Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
5Static
static
3install/Ch...67.exe
windows7-x64
4install/Ch...67.exe
windows10-2004-x64
4noinstall/...ne.exe
windows7-x64
5noinstall/...ne.exe
windows10-2004-x64
5noinstall/...ne.chm
windows7-x64
1noinstall/...ne.chm
windows10-2004-x64
1noinstall/...32.exe
windows7-x64
3noinstall/...32.exe
windows10-2004-x64
3noinstall/...64.exe
windows7-x64
1noinstall/...64.exe
windows10-2004-x64
1noinstall/...er.exe
windows7-x64
3noinstall/...er.exe
windows10-2004-x64
3noinstall/...86.exe
windows7-x64
3noinstall/...86.exe
windows10-2004-x64
3noinstall/...64.exe
windows7-x64
1noinstall/...64.exe
windows10-2004-x64
1noinstall/...86.dll
windows7-x64
3noinstall/...86.dll
windows10-2004-x64
3noinstall/...64.dll
windows7-x64
1noinstall/...64.dll
windows10-2004-x64
1noinstall/...TI.dll
windows7-x64
3noinstall/...TI.dll
windows10-2004-x64
3noinstall/...TI.dll
windows7-x64
1noinstall/...TI.dll
windows10-2004-x64
1noinstall/...32.dll
windows7-x64
5noinstall/...32.dll
windows10-2004-x64
5noinstall/...64.dll
windows7-x64
5noinstall/...64.dll
windows10-2004-x64
5noinstall/...ver.js
windows7-x64
3noinstall/...ver.js
windows10-2004-x64
3noinstall/...ver.js
windows7-x64
3noinstall/...ver.js
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 06:30 UTC
Static task
static1
Behavioral task
behavioral1
Sample
install/CheatEngine67.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
install/CheatEngine67.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
noinstall/Cheat Engine.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
noinstall/Cheat Engine.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
noinstall/CheatEngine.chm
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
noinstall/CheatEngine.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
noinstall/DotNetDataCollector32.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
noinstall/DotNetDataCollector32.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
noinstall/DotNetDataCollector64.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
noinstall/DotNetDataCollector64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
noinstall/Kernelmoduleunloader.exe
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
noinstall/Kernelmoduleunloader.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
noinstall/Tutorial-i386.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
noinstall/Tutorial-i386.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
noinstall/Tutorial-x86_64.exe
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
noinstall/Tutorial-x86_64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
noinstall/allochook-i386.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
noinstall/allochook-i386.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
noinstall/allochook-x86_64.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
noinstall/allochook-x86_64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
noinstall/autorun/dlls/32/CEJVMTI.dll
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
noinstall/autorun/dlls/32/CEJVMTI.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
noinstall/autorun/dlls/64/CEJVMTI.dll
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
noinstall/autorun/dlls/64/CEJVMTI.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
noinstall/autorun/dlls/MonoDataCollector32.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
noinstall/autorun/dlls/MonoDataCollector32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
noinstall/autorun/dlls/MonoDataCollector64.dll
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
noinstall/autorun/dlls/MonoDataCollector64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
noinstall/autorun/dlls/src/Java/CEJVMTI/CEJVMTI/JavaEventServer.js
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
noinstall/autorun/dlls/src/Java/CEJVMTI/CEJVMTI/JavaEventServer.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
noinstall/autorun/dlls/src/Java/CEJVMTI/CEJVMTI/JavaServer.js
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
noinstall/autorun/dlls/src/Java/CEJVMTI/CEJVMTI/JavaServer.js
Resource
win10v2004-20240802-en
General
-
Target
noinstall/autorun/dlls/32/CEJVMTI.dll
-
Size
49KB
-
MD5
b02fa5c8eefbcd010aaac97a94ff62bb
-
SHA1
fd88f2fc529515252cbcab507f322b080853c38b
-
SHA256
7bd0d77fd790215bb67337f9f210b05aaab0193d105b8ff86ec422e9875eb033
-
SHA512
1d18cb2cffbf83ef949c2a34fa28c4e011c623c62ce743c7f320db1acfbd41bea2ea6d3f0d93a34874973fc43367d6562c630f8b7912b22be7ccc61851001a18
-
SSDEEP
768:+B4cf1fqCWPiiyDf+TTmhX2cnX3/OtC2MD0OK9BRbAlQ4z:El38CfKmhXv/Ott20OKvR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2612 2976 rundll32.exe 30 PID 2976 wrote to memory of 2612 2976 rundll32.exe 30 PID 2976 wrote to memory of 2612 2976 rundll32.exe 30 PID 2976 wrote to memory of 2612 2976 rundll32.exe 30 PID 2976 wrote to memory of 2612 2976 rundll32.exe 30 PID 2976 wrote to memory of 2612 2976 rundll32.exe 30 PID 2976 wrote to memory of 2612 2976 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\noinstall\autorun\dlls\32\CEJVMTI.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\noinstall\autorun\dlls\32\CEJVMTI.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2612
-