Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
9Static
static
3Nursultan_...24.zip
windows10-1703-x64
1NursultanN...AL.dll
windows10-1703-x64
3NursultanN...64.dll
windows10-1703-x64
3NursultanN...ts.rar
windows10-1703-x64
3NursultanN...oc.dll
windows10-1703-x64
3NursultanN...gl.dll
windows10-1703-x64
3NursultanN...gl.dll
windows10-1703-x64
3NursultanN...tb.dll
windows10-1703-x64
3NursultanN...ft.jar
windows10-1703-x64
7NursultanN...es.rar
windows10-1703-x64
3natives/Nursultan.dll
windows10-1703-x64
5natives/OpenAL.dll
windows10-1703-x64
1natives/SA...64.dll
windows10-1703-x64
1natives/glfw.dll
windows10-1703-x64
1natives/jemalloc.dll
windows10-1703-x64
1natives/lwjgl.dll
windows10-1703-x64
1natives/lw...gl.dll
windows10-1703-x64
1natives/lwjgl_stb.dll
windows10-1703-x64
1natives/lw...fd.dll
windows10-1703-x64
1NursultanN...AR.exe
windows10-1703-x64
3NursultanN...t2.exe
windows10-1703-x64
9Analysis
-
max time kernel
123s -
max time network
159s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23/07/2024, 15:20
Static task
static1
Behavioral task
behavioral1
Sample
Nursultan_FREE_2024.zip
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
NursultanNextgen2024/OpenAL.dll
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
NursultanNextgen2024/SAPIWrapper_x64.dll
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
NursultanNextgen2024/assets.rar
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
NursultanNextgen2024/jemalloc.dll
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
NursultanNextgen2024/lwjgl.dll
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
NursultanNextgen2024/lwjgl_opengl.dll
Resource
win10-20240611-en
Behavioral task
behavioral8
Sample
NursultanNextgen2024/lwjgl_stb.dll
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
NursultanNextgen2024/minecraft.jar
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
NursultanNextgen2024/natives.rar
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
natives/Nursultan.dll
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
natives/OpenAL.dll
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
natives/SAPIWrapper_x64.dll
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
natives/glfw.dll
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
natives/jemalloc.dll
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
natives/lwjgl.dll
Resource
win10-20240404-en
Behavioral task
behavioral17
Sample
natives/lwjgl_opengl.dll
Resource
win10-20240404-en
Behavioral task
behavioral18
Sample
natives/lwjgl_stb.dll
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
natives/lwjgl_tinyfd.dll
Resource
win10-20240611-en
Behavioral task
behavioral20
Sample
NursultanNextgen2024/rar/UnRAR.exe
Resource
win10-20240404-en
General
-
Target
NursultanNextgen2024/jemalloc.dll
-
Size
111KB
-
MD5
726d3ca3bf8bc182bffc9cc126c243ed
-
SHA1
78f043b314a7c8573e6fff69dc558cf1126af225
-
SHA256
c708bc4b3015403a5240bd949bc6b98df97c0cfcf5a9a269e7999c4726b76cbe
-
SHA512
a90bdc4300e3bb72d0e0df072c97cfd380dadfe3e14117616ee9a282865a696b7c5d238363fa472305c936c44449fe751cc4c5ad7e11b85d3a8faf2380a76736
-
SSDEEP
1536:/tUU+1voe+krM51raaETSNBh3okitp6TflKE/lyfW04fEL9Y59C6:b+ZUkrMuHTSNBh3okitQj1lyfWSGu6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 32 wrote to memory of 208 32 rundll32.exe 74 PID 32 wrote to memory of 208 32 rundll32.exe 74 PID 32 wrote to memory of 208 32 rundll32.exe 74
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NursultanNextgen2024\jemalloc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NursultanNextgen2024\jemalloc.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:208
-