Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
52s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 21:39
Behavioral task
behavioral1
Sample
release8-2-24/release/main/cheat.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
release8-2-24/release/main/cheat.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
release8-2-24/release/main/loader.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
release8-2-24/release/main/loader.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
release8-2-24/release/map/Map.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
release8-2-24/release/map/Map.exe
Resource
win10v2004-20240802-en
General
-
Target
release8-2-24/release/main/cheat.exe
-
Size
4.1MB
-
MD5
6b3a57759fbc362815348b8ce1475519
-
SHA1
c340a5ae66aeb79a9dd4f8b69a5161fe4d9fa0fd
-
SHA256
c218e0e1188dd4b7504a38031af9eeb268ad39d9fa64abd7b0813379a44e8cce
-
SHA512
465416ae68f3b7616d917ee05bc5098aeb8ded7477cc74a46a7c5a74941dce29a4ebdb4dfc016bfaed736a8066923d9c51e5c8bf515d6b1017622f656dbe49f0
-
SSDEEP
98304:VC96wN+PReiGh9iHzYLKy8D1oota/wfSvEYMnRVSAMJwYNIdT:OaGh9iHzYZ8D1vtMwfSvJAINIdT
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cheat.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\frAQBc8Wsa1xVPfv\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\frAQBc8Wsa1xVPfv" cheat.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cheat.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cheat.exe -
resource yara_rule behavioral1/memory/2292-0-0x000000013F750000-0x00000001401FC000-memory.dmp themida behavioral1/memory/2292-2-0x000000013F750000-0x00000001401FC000-memory.dmp themida behavioral1/memory/2292-3-0x000000013F750000-0x00000001401FC000-memory.dmp themida behavioral1/memory/2292-4-0x000000013F750000-0x00000001401FC000-memory.dmp themida behavioral1/memory/2292-6-0x000000013F750000-0x00000001401FC000-memory.dmp themida behavioral1/memory/2292-7-0x000000013F750000-0x00000001401FC000-memory.dmp themida behavioral1/memory/2292-5-0x000000013F750000-0x00000001401FC000-memory.dmp themida behavioral1/memory/2292-8-0x000000013F750000-0x00000001401FC000-memory.dmp themida behavioral1/memory/2292-10-0x000000013F750000-0x00000001401FC000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cheat.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2292 cheat.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2292 cheat.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 2292 cheat.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2664 2292 cheat.exe 30 PID 2292 wrote to memory of 2664 2292 cheat.exe 30 PID 2292 wrote to memory of 2664 2292 cheat.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\release8-2-24\release\main\cheat.exe"C:\Users\Admin\AppData\Local\Temp\release8-2-24\release\main\cheat.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Sets service image path in registry
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2292 -s 8762⤵PID:2664
-