Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
6Beholder_ ...re.zip
windows7-x64
1Beholder_ ...re.zip
windows10-2004-x64
1Android/ob...ee.zip
windows7-x64
1Android/ob...ee.zip
windows10-2004-x64
1assets/Logo/logo1.mp4
windows7-x64
1assets/Logo/logo1.mp4
windows10-2004-x64
6assets/Logo/logo2.mp4
windows7-x64
1assets/Logo/logo2.mp4
windows10-2004-x64
6assets/Uni...n.json
windows7-x64
3assets/Uni...n.json
windows10-2004-x64
3assets/bin...000000
windows7-x64
1assets/bin...000000
windows10-2004-x64
1assets/bin...6cd535
windows7-x64
1assets/bin...6cd535
windows10-2004-x64
1assets/bin...23b72b
windows7-x64
1assets/bin...23b72b
windows10-2004-x64
1assets/bin...247a10
windows7-x64
1assets/bin...247a10
windows10-2004-x64
1assets/bin...45cca7
windows7-x64
1assets/bin...45cca7
windows10-2004-x64
1assets/bin...65105d
windows7-x64
1assets/bin...65105d
windows10-2004-x64
1assets/bin...6d79f6
windows7-x64
1assets/bin...6d79f6
windows10-2004-x64
1assets/bin...9897ac
windows7-x64
1assets/bin...9897ac
windows10-2004-x64
1assets/bin...7bf85e
windows7-x64
1assets/bin...7bf85e
windows10-2004-x64
1assets/bin...29fc78
windows7-x64
1assets/bin...29fc78
windows10-2004-x64
1assets/bin...04a31f
windows7-x64
1assets/bin...04a31f
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 02:16
Static task
static1
Behavioral task
behavioral1
Sample
Beholder_ Adventure_2.6.260_APKPure.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Beholder_ Adventure_2.6.260_APKPure.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Android/obb/com.creativemobile.beholderfree/main.260.com.creativemobile.beholderfree.zip
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Android/obb/com.creativemobile.beholderfree/main.260.com.creativemobile.beholderfree.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
assets/Logo/logo1.mp4
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
assets/Logo/logo1.mp4
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
assets/Logo/logo2.mp4
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
assets/Logo/logo2.mp4
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
assets/UnityServicesProjectConfiguration.json
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
assets/UnityServicesProjectConfiguration.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
assets/bin/Data/0000000000000000f000000000000000
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
assets/bin/Data/0000000000000000f000000000000000
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
assets/bin/Data/000f5b1515d06f1449968c77136cd535
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
assets/bin/Data/000f5b1515d06f1449968c77136cd535
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
assets/bin/Data/001a40d38db2e2e45af7fe681123b72b
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
assets/bin/Data/001a40d38db2e2e45af7fe681123b72b
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
assets/bin/Data/002130a1018259c40b40ef305d247a10
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
assets/bin/Data/002130a1018259c40b40ef305d247a10
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
assets/bin/Data/003041528ced7e9489f9c9d8dc45cca7
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
assets/bin/Data/003041528ced7e9489f9c9d8dc45cca7
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
assets/bin/Data/005e69c442679cd43814f2cd5c65105d
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
assets/bin/Data/005e69c442679cd43814f2cd5c65105d
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
assets/bin/Data/00691a9df77177b43a7767a4826d79f6
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
assets/bin/Data/00691a9df77177b43a7767a4826d79f6
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
assets/bin/Data/0078594822131ad49b77961bac9897ac
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
assets/bin/Data/0078594822131ad49b77961bac9897ac
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
assets/bin/Data/0080368375c37164e9e7f29b7b7bf85e
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
assets/bin/Data/0080368375c37164e9e7f29b7b7bf85e
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
assets/bin/Data/00c6d7022de18f046a9dfc212129fc78
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
assets/bin/Data/00c6d7022de18f046a9dfc212129fc78
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
assets/bin/Data/00f43663d5dcfd7438bc2ec14904a31f
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
assets/bin/Data/00f43663d5dcfd7438bc2ec14904a31f
Resource
win10v2004-20240802-en
General
-
Target
assets/UnityServicesProjectConfiguration.json
-
Size
1KB
-
MD5
a85adb8e0ad365088af7cc299a6a943d
-
SHA1
e7ade8ec72808117611d4a3ac15534194eb015bd
-
SHA256
4ce427ee94deb124e9b9ad68fc91b37787cb2e2dd4446e4650b3d660c67ce521
-
SHA512
29cec5cb034418557e91aff196b6333565a34ee320b40a51df9eaf32bb1c16477eed25eed8e298633023274fedd64527271fc74dd9b72d19ea2e8e9e698667e8
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\json_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\json_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\json_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\.json rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\json_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1332 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1332 AcroRd32.exe 1332 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2356 1992 cmd.exe 32 PID 1992 wrote to memory of 2356 1992 cmd.exe 32 PID 1992 wrote to memory of 2356 1992 cmd.exe 32 PID 2356 wrote to memory of 1332 2356 rundll32.exe 33 PID 2356 wrote to memory of 1332 2356 rundll32.exe 33 PID 2356 wrote to memory of 1332 2356 rundll32.exe 33 PID 2356 wrote to memory of 1332 2356 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\assets\UnityServicesProjectConfiguration.json1⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\assets\UnityServicesProjectConfiguration.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\assets\UnityServicesProjectConfiguration.json"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1332
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c4ec5081c3612b7c21e184f965f16ef9
SHA1da3b79241734edd137544da1e9a11440bcc8a71b
SHA256762175db812fc89cd893aaee89a983265cb2a2cea12d8458cd161ebfc9bd388d
SHA5122f80ad776fe0847a7a4333c9d4f77e663aaa09225864f574d8f1485931c03c433701c61f9a43cb26a478402e7f982e4f981fe60b393a4b06cfae9ec725663988