Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 09:15
Static task
static1
Behavioral task
behavioral1
Sample
StarWars_BF2+10Tr_LNG.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
StarWars_BF2+10Tr_LNG.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
游侠NETSHOW论坛.url
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
游侠NETSHOW论坛.url
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
游侠网热门单机游戏.url
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
游侠网热门单机游戏.url
Resource
win10v2004-20240226-en
General
-
Target
StarWars_BF2+10Tr_LNG.exe
-
Size
4.1MB
-
MD5
36ce029a2a538952103215b6b1cc22cb
-
SHA1
e754e0634fb7180de95ac03c099201d980aeed2f
-
SHA256
2ffb4ad5556ecb639810dfb93edeb36100bb126aec070f556e7a050bc8fba904
-
SHA512
8a84ab3ae03e11c43c5dc5517954ef1e614a05ae3436f48345eabe041cf67905bf9c3a44d25823a251724c87a62808f3bef9716ca4e34b47e60b32bf03fff8aa
-
SSDEEP
49152:bD9dELynFZbb/LKDfkvNWpiTOMxoYGQlAkxpP2vrXG6+WZpU8odkw:lW4CkvLoYGQlAkxpP2vrXG6+
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe 1712 StarWars_BF2+10Tr_LNG.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1712 StarWars_BF2+10Tr_LNG.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1712 StarWars_BF2+10Tr_LNG.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1712 StarWars_BF2+10Tr_LNG.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\StarWars_BF2+10Tr_LNG.exe"C:\Users\Admin\AppData\Local\Temp\StarWars_BF2+10Tr_LNG.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1712
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
632KB
MD5ddc305fca2a8d80523ad8bc50996480b
SHA17bee723b565267aa355ad9f7f5cf17c74f2cce1f
SHA256af9e46b70c7739547739ddfcdd56b7b218b5bda6e14c49bed3bbc08c2b867216
SHA512acf2064d1b59d73cc5086f9a8c26a5e1fb7e7909e5460d3427d7681ee36709a568146000bbea9464fb173df474c58bda4f87bbbb759ea06ed2fd71d3c6bc0eea
-
Filesize
832KB
MD56aab5c90d7c703ed4aefd5100c97fd22
SHA1b6bb0a5614da9565d5ef2a5a23aa0aaa5bd5b3f0
SHA2561b796196d9ae7b15507546d53a2b5aeae36e5b80e6291f02317f6fedab18d74a
SHA5126c1c1cc6da08f49d15f6cbbadc81bdfaa4251d9ecc9321e0de474141534b42f2bc4c4ada053ace81e07635478f945d2266466f45f9e55c3c924c974d86c26251
-
Filesize
66KB
MD5c74d260d388f5ac3d95d8c1c3a27c989
SHA15da009086036004a7c670d608d5e1e923aead568
SHA256dc1bebb8ce88d59e4b3130c1ff2c4b7f5df2701c7a71b476b8a6f2ed541db628
SHA5126460db8f73806017d267c0e4e112902956a3bc53853c6a893cff66fe44772305b2c158ef8b58e993806d713aceaddcf2efa7ccf625063678444d3fd20b10546a
-
Filesize
218KB
MD582dbc53c4e057ad941eb73aba212956e
SHA138a582ce5fbe03e8c5f040d82f89b4797e305860
SHA256eda3f66eedc49ff9b9506c1ccf679a7822104c771eaab3afa367f0d6a2c9bbd5
SHA5126f8e9082750c9cc8eb7bcaf7b7442f52ec55e2b712fff29a3a22868218fbfd605b594314e7be2720fd25f5a89d95774481177429de35acb48d023d39a2767781