Data/i...ta.dat
windows7-x64
3RAM_Data/i...ta.dat
windows10-2004-x64
3RAM_Data/i...es.dat
windows7-x64
3RAM_Data/i...es.dat
windows10-2004-x64
3RAM_Data/level0
windows7-x64
1RAM_Data/level0
windows10-2004-x64
1Resubmissions
03/02/2024, 06:55
240203-hp5czabeg7 703/02/2024, 06:52
240203-hnee6adhdp 703/02/2024, 06:46
240203-hjl97sbdh3 703/02/2024, 06:41
240203-hfs9cadfhl 303/02/2024, 06:38
240203-hebb5sdffl 303/02/2024, 05:47
240203-gg3nqsaee9 803/02/2024, 05:22
240203-f2tqwscdcm 7Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 06:46
Static task
static1
Behavioral task
behavioral1
Sample
GameAssembly.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GameAssembly.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
RAM.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
RAM.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
RAM_Data/Plugins/x86_64/KS_Diagnostics_Process.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
RAM_Data/Plugins/x86_64/KS_Diagnostics_Process.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
RAM_Data/Plugins/x86_64/lib_burst_generated.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
RAM_Data/Plugins/x86_64/lib_burst_generated.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
RAM_Data/Resources/unity default resources
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
RAM_Data/Resources/unity default resources
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
RAM_Data/Resources/unity_builtin_extra
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
RAM_Data/Resources/unity_builtin_extra
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
RAM_Data/RuntimeInitializeOnLoads.json
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
RAM_Data/RuntimeInitializeOnLoads.json
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
RAM_Data/ScriptingAssemblies.json
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
RAM_Data/ScriptingAssemblies.json
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
RAM_Data/app.info
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
RAM_Data/app.info
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
RAM_Data/boot.config
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
RAM_Data/boot.config
Resource
win10v2004-20231222-en
Behavioral task
behavioral21
Sample
RAM_Data/globalgamemanagers
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
RAM_Data/globalgamemanagers
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
RAM_Data/globalgamemanagers.assets
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
RAM_Data/globalgamemanagers.assets
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
RAM_Data/globalgamemanagers.assets.ress
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
RAM_Data/globalgamemanagers.assets.ress
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
RAM_Data/il2cpp_data/Metadata/global-metadata.dat
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
RAM_Data/il2cpp_data/Metadata/global-metadata.dat
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
RAM_Data/il2cpp_data/Resources/mscorlib.dll-resources.dat
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
RAM_Data/il2cpp_data/Resources/mscorlib.dll-resources.dat
Resource
win10v2004-20231222-en
Behavioral task
behavioral31
Sample
RAM_Data/level0
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
RAM_Data/level0
Resource
win10v2004-20231215-en
General
-
Target
RAM_Data/globalgamemanagers.assets.ress
-
Size
2.7MB
-
MD5
7423e95b309c209a70c3b8112f61d473
-
SHA1
8c8d65e4df4f89c0fa77b5ba6a8ec737113ef592
-
SHA256
39dd38fcd8dd95d41d6d55fe16a448d29fe2c31d9a162c825c24c6d99a893d7a
-
SHA512
617856a9aff5b357085a59ffc6bfd8a107a48ee22849ee190bdc1e81e1bdf9d9be9fb1fdaa5edd89b65ce1fc63a5525731f6526b14379b72c5396fd202d772aa
-
SSDEEP
1536:8nCugW37Qc/WRI5YYt3I/cTj3PzZxwWDPoAw5LoWi:4UW3stRLuxv3PQQQAJ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\ress_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\ress_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\ress_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\.ress rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\.ress\ = "ress_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\ress_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\ress_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\ress_auto_file\ rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1376 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1376 AcroRd32.exe 1376 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2784 2508 cmd.exe 29 PID 2508 wrote to memory of 2784 2508 cmd.exe 29 PID 2508 wrote to memory of 2784 2508 cmd.exe 29 PID 2784 wrote to memory of 1376 2784 rundll32.exe 30 PID 2784 wrote to memory of 1376 2784 rundll32.exe 30 PID 2784 wrote to memory of 1376 2784 rundll32.exe 30 PID 2784 wrote to memory of 1376 2784 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\RAM_Data\globalgamemanagers.assets.ress1⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\RAM_Data\globalgamemanagers.assets.ress2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\RAM_Data\globalgamemanagers.assets.ress"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1376
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD504a69df663848943f5defdafddcd2fed
SHA16a571c235cb3de89a5e48fa0c095882d05cef680
SHA256645d6a7551fa0f4ec7c7f49d815e2565b73e9fb51a046ec6a8d54c74b413f9d4
SHA512052d716a80b627eccc24e29f7961a5b15ee4b788ac93739b44ac6d6f9e09208f8f570debb1958529373a3464f9f6ce72f28db75d4279d4cd32596b46d0ee1cd4