Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
23/04/2024, 14:10
Static task
static1
Behavioral task
behavioral1
Sample
c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70.exe
Resource
win11-20240412-en
General
-
Target
c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70.exe
-
Size
2.4MB
-
MD5
55f780ea4dc5a5401b80915d69a55481
-
SHA1
5ebdde7f87637493de0a5e7a4ffcd59839672c4e
-
SHA256
c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70
-
SHA512
680ca9d6f5aa4d53e7083858bfd4d3fc71f567993968edc83ddf262e15b2ed06f07c5a4c47e65f4874074213adf3cd978b8eaa658563694caf013fb126948697
-
SSDEEP
49152:zgwRtL9Hckjh40JEvPXJnxNH0IHK61VW/2t+YKpEv6o2sUX7fEgvr:zgwRB98kj3JCPF71HKAV3+YAEaZ7fEgj
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Executes dropped EXE 12 IoCs
pid Process 2996 GameService.exe 4188 GameService.exe 3304 GameService.exe 2540 GameService.exe 3416 GameServerClient.exe 2436 91361.exe 2036 GameService.exe 2688 GameService.exe 3880 GameService.exe 1280 GameService.exe 668 GameServerClientC.exe 2572 955927.exe -
Loads dropped DLL 1 IoCs
pid Process 2436 91361.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\GameServerClient\GameServerClientC.exe c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70.exe File opened for modification C:\Program Files (x86)\GameServerClient\GameServerClientC.exe c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70.exe File created C:\Program Files (x86)\GameServerClient\installc.bat c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70.exe File opened for modification C:\Program Files (x86)\GameServerClient\GameService.exe c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70.exe File opened for modification C:\Program Files (x86)\GameServerClient\GameServerClient.exe c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70.exe File created C:\Program Files (x86)\GameServerClient\GameService.exe c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70.exe File created C:\Program Files (x86)\GameServerClient\GameServerClient.exe c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70.exe File opened for modification C:\Program Files (x86)\GameServerClient\installc.bat c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70.exe File created C:\Program Files (x86)\GameServerClient\installg.bat c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70.exe File opened for modification C:\Program Files (x86)\GameServerClient\installg.bat c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5084 sc.exe 5116 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1648 wrote to memory of 900 1648 c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70.exe 80 PID 1648 wrote to memory of 900 1648 c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70.exe 80 PID 1648 wrote to memory of 900 1648 c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70.exe 80 PID 900 wrote to memory of 5084 900 cmd.exe 82 PID 900 wrote to memory of 5084 900 cmd.exe 82 PID 900 wrote to memory of 5084 900 cmd.exe 82 PID 900 wrote to memory of 2996 900 cmd.exe 83 PID 900 wrote to memory of 2996 900 cmd.exe 83 PID 900 wrote to memory of 2996 900 cmd.exe 83 PID 900 wrote to memory of 4188 900 cmd.exe 84 PID 900 wrote to memory of 4188 900 cmd.exe 84 PID 900 wrote to memory of 4188 900 cmd.exe 84 PID 900 wrote to memory of 3304 900 cmd.exe 85 PID 900 wrote to memory of 3304 900 cmd.exe 85 PID 900 wrote to memory of 3304 900 cmd.exe 85 PID 2540 wrote to memory of 3416 2540 GameService.exe 88 PID 2540 wrote to memory of 3416 2540 GameService.exe 88 PID 3416 wrote to memory of 2436 3416 GameServerClient.exe 90 PID 3416 wrote to memory of 2436 3416 GameServerClient.exe 90 PID 1648 wrote to memory of 3300 1648 c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70.exe 91 PID 1648 wrote to memory of 3300 1648 c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70.exe 91 PID 1648 wrote to memory of 3300 1648 c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70.exe 91 PID 3300 wrote to memory of 5116 3300 cmd.exe 93 PID 3300 wrote to memory of 5116 3300 cmd.exe 93 PID 3300 wrote to memory of 5116 3300 cmd.exe 93 PID 3300 wrote to memory of 2036 3300 cmd.exe 94 PID 3300 wrote to memory of 2036 3300 cmd.exe 94 PID 3300 wrote to memory of 2036 3300 cmd.exe 94 PID 3300 wrote to memory of 2688 3300 cmd.exe 95 PID 3300 wrote to memory of 2688 3300 cmd.exe 95 PID 3300 wrote to memory of 2688 3300 cmd.exe 95 PID 3300 wrote to memory of 3880 3300 cmd.exe 96 PID 3300 wrote to memory of 3880 3300 cmd.exe 96 PID 3300 wrote to memory of 3880 3300 cmd.exe 96 PID 1280 wrote to memory of 668 1280 GameService.exe 99 PID 1280 wrote to memory of 668 1280 GameService.exe 99 PID 668 wrote to memory of 2572 668 GameServerClientC.exe 100 PID 668 wrote to memory of 2572 668 GameServerClientC.exe 100 PID 1648 wrote to memory of 4876 1648 c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70.exe 101 PID 1648 wrote to memory of 4876 1648 c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70.exe 101 PID 1648 wrote to memory of 4876 1648 c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70.exe"C:\Users\Admin\AppData\Local\Temp\c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameServerClient\installg.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\sc.exeSc delete GameServerClient3⤵
- Launches sc.exe
PID:5084
-
-
C:\Program Files (x86)\GameServerClient\GameService.exeGameService remove GameServerClient confirm3⤵
- Executes dropped EXE
PID:2996
-
-
C:\Program Files (x86)\GameServerClient\GameService.exeGameService install GameServerClient "C:\Program Files (x86)\GameServerClient\GameServerClient.exe"3⤵
- Executes dropped EXE
PID:4188
-
-
C:\Program Files (x86)\GameServerClient\GameService.exeGameService start GameServerClient3⤵
- Executes dropped EXE
PID:3304
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameServerClient\installc.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\SysWOW64\sc.exeSc delete GameServerClientC3⤵
- Launches sc.exe
PID:5116
-
-
C:\Program Files (x86)\GameServerClient\GameService.exeGameService remove GameServerClientC confirm3⤵
- Executes dropped EXE
PID:2036
-
-
C:\Program Files (x86)\GameServerClient\GameService.exeGameService install GameServerClientC "C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"3⤵
- Executes dropped EXE
PID:2688
-
-
C:\Program Files (x86)\GameServerClient\GameService.exeGameService start GameServerClientC3⤵
- Executes dropped EXE
PID:3880
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "2⤵PID:4876
-
-
C:\Program Files (x86)\GameServerClient\GameService.exe"C:\Program Files (x86)\GameServerClient\GameService.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\GameServerClient\GameServerClient.exe"C:\Program Files (x86)\GameServerClient\GameServerClient.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\Temp\91361.exe"C:\Windows\Temp\91361.exe" --list-devices3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2436
-
-
-
C:\Program Files (x86)\GameServerClient\GameService.exe"C:\Program Files (x86)\GameServerClient\GameService.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\Temp\955927.exe"C:\Windows\Temp\955927.exe" --coin BTC -m ADDRESSES -t 0 --range 319e9147380000000:319e91473a0000000 -o xxx0.txt -i C:\Windows\Temp\curjob.bin3⤵
- Executes dropped EXE
PID:2572
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5bf4360d76b38ed71a8ec2391f1985a5f
SHA157d28dc8fd4ac052d0ae32ca22143e7b57733003
SHA2564ebec636d15203378e15cc11967d00cbd17e040db1fca85cf3c10bbf7451adaf
SHA5127b46bc87dc384d8227adf5b538861165fa9efa18e28f2de5c1a1bb1a3a9f6bef29b449706c4d8e637ae9805bb51c8548cb761facf82d1c273d3e3699ae727acd
-
Filesize
13.2MB
MD541b332ddc0b2faad06c4e94f689803af
SHA1f30985161ff56a9a6af7e8c5e666494513e587ba
SHA25649c32c99e5602a6fa8c8d0df198f0e3bb530777384d5103e90630a1b94f65ab0
SHA512808b9c909741ebe64feb24c18b5dd9a802501adaa793670b899cdb26375baa0d35095b74cde768c462a085d76c4129abe7c8523132f5836c4e1ea2b081b755e1
-
Filesize
288KB
MD5d9ec6f3a3b2ac7cd5eef07bd86e3efbc
SHA1e1908caab6f938404af85a7df0f80f877a4d9ee6
SHA256472232ca821b5c2ef562ab07f53638bc2cc82eae84cea13fbe674d6022b6481c
SHA5121b6b8702dca3cb90fe64c4e48f2477045900c5e71dd96b84f673478bab1089febfa186bfc55aebd721ca73db1669145280ebb4e1862d3b9dc21f712cd76a07c4
-
Filesize
244B
MD5a3d3d85bc0b7945908dd1a5eaf6e6266
SHA18979e79895226f2d05f8af1e10b99e8496348131
SHA2563aad1c9feb23c9383ee7e5c8cb966afd262142b2e0124b8e9cda010ea53f24c6
SHA5129184b09bdc10fb3ec981624f286ab4228917f8b1f5cbec7ee875d468c38461395d970d860e3ff99cb184e8839ed6c3ca85a9eaffdd24f15c74b311623c48f618
-
Filesize
238B
MD5b6b57c523f3733580d973f0f79d5c609
SHA12cc30cfd66817274c84f71d46f60d9e578b7bf95
SHA256d8d718641bdf39cca1a5db7bb52d3c66d400a97bef3cafdd81cd7e711a51c570
SHA512d39440163592bc3b1cb7830f236a97d5819c10775e453637d5a04a981e9a336480c6b4701afdceba0d52dfe09413b7abe2ad58ff55b5057a26229f3ccdc3a7c7
-
Filesize
300B
MD5f4642873a793f4d4976f9f8d5202661f
SHA18a9197c6b042f9132cbe1a0170e3f7314dc289e4
SHA2566bba718313322bf326c9dfe517562061ac108eadde857f3e0861fd742cef2cbd
SHA512e6067dee7e8a52b9ca05bf0655891dda222b0fefd68198f02c56b691f65c238198cabb96122967d9fee4c0933c68531530e3c3666edda99fa3a2f5b307455261
-
Filesize
2.0MB
MD55c9e996ee95437c15b8d312932e72529
SHA1eb174c76a8759f4b85765fa24d751846f4a2d2ef
SHA2560eecdbfabaaef36f497e944a6ceb468d01824f3ae6457b4ae4b3ac8e95eebb55
SHA512935102aad64da7eeb3e4b172488b3a0395298d480f885ecedc5d8325f0a9eabeea8ba1ece512753ac170a03016c80ba4990786ab608b4de0b11e6343fbf2192b
-
Filesize
13.1MB
MD5bfe6b13011bbba05c28109cf6730f8a1
SHA128da37544341c3587c11c1f1f294505516434d40
SHA25693fc509fc9fad8d0191ceb7fe43ae7be1ed176862eacf0f905120257b15ecbdd
SHA512d717859dd8b04832588e9ada5f83a8e2953c6214364a189b1b731212a5d4cdd1ac441646339efc9484b38a49d518d70f09624028e0a12921d7f2778fd9982660
-
Filesize
398KB
MD51d7955354884a9058e89bb8ea34415c9
SHA162c046984afd51877ecadad1eca209fda74c8cb1
SHA256111f216aef35f45086888c3f0a30bb9ab48e2b333daeddafd3a76be037a22a6e
SHA5127eb8739841c476cda3cf4c8220998bc8c435c04a89c4bbef27b8f3b904762dede224552b4204d35935562aa73f258c4e0ddb69d065f732cb06cc357796cdd1b2
-
Filesize
40B
MD535b9e9e6454dedaf2a8214d6ab2733c3
SHA16e257cc8dcebe0a21ca72d95c5701d862ed7b3a9
SHA256620bf426190c1e3a0ba6aa5b895d4a66d79d4f52159c297132bb7abc2afbf4ee
SHA512720ddf7a45b8e01cf682f6d91d747e42006c7eb6c4a879d347e95367502eddffeb32b1331513f7b3fec2b4430f38b56d5cf1e88d77c6269ceb12d6c584e2bae0