Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
37c351dbf29...18.exe
windows7-x64
77c351dbf29...18.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...se.rtf
windows7-x64
4$PLUGINSDI...se.rtf
windows10-2004-x64
1$PLUGINSDI...tn.dll
windows7-x64
3$PLUGINSDI...tn.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...oc.dll
windows7-x64
3$PLUGINSDI...oc.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$_47_/Web/error.html
windows7-x64
1$_47_/Web/error.html
windows10-2004-x64
1Accelerator.dll
windows7-x64
1Accelerator.dll
windows10-2004-x64
1Basicsurvey.exe
windows7-x64
1Basicsurvey.exe
windows10-2004-x64
1BoxDoctor.exe
windows7-x64
1BoxDoctor.exe
windows10-2004-x64
1MouseHook.dll
windows7-x64
1MouseHook.dll
windows10-2004-x64
1Socks.dll
windows7-x64
1Socks.dll
windows10-2004-x64
1gamebox.exe
windows7-x64
6gamebox.exe
windows10-2004-x64
6Analysis
-
max time kernel
138s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 07:39
Static task
static1
Behavioral task
behavioral1
Sample
7c351dbf294d5cd8f857e2b4e221d097_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7c351dbf294d5cd8f857e2b4e221d097_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/License.rtf
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/License.rtf
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/SkinBtn.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/SkinBtn.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/SkinProgress.dll
Resource
win7-20240419-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/SkinProgress.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/WndProc.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/WndProc.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
$_47_/Web/error.html
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
$_47_/Web/error.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
Accelerator.dll
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
Accelerator.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
Basicsurvey.exe
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
Basicsurvey.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
BoxDoctor.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
BoxDoctor.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
MouseHook.dll
Resource
win7-20240419-en
Behavioral task
behavioral28
Sample
MouseHook.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral29
Sample
Socks.dll
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
Socks.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
gamebox.exe
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
gamebox.exe
Resource
win10v2004-20240426-en
General
-
Target
gamebox.exe
-
Size
2.8MB
-
MD5
b165f9c47b5ce6d45bdf892a3bc1bdcc
-
SHA1
17c112a2267deb9e84dcd20c6d9cc5018073eb4f
-
SHA256
31b07b764a2990629b0072e8d5148cfb8f731a38a13477629994e41d881c2130
-
SHA512
32134928bf1a1ddf9a0b4fa9c80c9bb43d28921edb074653cdbd721f91eef28f03bd8f9aa508f97d9adfcdd5447cff9a60c232064e3fd4375bba6d9386f1f7bb
-
SSDEEP
49152:vRLoo8J+cSPDzOKjTrJM/I31lQND4Aml8bee5WmL7iTPDTNXH+Set69mzSed:vJV2+cSr6Kjq/IAND91Ce5vXeXH+Su
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 gamebox.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main gamebox.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe 2324 gamebox.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 gamebox.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2324 gamebox.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2324 gamebox.exe 2324 gamebox.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\gamebox.exe"C:\Users\Admin\AppData\Local\Temp\gamebox.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211B
MD57e24410c1cc00eef38e7ed4b881f31b1
SHA1bbb6241907bcd611a881211d120020d3efbdb592
SHA256b6b3083ff0b1d428f92e176510b3a7a1e5274d9a4ffef0174f1f4e30f4ed2d31
SHA51293c9c45971a42324b3fe0c445d86bae756a248f7e9e9c9ecc60bf1765432978282b2fc814c6071cd5b65946eb5c9b95cc2d45d021eaa6ce5a998d2f55f78154f
-
Filesize
847B
MD5a3aed3f395c042f131a76390f74b3c9d
SHA1d490a5319cbac06f8a06293f085e1c961a42dea6
SHA256dcd6680bfd400614819793b8cae17f47e6dd91b228bbf89230f09a543be5d258
SHA512c7f3a4c50982aa298fa634d30c874f510d124ba448a1251531d6ad50a0e0a3b783d63a5a90730d219ffbf5ef5c2a881bbc54217a5fed99a43985ea39ada05033