Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 01:52
Static task
static1
Behavioral task
behavioral1
Sample
4cd8586d09ba9e97b4e50bb2d9d1e671a50bfe79bcd29ebf851ae6defc8d1768.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4cd8586d09ba9e97b4e50bb2d9d1e671a50bfe79bcd29ebf851ae6defc8d1768.exe
Resource
win10v2004-20240226-en
General
-
Target
4cd8586d09ba9e97b4e50bb2d9d1e671a50bfe79bcd29ebf851ae6defc8d1768.exe
-
Size
2.4MB
-
MD5
ba7445dd6438c2097c1c5b2ce173c064
-
SHA1
24873c5c09152806caa71b6bb990ef0797e626ae
-
SHA256
4cd8586d09ba9e97b4e50bb2d9d1e671a50bfe79bcd29ebf851ae6defc8d1768
-
SHA512
6cf7d18b51d2ec88d9c76470800cf9b8c1fcb30fe02041be3f3694eb7e2a708a9d96ed7b9aafd5e7fdff5b618d6b1796a80c78c74204e7272b58a7b4f7a84ace
-
SSDEEP
49152:zgwRBNhWLwbYdMsr37tl5oaSeaduub9vdcOMigvOQowQEJHQJPT5NuEj3uWNtiT:zgwRBNhmwbirt02q1r4PFJwJ1fjeWNk
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 4cd8586d09ba9e97b4e50bb2d9d1e671a50bfe79bcd29ebf851ae6defc8d1768.exe -
Executes dropped EXE 12 IoCs
pid Process 4064 GameService.exe 2448 GameService.exe 1448 GameService.exe 3076 GameService.exe 4908 GameClient.exe 644 373091.exe 3560 GameService.exe 1652 GameService.exe 2788 GameService.exe 4028 GameService.exe 3916 GameClientC.exe 3744 771208.exe -
Loads dropped DLL 1 IoCs
pid Process 644 373091.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\GameServerClient\install.bat 4cd8586d09ba9e97b4e50bb2d9d1e671a50bfe79bcd29ebf851ae6defc8d1768.exe File opened for modification C:\Program Files (x86)\GameServerClient\install.bat 4cd8586d09ba9e97b4e50bb2d9d1e671a50bfe79bcd29ebf851ae6defc8d1768.exe File opened for modification C:\Program Files (x86)\GameServerClient\installc.bat 4cd8586d09ba9e97b4e50bb2d9d1e671a50bfe79bcd29ebf851ae6defc8d1768.exe File created C:\Program Files (x86)\GameServerClient\GameClient.exe 4cd8586d09ba9e97b4e50bb2d9d1e671a50bfe79bcd29ebf851ae6defc8d1768.exe File created C:\Program Files (x86)\GameServerClient\GameClientC.exe 4cd8586d09ba9e97b4e50bb2d9d1e671a50bfe79bcd29ebf851ae6defc8d1768.exe File opened for modification C:\Program Files (x86)\GameServerClient\GameClientC.exe 4cd8586d09ba9e97b4e50bb2d9d1e671a50bfe79bcd29ebf851ae6defc8d1768.exe File created C:\Program Files (x86)\GameServerClient\installc.bat 4cd8586d09ba9e97b4e50bb2d9d1e671a50bfe79bcd29ebf851ae6defc8d1768.exe File opened for modification C:\Program Files (x86)\GameServerClient\GameClient.exe 4cd8586d09ba9e97b4e50bb2d9d1e671a50bfe79bcd29ebf851ae6defc8d1768.exe File created C:\Program Files (x86)\GameServerClient\GameService.exe 4cd8586d09ba9e97b4e50bb2d9d1e671a50bfe79bcd29ebf851ae6defc8d1768.exe File opened for modification C:\Program Files (x86)\GameServerClient\GameService.exe 4cd8586d09ba9e97b4e50bb2d9d1e671a50bfe79bcd29ebf851ae6defc8d1768.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4212 sc.exe 1152 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1764 2220 4cd8586d09ba9e97b4e50bb2d9d1e671a50bfe79bcd29ebf851ae6defc8d1768.exe 90 PID 2220 wrote to memory of 1764 2220 4cd8586d09ba9e97b4e50bb2d9d1e671a50bfe79bcd29ebf851ae6defc8d1768.exe 90 PID 2220 wrote to memory of 1764 2220 4cd8586d09ba9e97b4e50bb2d9d1e671a50bfe79bcd29ebf851ae6defc8d1768.exe 90 PID 1764 wrote to memory of 4212 1764 cmd.exe 92 PID 1764 wrote to memory of 4212 1764 cmd.exe 92 PID 1764 wrote to memory of 4212 1764 cmd.exe 92 PID 1764 wrote to memory of 4064 1764 cmd.exe 93 PID 1764 wrote to memory of 4064 1764 cmd.exe 93 PID 1764 wrote to memory of 4064 1764 cmd.exe 93 PID 1764 wrote to memory of 2448 1764 cmd.exe 94 PID 1764 wrote to memory of 2448 1764 cmd.exe 94 PID 1764 wrote to memory of 2448 1764 cmd.exe 94 PID 1764 wrote to memory of 1448 1764 cmd.exe 95 PID 1764 wrote to memory of 1448 1764 cmd.exe 95 PID 1764 wrote to memory of 1448 1764 cmd.exe 95 PID 3076 wrote to memory of 4908 3076 GameService.exe 98 PID 3076 wrote to memory of 4908 3076 GameService.exe 98 PID 4908 wrote to memory of 644 4908 GameClient.exe 99 PID 4908 wrote to memory of 644 4908 GameClient.exe 99 PID 2220 wrote to memory of 3136 2220 4cd8586d09ba9e97b4e50bb2d9d1e671a50bfe79bcd29ebf851ae6defc8d1768.exe 100 PID 2220 wrote to memory of 3136 2220 4cd8586d09ba9e97b4e50bb2d9d1e671a50bfe79bcd29ebf851ae6defc8d1768.exe 100 PID 2220 wrote to memory of 3136 2220 4cd8586d09ba9e97b4e50bb2d9d1e671a50bfe79bcd29ebf851ae6defc8d1768.exe 100 PID 3136 wrote to memory of 1152 3136 cmd.exe 102 PID 3136 wrote to memory of 1152 3136 cmd.exe 102 PID 3136 wrote to memory of 1152 3136 cmd.exe 102 PID 3136 wrote to memory of 3560 3136 cmd.exe 103 PID 3136 wrote to memory of 3560 3136 cmd.exe 103 PID 3136 wrote to memory of 3560 3136 cmd.exe 103 PID 3136 wrote to memory of 1652 3136 cmd.exe 104 PID 3136 wrote to memory of 1652 3136 cmd.exe 104 PID 3136 wrote to memory of 1652 3136 cmd.exe 104 PID 3136 wrote to memory of 2788 3136 cmd.exe 105 PID 3136 wrote to memory of 2788 3136 cmd.exe 105 PID 3136 wrote to memory of 2788 3136 cmd.exe 105 PID 4028 wrote to memory of 3916 4028 GameService.exe 108 PID 4028 wrote to memory of 3916 4028 GameService.exe 108 PID 3916 wrote to memory of 3744 3916 GameClientC.exe 109 PID 3916 wrote to memory of 3744 3916 GameClientC.exe 109 PID 2220 wrote to memory of 4620 2220 4cd8586d09ba9e97b4e50bb2d9d1e671a50bfe79bcd29ebf851ae6defc8d1768.exe 113 PID 2220 wrote to memory of 4620 2220 4cd8586d09ba9e97b4e50bb2d9d1e671a50bfe79bcd29ebf851ae6defc8d1768.exe 113 PID 2220 wrote to memory of 4620 2220 4cd8586d09ba9e97b4e50bb2d9d1e671a50bfe79bcd29ebf851ae6defc8d1768.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cd8586d09ba9e97b4e50bb2d9d1e671a50bfe79bcd29ebf851ae6defc8d1768.exe"C:\Users\Admin\AppData\Local\Temp\4cd8586d09ba9e97b4e50bb2d9d1e671a50bfe79bcd29ebf851ae6defc8d1768.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameServerClient\install.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\sc.exeSc delete GameServerClient3⤵
- Launches sc.exe
PID:4212
-
-
C:\Program Files (x86)\GameServerClient\GameService.exeGameService remove GameServerClient confirm3⤵
- Executes dropped EXE
PID:4064
-
-
C:\Program Files (x86)\GameServerClient\GameService.exeGameService install GameServerClient "C:\Program Files (x86)\GameServerClient\GameClient.exe"3⤵
- Executes dropped EXE
PID:2448
-
-
C:\Program Files (x86)\GameServerClient\GameService.exeGameService start GameServerClient3⤵
- Executes dropped EXE
PID:1448
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameServerClient\installc.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\SysWOW64\sc.exeSc delete GameServerClientC3⤵
- Launches sc.exe
PID:1152
-
-
C:\Program Files (x86)\GameServerClient\GameService.exeGameService remove GameServerClientC confirm3⤵
- Executes dropped EXE
PID:3560
-
-
C:\Program Files (x86)\GameServerClient\GameService.exeGameService install GameServerClientC "C:\Program Files (x86)\GameServerClient\GameClientC.exe"3⤵
- Executes dropped EXE
PID:1652
-
-
C:\Program Files (x86)\GameServerClient\GameService.exeGameService start GameServerClientC3⤵
- Executes dropped EXE
PID:2788
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "2⤵PID:4620
-
-
C:\Program Files (x86)\GameServerClient\GameService.exe"C:\Program Files (x86)\GameServerClient\GameService.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Program Files (x86)\GameServerClient\GameClient.exe"C:\Program Files (x86)\GameServerClient\GameClient.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\Temp\373091.exe"C:\Windows\Temp\373091.exe" --points 512 --out xxx.txt --keyspace 25efb6df800000000:25efb6e0000000000 13zb1hQbWVsc2S7ZTZnP2G4undNNpdh5so 16cJHB8WboGoPCmL28pEsbkJMeMixK56tR3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:644
-
-
-
C:\Program Files (x86)\GameServerClient\GameService.exe"C:\Program Files (x86)\GameServerClient\GameService.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Program Files (x86)\GameServerClient\GameClientC.exe"C:\Program Files (x86)\GameServerClient\GameClientC.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\Temp\771208.exe"C:\Windows\Temp\771208.exe" --coin BTC -m ADDRESSES -t 0 --range 25efb6df800000000:25efb6e0000000000 -o xxx0.txt -i C:\Windows\Temp\curjob.bin3⤵
- Executes dropped EXE
PID:3744
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1348 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:4936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD50fac9d21508e154127a9fd4b90a1ca39
SHA1cb9df00888a37443e6b4f87daf74e591b4dc373a
SHA2566fb647a3af04d0bb02d9925cf974c21be48512ee56eb3275be575dadd1a7aec0
SHA512fdd75a3dceb4dd9083f46ba09a51213779958e440b0f6cf61d63ed9b65964b912bd270f3cc616e795c4d8d36daf19b15ee3f99fbaa827c113ff47477a604480d
-
Filesize
13.2MB
MD5fc63d47dd6b9847ab82f4dd05ed7cb99
SHA1cac41f14caaabef4d89d3311e2314a09f602e256
SHA256864f529a4618eec7e5eff997c66dd5001c75beed21b587bcc492e944fb059a49
SHA512190102bdc8f5794f9fc20ee3402dc1e03e4f8af9c7992a55766e1bfe3a77c8910efc96c63ce2c5c1f0f9429c233cd62420479ca8a53b788e637bee14f9bcc72d
-
Filesize
10.6MB
MD5226061ef93cff7a505f361a82faeff42
SHA1372626582d886512767c1a4998d834f2c1c918f8
SHA256a0ad6913560f5af2ede5b74cfa096239d1b1b4fb3a4335513dec4eb191cbdaa7
SHA51251dd8a09a4d0e28554e89163056d9ba617d21765c20bf4dd9cd69f6326fe7511b6bf163eee6b7b0e935e1a096e28607454771db59b78acf17f74fd42e15b82a2
-
Filesize
288KB
MD5d9ec6f3a3b2ac7cd5eef07bd86e3efbc
SHA1e1908caab6f938404af85a7df0f80f877a4d9ee6
SHA256472232ca821b5c2ef562ab07f53638bc2cc82eae84cea13fbe674d6022b6481c
SHA5121b6b8702dca3cb90fe64c4e48f2477045900c5e71dd96b84f673478bab1089febfa186bfc55aebd721ca73db1669145280ebb4e1862d3b9dc21f712cd76a07c4
-
Filesize
231B
MD5b9ecefec035b92492661437972d20a33
SHA16d694ed7107919baa1da347784b2fb2378f25193
SHA2565c4b3d2bbfc982378155656046dccd2fac16a5f8d2bbf23f5dbc6a6dc8ebfde8
SHA512cf22b003bc370e01c7ce64338bb86dc42a4db4d8357924ba85abd07e2293936ca879d64e35a2b4f3679f281ad112867564ca50054f865525ec7f0cb9c274da99
-
Filesize
238B
MD58b1a66e9898c6054903c6fb23d6c197c
SHA106a2131ac4cd1dcdd7999322e728445e732b265d
SHA2566e36cda60845bbe139f6fa3eaaa71047bb117b74ac47d698bbc526ebf512d025
SHA5120abb0c4214508da7826f604ba164becbd5ea9567595494273c51e4573f3bbe9c51c40e0e5fe0f06d6628743ca55da4ea8b2b9b4348d372c57f0bcbd13449168a
-
Filesize
300B
MD58d8c12c40612f3e58d8f8e6bb45f5c9a
SHA19bab3a51743c885643d3b7f50bbe8c3d4c16c62f
SHA256980b080577f773982b6e79e6311f38c06f18a98c2f0cfa5dd73fee254015dc62
SHA512d6af36a765b1d499be091a61550ed24247be308242f4dd9eb0a9756990aea20cc2d78096798679411cf9a301016d3429b1387889b84114cc0c19300e266c9b5d
-
Filesize
2.0MB
MD55c9e996ee95437c15b8d312932e72529
SHA1eb174c76a8759f4b85765fa24d751846f4a2d2ef
SHA2560eecdbfabaaef36f497e944a6ceb468d01824f3ae6457b4ae4b3ac8e95eebb55
SHA512935102aad64da7eeb3e4b172488b3a0395298d480f885ecedc5d8325f0a9eabeea8ba1ece512753ac170a03016c80ba4990786ab608b4de0b11e6343fbf2192b
-
Filesize
13.1MB
MD5bfe6b13011bbba05c28109cf6730f8a1
SHA128da37544341c3587c11c1f1f294505516434d40
SHA25693fc509fc9fad8d0191ceb7fe43ae7be1ed176862eacf0f905120257b15ecbdd
SHA512d717859dd8b04832588e9ada5f83a8e2953c6214364a189b1b731212a5d4cdd1ac441646339efc9484b38a49d518d70f09624028e0a12921d7f2778fd9982660
-
Filesize
10.4MB
MD5b387059915cf7d1a939e1f41f56c4fa7
SHA1b4e71a94dfbe2ba10ab7741d43c40270f465390e
SHA25671d7c069fdefc96908d13699eeeaa57ed5da4994212a463087983d91cde8bc33
SHA512a4fb43568e27c4b5c46ada48b206773dc747b31764858b6bd8770850c98713464af541d602a0a97241ec80e635a4993fe909970a65548e575588e7bbaacc327e
-
Filesize
398KB
MD51d7955354884a9058e89bb8ea34415c9
SHA162c046984afd51877ecadad1eca209fda74c8cb1
SHA256111f216aef35f45086888c3f0a30bb9ab48e2b333daeddafd3a76be037a22a6e
SHA5127eb8739841c476cda3cf4c8220998bc8c435c04a89c4bbef27b8f3b904762dede224552b4204d35935562aa73f258c4e0ddb69d065f732cb06cc357796cdd1b2
-
Filesize
40B
MD5d935c86a105ddd7787d03e0fd61bb148
SHA1c8a3be929bda73cc9c3d5cd658e47387368aae96
SHA256c1a09eb7a3222a4098149c7bd12616316abb751cb84ee87f98a71c16137e3982
SHA512b719a868f3616e2a635f4de3b71510a83bf3648420ebbc643ab544e39fd2f492e30a142f1f9180715c53646ebf16db1ec51db523638a0a3646c7e52a6e64607b