Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 17:23
Static task
static1
Behavioral task
behavioral1
Sample
Self-Activator_Gamekeys_biz/START_INTERFACE.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Self-Activator_Gamekeys_biz/START_INTERFACE.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Self-Activator_Gamekeys_biz/vpn_pl.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
Self-Activator_Gamekeys_biz/vpn_pl.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Self-Activator_Gamekeys_biz/vpn_ru.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Self-Activator_Gamekeys_biz/vpn_ru.exe
Resource
win10v2004-20240802-en
General
-
Target
Self-Activator_Gamekeys_biz/vpn_pl.exe
-
Size
31KB
-
MD5
4d654caf87aef53b1f70da9ea7390daa
-
SHA1
4f2b05837ec2ce31508a036ff91ccd73c92bf40b
-
SHA256
ade6cd3f8f8b38b7925f6787b0a7494441d783e7fbcc40ecc78b3ee1ab2e4229
-
SHA512
b366a1c9e73101494417a3d1233429f800a4942bb94b23bcb76c13647a2cc042f0149a030ff0887e8c50335b018bd208cc4778bff891f86f63f48127abc7ca19
-
SSDEEP
768:Kodef6PAs68pfZP04YsubvbtbKxHVCZRSLiDSFDh/aSk1vmm4:KodeiPfJxYfK86GmDh/aQm
Malware Config
Signatures
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2604 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2604 PING.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3012 wrote to memory of 1744 3012 vpn_pl.exe 31 PID 3012 wrote to memory of 1744 3012 vpn_pl.exe 31 PID 3012 wrote to memory of 1744 3012 vpn_pl.exe 31 PID 1744 wrote to memory of 2568 1744 cmd.exe 32 PID 1744 wrote to memory of 2568 1744 cmd.exe 32 PID 1744 wrote to memory of 2568 1744 cmd.exe 32 PID 1744 wrote to memory of 2604 1744 cmd.exe 33 PID 1744 wrote to memory of 2604 1744 cmd.exe 33 PID 1744 wrote to memory of 2604 1744 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Self-Activator_Gamekeys_biz\vpn_pl.exe"C:\Users\Admin\AppData\Local\Temp\Self-Activator_Gamekeys_biz\vpn_pl.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1FA1.tmp\vpn_pl.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\system32\rasdial.exerasdial vpn-pl.overplay.co nothingname gamekeysbiz /phonebook:..\Self-Activator_Gamekeys_biz\rasphone.pbk3⤵PID:2568
-
-
C:\Windows\system32\PING.EXEping -n 600 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2604
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388B
MD52f8cc3cc6ff3b44c30663d1d9e4634b3
SHA1c149a5ae4df78434f270ac1194b6e16b8c048358
SHA25692155a9602d76629c3bd6d54049a28a82aa50aeb784a372e56bc9fc6a9742112
SHA5125bb63c643b039956cac582361d8d110cbafc24a79222c96b440463cb97b75f7413252178b12d0e48b76aebc593ae989f9c99a3d184e6d7fec9f7f66f0392d783