Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
3BACKUPME.bat
windows7-x64
1BACKUPME.bat
windows10-2004-x64
1DEBUG.vbs
windows7-x64
1DEBUG.vbs
windows10-2004-x64
1DXClipCTRL.vbs
windows7-x64
1DXClipCTRL.vbs
windows10-2004-x64
1DXFightCTRL.vbs
windows7-x64
1DXFightCTRL.vbs
windows10-2004-x64
1DXGame.dll
windows7-x64
3DXGame.dll
windows10-2004-x64
3DXInput.vbs
windows7-x64
1DXInput.vbs
windows10-2004-x64
1DXMovie2CTRL.vbs
windows7-x64
1DXMovie2CTRL.vbs
windows10-2004-x64
1DXMovieCTRL.vbs
windows7-x64
1DXMovieCTRL.vbs
windows10-2004-x64
1DXMovieStruct.vbs
windows7-x64
1DXMovieStruct.vbs
windows10-2004-x64
1DXScreen.vbs
windows7-x64
1DXScreen.vbs
windows10-2004-x64
1DXScreen.vbs
windows7-x64
1DXScreen.vbs
windows10-2004-x64
1DXSfcCTRL.vbs
windows7-x64
1DXSfcCTRL.vbs
windows10-2004-x64
1DXSound.vbs
windows7-x64
1DXSound.vbs
windows10-2004-x64
1DXStoryCTRL.vbs
windows7-x64
1DXStoryCTRL.vbs
windows10-2004-x64
1DXWordCTRL.vbs
windows7-x64
1DXWordCTRL.vbs
windows10-2004-x64
1LOADER.exe
windows7-x64
6LOADER.exe
windows10-2004-x64
6General
-
Target
aed3655ff961f54a06220771fba076cf_JaffaCakes118
-
Size
20.1MB
-
Sample
240820-l76kjawcqe
-
MD5
aed3655ff961f54a06220771fba076cf
-
SHA1
e9d0e8b9e2290df0eb297922d6a98f82e58196f4
-
SHA256
455a31e3e5847bc5cf198d1bd527885a7998b3887c44bba24fbc2c898d2d41a4
-
SHA512
1627fb8de36bb010f9b4ec0be177e95591225d4f6d077f1277b627fb2696c0b08e5d3d5ea73a262a11454e3a1086ee9595f7447db893ca85e4c5e2f59c5df3be
-
SSDEEP
393216:K53zn1IssDf454/rPu7MrhdtLf5baZ/DLRxGof2kr3TRsGIDziK64IyQw:Kd1k4APHhd2Z/D90of/yDziHw
Static task
static1
Behavioral task
behavioral1
Sample
BACKUPME.bat
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
BACKUPME.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
DEBUG.vbs
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
DEBUG.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
DXClipCTRL.vbs
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
DXClipCTRL.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
DXFightCTRL.vbs
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
DXFightCTRL.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
DXGame.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
DXGame.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
DXInput.vbs
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
DXInput.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
DXMovie2CTRL.vbs
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
DXMovie2CTRL.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
DXMovieCTRL.vbs
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
DXMovieCTRL.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
DXMovieStruct.vbs
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
DXMovieStruct.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
DXScreen.vbs
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
DXScreen.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
DXScreen.vbs
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
DXScreen.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
DXSfcCTRL.vbs
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
DXSfcCTRL.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
DXSound.vbs
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
DXSound.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
DXStoryCTRL.vbs
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
DXStoryCTRL.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
DXWordCTRL.vbs
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
DXWordCTRL.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
LOADER.exe
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
LOADER.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
BACKUPME.BAT
-
Size
48B
-
MD5
4bb749ccd5b39170b7958733fec0bfeb
-
SHA1
215bc0ab891ce4040a66d52fddb45c990b571574
-
SHA256
736096e90dffd4530157927ea107b004aefe9861fac8fec42480d6437ee80860
-
SHA512
b7d09681be055994c6f3e8f579684890c390a453e1ef6f10c4f4f776779a6c0a96f633a1a2395a31bffedf569b0292c59bb283f22cdec7d4f5fdc94df1a3bb82
Score1/10 -
-
-
Target
DEBUG.TXT
-
Size
589B
-
MD5
f546c6ff9a6163bf8290f2484d90bd7b
-
SHA1
e3c471e9eec7d4bcc6d82fcb43e25d49bd31cf9e
-
SHA256
919b6f011626d564df2c43c3d6d958010cf180c0095040c10f3a73f373642d3f
-
SHA512
2338f9a86572a7bcc70a89db3d634a8882e365283f2ec0546536236f3eeb28225ec2d033c8503af2b59ba14a8e6376757dc47a6cb0889c9a47456475a7bfa968
Score1/10 -
-
-
Target
DXClipCTRL.cls
-
Size
5KB
-
MD5
0cb8a9adaa9b003c3df503d423866715
-
SHA1
78bc1bda26747c8db503a48a32c7ddd54cd9d84a
-
SHA256
2e4decfcf0fbecf544e9c7136098791710f84ede380053f6731e5bd5c5200bdc
-
SHA512
92d29107f19267180f6df8d01108ae8caa4f7606e0930ae9239df4ff9eda218c9bbf6801cf8ef254011589e44bf59baf4a5105cf9061e78acaf8d67d9185057d
-
SSDEEP
96:tYABLODr+cmV1N/lGyJ8+ai0zDLNH+G+br2kVEBBmV1N/lGyJ8+o4JlTCB+Z38wM:aA9OfmJwyy+kNH+G+br2kVEBBmJwyy+g
Score1/10 -
-
-
Target
DXFightCTRL.cls
-
Size
1KB
-
MD5
5aef4d182133a9bcf77ed4937cb99cca
-
SHA1
6d0c933e1ac3cc3df37e1babebc346f833240e23
-
SHA256
106ff3e28c0a5258ce40d3f3d81ade896a990dcbc569f175955382e61a0e1f66
-
SHA512
c853e9ed52ed083d228d9a8036a42aeb108b5d1f68e35afb9f94ac87b92f26a96bf34b1d94722e38aebc04bfbf2f54888648f36988bac6bb49d3550925db0bb7
Score1/10 -
-
-
Target
DXGame.dll
-
Size
84KB
-
MD5
bf8c230c609cffbe14cee81e5c737d7c
-
SHA1
3d8233bbafea6d554f1da98149ea3bc7bc8358a0
-
SHA256
6af354c620a4237058e6ea795898c12605949fe98a284a793d35474f7dd2e366
-
SHA512
93fa7025c2b6468af82a79a395e3de551ecbe1912d0de92ece0c0ef58cd3dd09557b3e58e9cdc0e9512966756ac5b2f34f4368348a2bc3ad94a6ea60b2546321
-
SSDEEP
1536:7oDXlMT5eAm0gZ2V+n0y7yaH/8p9jOsQZBEvMpvo0xwXGHc1TJn:U1zAmpRQE09jOsQZBEyvo0xGqc19
Score3/10 -
-
-
Target
DXInput.cls
-
Size
884B
-
MD5
a46f972250ea8f16b4010b90a3149559
-
SHA1
c4033508d4cec2561dee6ec69b60189f5959fd4d
-
SHA256
d4da1ae65a9b08544239176d2c387a836fba8a170684adefa0918da98fb9d28d
-
SHA512
5d1767a5b3140fcd47029e0abd29c215dc20fbfaf9a4f4a35e24c4981628bb436fc7e3de028074700c589cf0ddd6246737126b602f4bb7507b00d12762538d7d
Score1/10 -
-
-
Target
DXMovie2CTRL.cls
-
Size
2KB
-
MD5
92fd721501cc9ee74262b28e434c07bc
-
SHA1
3fc12d571687fce940a837b6d4fc729e3ef7d1f0
-
SHA256
6c6d907ea1695f6ddfbd5f4095701f4fcc629225247b8ceeee2f6e5f0fa6befa
-
SHA512
a3a20290506eeeb5e5f29b101e3eb3a32e2b156a9f730e2de5a8f7ca6e1661a59872474094aa6af6b63ce23c37525b5bcff2c6f6459cd83f950a8c00e5d0a6f2
Score1/10 -
-
-
Target
DXMovieCTRL.cls
-
Size
2KB
-
MD5
5eedb8cc8d042941bd110d5874dbfbe8
-
SHA1
d9c09930b5950eb99e763516e7784aaeb1dedff7
-
SHA256
93249c9641de4f81702cb8409df1c18d72a4b20d84d95f51f4fdcd95aac2f5ab
-
SHA512
39d4565aeefcf9bdab3566d3326468b1244a93509ca33348c26ae57fe1b825001f935fbbcb0d0ac5a8ef1e6ac2308e817f4be536390c961b60297ff28aa481df
Score1/10 -
-
-
Target
DXMovieStruct.cls
-
Size
1KB
-
MD5
f17bc944950abe90f1be6af6b894c755
-
SHA1
dbd3d43a1ea7afb0f33fe6459bfc12e81537d9fd
-
SHA256
d4c98d9dd190edd2e361031caf4e9ae8ebeea6e3c6134ab2ac53de07fe648e92
-
SHA512
ffffbd4287cc3c8182e7902a7ec5bfecab2afb7512f92d2a059ba4e25c563faad57ece9c42d273d7848a478d4a9635b8b84063fe28ba1e73cc7356723e6c8f0e
Score1/10 -
-
-
Target
DXScreen.bak
-
Size
7KB
-
MD5
186268ae343ea56d9fd6930fa72c2769
-
SHA1
c8b5e5e983d11d9e666d1584d246660027eebc0e
-
SHA256
b45188d332a13f9264ac31c040d207ce54adee50e13ad2108d6733b14908847e
-
SHA512
f0ab1610db7ede0a5e571ffb436324ca4709a540eb95a53e434f3a72d476e297f60c0199cc2025af590f6674386f698384378055bf49696fa51aea229d94353f
-
SSDEEP
96:tYABNDFYmniQV3qgPxUwHhjjqAKfGGjV7QbEQEIQE14JcOMYnc04JjxUp8wBaP:aA7xn9tWyhjAfGG9Qz/OMgSUpDBaP
Score1/10 -
-
-
Target
DXScreen.cls
-
Size
4KB
-
MD5
e0c82ee7587ab09f85bcb999452d9669
-
SHA1
df4ecd26eff1790860aacca2545a8589907fd3ef
-
SHA256
77b5c72b818964543d9b7869ad71b5859ac94b1d1310e7b27dfc4e1d82fb24c3
-
SHA512
f49eba7682a73fe57177ec704facc61f8943ee55f2149aba58413aec81678213929c8ddea0c87cb81dfe978cbfba44d10af00b182e2eb934a14920a529da7377
-
SSDEEP
96:tYABND8avi1gPxUw+hjSA9fGGJb4dAnc04JjxUp0I:aA7wYWdhj7fGGVDSUpZ
Score1/10 -
-
-
Target
DXSfcCTRL.cls
-
Size
2KB
-
MD5
f8487b418a496092f897d2b492ec256b
-
SHA1
e1df7ea25d8ddd2933d96645cbb6479b4a3de724
-
SHA256
9ffd861fb886c269e55fc88cc3cd4aa31f228bc12c52cb0990fa67010d92d88f
-
SHA512
6095ac002fcfb89e8c798713e706d9519bb72821b4f5b46f4dd92505e812652e4c392b3b99749d7facd8d47d2299b19190c494597375883660cf7ffff3f01bb5
Score1/10 -
-
-
Target
DXSound.cls
-
Size
2KB
-
MD5
7ab9d42c43d0dfff47bf198984f74c80
-
SHA1
d85a19ca9accf8f495658988f66e3e3107b22416
-
SHA256
68d847dfc7fc5fdf269ba6bfeccf59e251490746db2ab3876d22edb2a88af631
-
SHA512
c79794f7ffe1e91a3c41d4620f4e2b2edab0057203b01eb7c79c4ca24d63c6869f944453cc3d121c0ff4113d38f0aa424167459c421a15508b9249f5cd69ba4a
Score1/10 -
-
-
Target
DXStoryCTRL.cls
-
Size
1KB
-
MD5
8e11dfc25367a323f215f80b6668458c
-
SHA1
396baa10c8e75a055ce7c945602215554b0dd69a
-
SHA256
511f5d88183a1b879a3acc9c3babe7e3a0398821dd2ed98f566a5db05532e44e
-
SHA512
380fa1b45ef2154c4117512d047c6abfbbc381c1110c8973f81b7c38cee3c481a1f894bef66f523180dbd8c6ea37f3800cd571fe09677c04c7adea1a49a42427
Score1/10 -
-
-
Target
DXWordCTRL.cls
-
Size
1KB
-
MD5
c5a72fc7030ae7dbbac0175bf1a7f2bd
-
SHA1
f2fd2c3d45bf32c11140b7c2baccf9dcf4954d96
-
SHA256
ec4209bdd0c7ad0a09570c6f2c3902db533d905fa61518f74c66f9a9fddb14c3
-
SHA512
0e3456a2a9d41401413ac0bfc70c7354b4e12e526c0a36f8fffae69b8d5bd754ab5a40f5e037794483314a9a1f08b077c59cb7ede4dee2310cd149cfecf706e3
Score1/10 -
-
-
Target
LOADER.EXE
-
Size
24KB
-
MD5
6e587da9e07f6e1338c4213c458fc15f
-
SHA1
815d870d85690c51f3ef7824e2a8b78b2aa121ee
-
SHA256
7a124c5c5c5b0465614824db5cefe3e41d7deb5e73c632ae4e0b209326ef430e
-
SHA512
5e56640e8fd56b00e9876a3d41cdc9c31bd20a460c2fa75e7c3602062a5210a6e6ae76f94cfdfd83a72864f1a885463efc5fb403174f16b9620974832ef32046
-
SSDEEP
384:/TdXMlgO6p3zyxnDkBIUfHYsZ92K2IrNF7JAyJi/MlgO6p3zyxnDkBIUfHYsZ927:/VMlgO6p3zyxnDkBIUfHYsZ92K2yDtAe
Score6/10-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-