Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
3Turb0z's S...0d.dll
windows7-x64
1Turb0z's S...0d.dll
windows10-2004-x64
1Turb0z's S...20.dll
windows7-x64
3Turb0z's S...20.dll
windows10-2004-x64
3Turb0z's S...0d.dll
windows7-x64
1Turb0z's S...0d.dll
windows10-2004-x64
1Turb0z's S...10.dll
windows7-x64
3Turb0z's S...10.dll
windows10-2004-x64
3Turb0z's S...0d.dll
windows7-x64
3Turb0z's S...0d.dll
windows10-2004-x64
3Turb0z's S...20.dll
windows7-x64
3Turb0z's S...20.dll
windows10-2004-x64
3Turb0z's S...0d.dll
windows7-x64
3Turb0z's S...0d.dll
windows10-2004-x64
3Turb0z's S...b8.exe
windows7-x64
1Turb0z's S...b8.exe
windows10-2004-x64
1Analysis
-
max time kernel
93s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 10:04
Static task
static1
Behavioral task
behavioral1
Sample
Turb0z's Simple Mutli Hack [ESP_ Triggerbot_ Aimbot]/msvcp110d.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Turb0z's Simple Mutli Hack [ESP_ Triggerbot_ Aimbot]/msvcp110d.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
Turb0z's Simple Mutli Hack [ESP_ Triggerbot_ Aimbot]/msvcp120.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Turb0z's Simple Mutli Hack [ESP_ Triggerbot_ Aimbot]/msvcp120.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
Turb0z's Simple Mutli Hack [ESP_ Triggerbot_ Aimbot]/msvcp120d.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Turb0z's Simple Mutli Hack [ESP_ Triggerbot_ Aimbot]/msvcp120d.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
Turb0z's Simple Mutli Hack [ESP_ Triggerbot_ Aimbot]/msvcr110.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Turb0z's Simple Mutli Hack [ESP_ Triggerbot_ Aimbot]/msvcr110.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
Turb0z's Simple Mutli Hack [ESP_ Triggerbot_ Aimbot]/msvcr110d.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Turb0z's Simple Mutli Hack [ESP_ Triggerbot_ Aimbot]/msvcr110d.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
Turb0z's Simple Mutli Hack [ESP_ Triggerbot_ Aimbot]/msvcr120.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Turb0z's Simple Mutli Hack [ESP_ Triggerbot_ Aimbot]/msvcr120.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral13
Sample
Turb0z's Simple Mutli Hack [ESP_ Triggerbot_ Aimbot]/msvcr120d.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Turb0z's Simple Mutli Hack [ESP_ Triggerbot_ Aimbot]/msvcr120d.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral15
Sample
Turb0z's Simple Mutli Hack [ESP, Triggerbot, Aimbot]/sNPXnJb8.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Turb0z's Simple Mutli Hack [ESP, Triggerbot, Aimbot]/sNPXnJb8.exe
Resource
win10v2004-20240221-en
General
-
Target
Turb0z's Simple Mutli Hack [ESP_ Triggerbot_ Aimbot]/msvcr110d.dll
-
Size
1.6MB
-
MD5
c4742233d5fd683102d82ae9d7ca24b3
-
SHA1
330917d338dad8f227f2c36a83c14b36107f4dbd
-
SHA256
98b1c9961ce9c1d06d32b0a3a8113fdeb43f3cca2dcc383e0c0bc4fad34168be
-
SHA512
d2ea4c1b19a8077804e00ed040164736841ced4c2c240789abf9eeb6e8415bca8abdbe727ef5feb6ae7fd4796b647de0ad12940f6adffe473f8f3a68115e8b45
-
SSDEEP
24576:IIe7IjHSsROprrsNWy5Gxgkb4/V32H1nx41hPFehSqzed+mTP6ATQLGjqK8GdVm/:IW/9BcxkNewv+qP7X2R
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 5108 3400 WerFault.exe 88 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2992 wrote to memory of 3400 2992 rundll32.exe 88 PID 2992 wrote to memory of 3400 2992 rundll32.exe 88 PID 2992 wrote to memory of 3400 2992 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Turb0z's Simple Mutli Hack [ESP_ Triggerbot_ Aimbot]\msvcr110d.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Turb0z's Simple Mutli Hack [ESP_ Triggerbot_ Aimbot]\msvcr110d.dll",#12⤵PID:3400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3400 -s 6043⤵
- Program crash
PID:5108
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3400 -ip 34001⤵PID:640