Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
111s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 15:41
Static task
static1
Behavioral task
behavioral1
Sample
6c95eb3e0eddca73fbb001b69563e4b073c0849d730bfed09b427d97d52fe5a2N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
6c95eb3e0eddca73fbb001b69563e4b073c0849d730bfed09b427d97d52fe5a2N.exe
Resource
win10v2004-20240802-en
General
-
Target
6c95eb3e0eddca73fbb001b69563e4b073c0849d730bfed09b427d97d52fe5a2N.exe
-
Size
72KB
-
MD5
32bdefa21232462dbe784c38be040c80
-
SHA1
b9a0fa3dcce9327682e4899224cda94369cf712e
-
SHA256
6c95eb3e0eddca73fbb001b69563e4b073c0849d730bfed09b427d97d52fe5a2
-
SHA512
36264cd5327e071e725b0d28492b90bcbec9d7f6ff7a41149fd16c2caa37bf912148b6c6cb3641e7a2bc4c5d7cc7196aa7736dc01b1be1e4d3fcc3132f7d9613
-
SSDEEP
1536:wLXB65939tY6HBg4sXJKxIjVlWmBX6CCtl8S8qcy4rLnVR:wLk395hYXJK+KpCC/8jy4fnL
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 2664 PogoGamesSetup.exe 2548 InstGameInfoHelperPDGC.exe -
Loads dropped DLL 7 IoCs
pid Process 1792 6c95eb3e0eddca73fbb001b69563e4b073c0849d730bfed09b427d97d52fe5a2N.exe 1792 6c95eb3e0eddca73fbb001b69563e4b073c0849d730bfed09b427d97d52fe5a2N.exe 1792 6c95eb3e0eddca73fbb001b69563e4b073c0849d730bfed09b427d97d52fe5a2N.exe 2664 PogoGamesSetup.exe 2664 PogoGamesSetup.exe 2664 PogoGamesSetup.exe 2664 PogoGamesSetup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c95eb3e0eddca73fbb001b69563e4b073c0849d730bfed09b427d97d52fe5a2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PogoGamesSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstGameInfoHelperPDGC.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x0006000000019223-12.dat nsis_installer_1 behavioral1/files/0x0006000000019223-12.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2664 PogoGamesSetup.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2664 1792 6c95eb3e0eddca73fbb001b69563e4b073c0849d730bfed09b427d97d52fe5a2N.exe 30 PID 1792 wrote to memory of 2664 1792 6c95eb3e0eddca73fbb001b69563e4b073c0849d730bfed09b427d97d52fe5a2N.exe 30 PID 1792 wrote to memory of 2664 1792 6c95eb3e0eddca73fbb001b69563e4b073c0849d730bfed09b427d97d52fe5a2N.exe 30 PID 1792 wrote to memory of 2664 1792 6c95eb3e0eddca73fbb001b69563e4b073c0849d730bfed09b427d97d52fe5a2N.exe 30 PID 1792 wrote to memory of 2664 1792 6c95eb3e0eddca73fbb001b69563e4b073c0849d730bfed09b427d97d52fe5a2N.exe 30 PID 1792 wrote to memory of 2664 1792 6c95eb3e0eddca73fbb001b69563e4b073c0849d730bfed09b427d97d52fe5a2N.exe 30 PID 1792 wrote to memory of 2664 1792 6c95eb3e0eddca73fbb001b69563e4b073c0849d730bfed09b427d97d52fe5a2N.exe 30 PID 2664 wrote to memory of 2548 2664 PogoGamesSetup.exe 31 PID 2664 wrote to memory of 2548 2664 PogoGamesSetup.exe 31 PID 2664 wrote to memory of 2548 2664 PogoGamesSetup.exe 31 PID 2664 wrote to memory of 2548 2664 PogoGamesSetup.exe 31 PID 2664 wrote to memory of 2548 2664 PogoGamesSetup.exe 31 PID 2664 wrote to memory of 2548 2664 PogoGamesSetup.exe 31 PID 2664 wrote to memory of 2548 2664 PogoGamesSetup.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c95eb3e0eddca73fbb001b69563e4b073c0849d730bfed09b427d97d52fe5a2N.exe"C:\Users\Admin\AppData\Local\Temp\6c95eb3e0eddca73fbb001b69563e4b073c0849d730bfed09b427d97d52fe5a2N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\nsj404C.tmp\PogoGamesSetup.exeC:\Users\Admin\AppData\Local\Temp\nsj404C.tmp\PogoGamesSetup.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\nsz65D6.tmp\InstGameInfoHelperPDGC.exe"C:\Users\Admin\AppData\Local\Temp\nsz65D6.tmp\InstGameInfoHelperPDGC.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2548
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD53514eb0c2eeafa47b7d462da9dfe444d
SHA14ec3caff3d47ab932bb3f95e37e33d68d58b2474
SHA25645d73a0701d7968bcfe935c8fab4fb950720326a3320f1b867a4bc52e3b844e1
SHA5125eb01c9ef4c3d2e68e9fa253e0b69260a0412535224a4b4d3d403c50c7c1fffd6664e1157b94ba984c7c33cf5d797881bd3cec2be7b97f31618ad0e8be96a054
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
45.6MB
MD536005a637bb8ec75ada6b8c18a36d824
SHA1705df461833c7d3782e035a465e98736be4bc801
SHA2564ee6bf01aadb0bc90bfce6e80862e20886338dc71114794384d874733873b444
SHA512f4242a85f8d3204a8cc3acab46df3161d5045ecab2f15a694506fd9aa0603f74f2748fb96ad40df7f793e45795c7fb506b5c988476607a8227a29ce226c6248c
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
4KB
MD555788069d3fa4e1daf80f3339fa86fe2
SHA1d64e05c1879a92d5a8f9ff2fd2f1a53e1a53ae96
SHA256d6e429a063adf637f4d19d4e2eb094d9ff27382b21a1f6dccf9284afb5ff8c7f
SHA512d3b1eec76e571b657df444c59c48cad73a58d1a10ff463ce9f3acd07acce17d589c3396ad5bdb94da585da08d422d863ffe1de11f64298329455f6d8ee320616
-
Filesize
439KB
MD5697f994b0b2f77418f4ff7c479b2b419
SHA19891834f745d30b73d22180a845289ad94c3a812
SHA2569c2b9dbe13d6f8901d7609d4a3e2e292e964ad76fcb57a61a16ecea6f86b7513
SHA5124339ea4daa31d73507bb776254ec9fbca6204ef8ebe7e5f03f6d9ffa3e48bf2544ca98984d12232c70180ab685fc9945bb6e7b6559d6c837773dc8643d0e6e0d
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe