Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
3AIO [EXTRA...ip.dll
windows7-x64
3AIO [EXTRA...ip.dll
windows10-2004-x64
1AIO [EXTRA...ip.exe
windows7-x64
8AIO [EXTRA...ip.exe
windows10-2004-x64
8Script (3....n).lnk
windows7-x64
3Script (3....n).lnk
windows10-2004-x64
3Script (3....gscbin
windows7-x64
3Script (3....gscbin
windows10-2004-x64
3To game fo...re.exe
windows7-x64
1To game fo...re.exe
windows10-2004-x64
1To game fo...ta.bin
windows7-x64
3To game fo...ta.bin
windows10-2004-x64
3To game fo...50.vdf
windows7-x64
3To game fo...50.vdf
windows10-2004-x64
3Analysis
-
max time kernel
102s -
max time network
22s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 16:20
Static task
static1
Behavioral task
behavioral1
Sample
AIO [EXTRACT]/noclip.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
AIO [EXTRACT]/noclip.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
AIO [EXTRACT]/noclip.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
AIO [EXTRACT]/noclip.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Script (3.2a)/Shortcut (scripts location).lnk
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
Script (3.2a)/Shortcut (scripts location).lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Script (3.2a)/scripts/script.gscbin
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Script (3.2a)/scripts/script.gscbin
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
To game folder/ModernWarfare.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
To game folder/ModernWarfare.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
To game folder/bootstrap.data.bin
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
To game folder/bootstrap.data.bin
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
To game folder/installscript_2000950.vdf
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
To game folder/installscript_2000950.vdf
Resource
win10v2004-20240802-en
General
-
Target
To game folder/installscript_2000950.vdf
-
Size
1KB
-
MD5
0ddce2357225bf8f7203d42729e76778
-
SHA1
6948f4c55cd9d212a064e9fb487de39c38fef3dd
-
SHA256
cdd7f980d4b4a3f419473bf300d904a4be68eab2c45cc7fc3bce78a54524e7aa
-
SHA512
dad903af80c50639cf1a35cfabf1bd3b930656ae31cbfa593706ddae8f28f315c98dc0aef40c9d03822534fee6466bf164fa0cdc3568d4dc5ab2d4196e9cc283
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\vdf_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\.vdf rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\vdf_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\vdf_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\vdf_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\.vdf\ = "vdf_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\vdf_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\vdf_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2816 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2816 AcroRd32.exe 2816 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2536 wrote to memory of 3000 2536 cmd.exe 30 PID 2536 wrote to memory of 3000 2536 cmd.exe 30 PID 2536 wrote to memory of 3000 2536 cmd.exe 30 PID 3000 wrote to memory of 2816 3000 rundll32.exe 31 PID 3000 wrote to memory of 2816 3000 rundll32.exe 31 PID 3000 wrote to memory of 2816 3000 rundll32.exe 31 PID 3000 wrote to memory of 2816 3000 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\To game folder\installscript_2000950.vdf"1⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\To game folder\installscript_2000950.vdf2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\To game folder\installscript_2000950.vdf"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2816
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD506efa615a4a1838b19813fb8ff459be8
SHA13b5c7c07b937e54f0594fb4b54905de8b1d9a315
SHA2566c9fd5ee8e29849b121e3c53908d7aa815004491a59c93df74fac90f64acc00b
SHA5120a02ac0773371217dfb70e156edc250dc77d8625de9732a271bf5000b6cefc9f75e54581c919fe200297932701bdeff2fdf4a3be5a929a35e2e981c78a53417b