Analysis
-
max time kernel
130s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 20:43
Static task
static1
Behavioral task
behavioral1
Sample
Trix_Game/CARD.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Trix_Game/CARD.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Trix_Game/play.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
Trix_Game/play.exe
Resource
win10v2004-20240802-en
General
-
Target
Trix_Game/play.exe
-
Size
1024KB
-
MD5
cd5fc5504009dd2d9d929802643d5fc0
-
SHA1
d2106b7e07898d5f51cdea8b355a785eafc9159d
-
SHA256
2741653bdce096d086f75746a510c2e3a6e2cd23d622d4aab01525cf08c938b0
-
SHA512
f8ca5bd6f0fa00d49995f93ce150ab50a3034c74dcc5f33fd0fb16e3f81d1313d4e49ea950066c09e15b5f4ea8a0ebfa8ac9501016e3247077316769fa0ad0ef
-
SSDEEP
24576:T6QFe1FYhaQfZ5RGGHHLn990W1jEJsIGEMml2j0KzPju:qU+GntVjm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language play.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 396 dw20.exe Token: SeBackupPrivilege 396 dw20.exe Token: SeBackupPrivilege 396 dw20.exe Token: SeBackupPrivilege 396 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2732 wrote to memory of 396 2732 play.exe 88 PID 2732 wrote to memory of 396 2732 play.exe 88 PID 2732 wrote to memory of 396 2732 play.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trix_Game\play.exe"C:\Users\Admin\AppData\Local\Temp\Trix_Game\play.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 9482⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:396
-