Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
9Static
static
3Nursultan_...24.zip
windows10-1703-x64
1NursultanN...AL.dll
windows10-1703-x64
3NursultanN...64.dll
windows10-1703-x64
3NursultanN...ts.rar
windows10-1703-x64
3NursultanN...oc.dll
windows10-1703-x64
3NursultanN...gl.dll
windows10-1703-x64
3NursultanN...gl.dll
windows10-1703-x64
3NursultanN...tb.dll
windows10-1703-x64
3NursultanN...ft.jar
windows10-1703-x64
7NursultanN...es.rar
windows10-1703-x64
3natives/Nursultan.dll
windows10-1703-x64
5natives/OpenAL.dll
windows10-1703-x64
1natives/SA...64.dll
windows10-1703-x64
1natives/glfw.dll
windows10-1703-x64
1natives/jemalloc.dll
windows10-1703-x64
1natives/lwjgl.dll
windows10-1703-x64
1natives/lw...gl.dll
windows10-1703-x64
1natives/lwjgl_stb.dll
windows10-1703-x64
1natives/lw...fd.dll
windows10-1703-x64
1NursultanN...AR.exe
windows10-1703-x64
3NursultanN...t2.exe
windows10-1703-x64
9Analysis
-
max time kernel
117s -
max time network
126s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23/07/2024, 15:20
Static task
static1
Behavioral task
behavioral1
Sample
Nursultan_FREE_2024.zip
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
NursultanNextgen2024/OpenAL.dll
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
NursultanNextgen2024/SAPIWrapper_x64.dll
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
NursultanNextgen2024/assets.rar
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
NursultanNextgen2024/jemalloc.dll
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
NursultanNextgen2024/lwjgl.dll
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
NursultanNextgen2024/lwjgl_opengl.dll
Resource
win10-20240611-en
Behavioral task
behavioral8
Sample
NursultanNextgen2024/lwjgl_stb.dll
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
NursultanNextgen2024/minecraft.jar
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
NursultanNextgen2024/natives.rar
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
natives/Nursultan.dll
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
natives/OpenAL.dll
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
natives/SAPIWrapper_x64.dll
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
natives/glfw.dll
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
natives/jemalloc.dll
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
natives/lwjgl.dll
Resource
win10-20240404-en
Behavioral task
behavioral17
Sample
natives/lwjgl_opengl.dll
Resource
win10-20240404-en
Behavioral task
behavioral18
Sample
natives/lwjgl_stb.dll
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
natives/lwjgl_tinyfd.dll
Resource
win10-20240611-en
Behavioral task
behavioral20
Sample
NursultanNextgen2024/rar/UnRAR.exe
Resource
win10-20240404-en
General
-
Target
NursultanNextgen2024/minecraft.jar
-
Size
36.6MB
-
MD5
1bc56c1c09bb5d108365c0992291f5c6
-
SHA1
7c47e8db8b527b256520499033f0c39ab2fee449
-
SHA256
15788f4491bbaefd419c7a152a2ce35e59ad827218260a10430a2fcf23e30cf6
-
SHA512
a283f96cc878a88125cdb1e959f17044ddcb4031e566f4a3273012e4cbfc568004b2a25c54896b104fe0ede950193b518f6be283de260679871e8860ea88c86d
-
SSDEEP
786432:J67l/W65D0Dspv3aagZb+1VBy3W8B4YrA2ysrjAAi81iVZV6zihX1:el/94Y93gb+1VAP4YrA2y5AnCZVrf
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4828 icacls.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini bcastdvr.exe -
pid Process 2416 GameBarPresenceWriter.exe -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags GamePanel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 GamePanel.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags GamePanel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_QEMU&PROD_HARDDISK\4&215468A5&0&000000 GamePanel.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1572 wrote to memory of 4828 1572 java.exe 77 PID 1572 wrote to memory of 4828 1572 java.exe 77
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\NursultanNextgen2024\minecraft.jar1⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:4828
-
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵
- Network Service Discovery
PID:2416
-
C:\Windows\System32\GamePanel.exe"C:\Windows\System32\GamePanel.exe" 000000000005022A /startuptips1⤵
- Checks SCSI registry key(s)
PID:5104
-
C:\Windows\System32\bcastdvr.exe"C:\Windows\System32\bcastdvr.exe" -ServerName:Windows.Media.Capture.Internal.BroadcastDVRServer1⤵
- Drops desktop.ini file(s)
PID:3648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD517e02a37fa13cdcbf03690577069044e
SHA12400158c754aae149ce47bb0c2b09ba963c6c2ed
SHA2569214cfb5e0a952dbc6770a67a53e491ab794cc6d4e2161f00b560d7432d8e6fc
SHA512ab9f87c234e9a6cf31935fd1eedc3b0e58731d005dfc0a66338600e47d31308abca01280690a3d400c9125b54669ec062a7ca99482bbc9166dfc201857a828e0
-
Filesize
190B
MD5b0d27eaec71f1cd73b015f5ceeb15f9d
SHA162264f8b5c2f5034a1e4143df6e8c787165fbc2f
SHA25686d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2
SHA5127b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c