Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
1savedgames.rar
windows7-x64
3savedgames.rar
windows10-2004-x64
3savedgames...medata
windows7-x64
3savedgames...medata
windows10-2004-x64
3savedgames...medata
windows7-x64
3savedgames...medata
windows10-2004-x64
3savedgames...medata
windows7-x64
3savedgames...medata
windows10-2004-x64
3savedgames...medata
windows7-x64
3savedgames...medata
windows10-2004-x64
3savedgames...medata
windows7-x64
3savedgames...medata
windows10-2004-x64
3savedgames...medata
windows7-x64
3savedgames...medata
windows10-2004-x64
3savedgames...medata
windows7-x64
3savedgames...medata
windows10-2004-x64
3savedgames...medata
windows7-x64
3savedgames...medata
windows10-2004-x64
3savedgames...medata
windows7-x64
3savedgames...medata
windows10-2004-x64
3savedgames...medata
windows7-x64
3savedgames...medata
windows10-2004-x64
3savedgames...medata
windows7-x64
3savedgames...medata
windows10-2004-x64
3savedgames...medata
windows7-x64
3savedgames...medata
windows10-2004-x64
3savedgames...medata
windows7-x64
3savedgames...medata
windows10-2004-x64
3savedgames...medata
windows7-x64
3savedgames...medata
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 17:36
Static task
static1
Behavioral task
behavioral1
Sample
savedgames.rar
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
savedgames.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
savedgames/slot1/dlc01.savegamedata
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
savedgames/slot1/dlc01.savegamedata
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
savedgames/slot1/dlc02.savegamedata
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
savedgames/slot1/dlc02.savegamedata
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
savedgames/slot1/dlc03.savegamedata
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
savedgames/slot1/dlc03.savegamedata
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
savedgames/slot1/dlc04.savegamedata
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
savedgames/slot1/dlc04.savegamedata
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
savedgames/slot1/dlc05.savegamedata
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
savedgames/slot1/dlc05.savegamedata
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
savedgames/slot1/dlc06.savegamedata
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
savedgames/slot1/dlc06.savegamedata
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
savedgames/slot1/dlc07.savegamedata
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
savedgames/slot1/dlc07.savegamedata
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
savedgames/slot1/dlc08.savegamedata
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
savedgames/slot1/dlc08.savegamedata
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
savedgames/slot1/dlc09.savegamedata
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
savedgames/slot1/dlc09.savegamedata
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
savedgames/slot1/dlc10.savegamedata
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
savedgames/slot1/dlc10.savegamedata
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
savedgames/slot1/game01.savegamedata
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
savedgames/slot1/game01.savegamedata
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
savedgames/slot5/feopts01.savegamedata
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
savedgames/slot5/feopts01.savegamedata
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
savedgames/slot5/global01.savegamedata
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
savedgames/slot5/global01.savegamedata
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
savedgames/slot5/opts01.savegamedata
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
savedgames/slot5/opts01.savegamedata
Resource
win10v2004-20240802-en
General
-
Target
savedgames/slot1/dlc03.savegamedata
-
Size
58KB
-
MD5
1003af73d172f8aecc7dceef03eb3b94
-
SHA1
164638f3e7c41170f38848c3ff91fe10721bcbf1
-
SHA256
90e96799410493baa2394dd5351c47cdb0ab337b0098e80aa30fbe8b05d25c02
-
SHA512
f0706370ed2dccef04410df51a25d02b1de67cdf24a7c09f8d475ffd5637220683198babed353309e8e258a82b86f2eb0bbb73b5b2ceec762ba443bfdc370f8f
-
SSDEEP
12:yrFlnaVfsobB0fflJVgki4dEKZ+OfP3VFgjlT:yZlaVQfp0KAO33P4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\savegamedata_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\savegamedata_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\.savegamedata rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\.savegamedata\ = "savegamedata_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\savegamedata_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\savegamedata_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\savegamedata_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\savegamedata_auto_file\ rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2800 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2800 AcroRd32.exe 2800 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2008 2304 cmd.exe 31 PID 2304 wrote to memory of 2008 2304 cmd.exe 31 PID 2304 wrote to memory of 2008 2304 cmd.exe 31 PID 2008 wrote to memory of 2800 2008 rundll32.exe 33 PID 2008 wrote to memory of 2800 2008 rundll32.exe 33 PID 2008 wrote to memory of 2800 2008 rundll32.exe 33 PID 2008 wrote to memory of 2800 2008 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\savedgames\slot1\dlc03.savegamedata1⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\savedgames\slot1\dlc03.savegamedata2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\savedgames\slot1\dlc03.savegamedata"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD599afab5bb95de5eea81a29b6d08db713
SHA184105e890ec6d9e4218a826fdfc47272d3a7bc0d
SHA256558e6dcef00bf133cbde0323b9771d9234a71f1aad00a0632df727efd42d7884
SHA512d209da6f1fe4bb910443a553e36b1622903a5f774da01c6a93c61128f625d83687cfd7f71ec9697176161298f19763d10156c1b338492b2cdc27ee6abf4db28c