Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
38a940b1ec4...18.exe
windows7-x64
38a940b1ec4...18.exe
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Accelerator.dll
windows7-x64
1Accelerator.dll
windows10-2004-x64
1Basicsurvey.exe
windows7-x64
1Basicsurvey.exe
windows10-2004-x64
1MouseHook.dll
windows7-x64
1MouseHook.dll
windows10-2004-x64
1Socks.dll
windows7-x64
1Socks.dll
windows10-2004-x64
1gamebox.exe
windows7-x64
6gamebox.exe
windows10-2004-x64
6tabGame.exe
windows7-x64
1tabGame.exe
windows10-2004-x64
1uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...tn.dll
windows7-x64
3$PLUGINSDI...tn.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 13:23
Static task
static1
Behavioral task
behavioral1
Sample
8a940b1ec4f57d590e1ff230344a88bd_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8a940b1ec4f57d590e1ff230344a88bd_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Accelerator.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
Accelerator.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
Basicsurvey.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Basicsurvey.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
MouseHook.dll
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
MouseHook.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Socks.dll
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
Socks.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
gamebox.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
gamebox.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
tabGame.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
tabGame.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
uninst.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
uninst.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/BgWorker.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240419-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240419-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/SkinBtn.dll
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/SkinBtn.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/SkinProgress.dll
Resource
win7-20240220-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/SkinProgress.dll
Resource
win10v2004-20240426-en
General
-
Target
gamebox.exe
-
Size
2.4MB
-
MD5
4558c36e4df1405ef56126b4af989032
-
SHA1
3a4c7f5687f38343bb64dc5bf166a47bad834a64
-
SHA256
736e05c713ddb370d3f9c4077bea7c10fc88ef0ea1ff6150dbf3e37420ac821e
-
SHA512
169889670777224bcda076770adc51aba7abd9587ad4e16df1c66bd3853bed6adfddf056d2c952219db694a7f45aa8f7b3efac568f3bd81b265d6bd81c51c537
-
SSDEEP
49152:PB0sUqHdNFjIC7iJi7zV4qJRDjbpnVTcFXH+xcJ+81+In9:PYYdNFv7iJi7zhNjb+XH+6
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 gamebox.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main gamebox.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe 2104 gamebox.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 gamebox.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2104 gamebox.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2104 gamebox.exe 2104 gamebox.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\gamebox.exe"C:\Users\Admin\AppData\Local\Temp\gamebox.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87B
MD52372b89205827ff9750972773c2003e9
SHA1a6359c7671474b60db104c9e9613b808294bb1d6
SHA2568d44a49fa303ce149d553de287f0b1b45f0f22c0bd60ce81c248504387fcbb6a
SHA51242ad1a8e069464eae817ce610b7ae3e90c8348721a0801cc3b78dfe416993b6ec65fcfb08a4a3202b76687be8c9c6546b36c1ed79ab4ac46d660006de24c4320
-
Filesize
211B
MD57e24410c1cc00eef38e7ed4b881f31b1
SHA1bbb6241907bcd611a881211d120020d3efbdb592
SHA256b6b3083ff0b1d428f92e176510b3a7a1e5274d9a4ffef0174f1f4e30f4ed2d31
SHA51293c9c45971a42324b3fe0c445d86bae756a248f7e9e9c9ecc60bf1765432978282b2fc814c6071cd5b65946eb5c9b95cc2d45d021eaa6ce5a998d2f55f78154f
-
Filesize
847B
MD5a3aed3f395c042f131a76390f74b3c9d
SHA1d490a5319cbac06f8a06293f085e1c961a42dea6
SHA256dcd6680bfd400614819793b8cae17f47e6dd91b228bbf89230f09a543be5d258
SHA512c7f3a4c50982aa298fa634d30c874f510d124ba448a1251531d6ad50a0e0a3b783d63a5a90730d219ffbf5ef5c2a881bbc54217a5fed99a43985ea39ada05033