Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10Randome.zip
windows11-21h2-x64
1GMAIL/Gmail.exe
windows11-21h2-x64
3Instagram VM.exe
windows11-21h2-x64
5LazyAIO/LazyAIO.exe
windows11-21h2-x64
7Minecraft/...ft.exe
windows11-21h2-x64
3Numify v3-...Or.exe
windows11-21h2-x64
3VenomRAT v...er.exe
windows11-21h2-x64
1VenomRAT v...nc.exe
windows11-21h2-x64
1VenomRAT v...ny.exe
windows11-21h2-x64
10VenomRAT v...p_.exe
windows11-21h2-x64
10VenomRAT v....3.exe
windows11-21h2-x64
10Analysis
-
max time kernel
10s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
27/09/2024, 20:17
Behavioral task
behavioral1
Sample
Randome.zip
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
GMAIL/Gmail.exe
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
Instagram VM.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
LazyAIO/LazyAIO.exe
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
Minecraft/Minecraft.exe
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
Numify v3-Cracked by SpArtOr.exe
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
VenomRAT v6.0.3_p_/Keylogger.exe
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
VenomRAT v6.0.3_p_/Plugins/hvnc.exe
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
VenomRAT v6.0.3_p_/Stub/ClientAny.exe
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
VenomRAT v6.0.3_p_/Venom RAT_p_.exe
Resource
win11-20240802-en
General
-
Target
Minecraft/Minecraft.exe
-
Size
275KB
-
MD5
9affb7fa676cf886e26db62cb2551049
-
SHA1
5a9c57cdde1e326176c1c704b0dd99a204206708
-
SHA256
3e9d47b28ef50dc9e05f3960b08ab706eac8e335378f56c8cb10f8e50b5ea496
-
SHA512
bb5cc56f1f0ad058dfa47505c355536803a2124fc2905def17155c9e67bd66132413f142df8ef4119a08a5cb63f988e4e3f0f05a6336e139f994d6e46190f59b
-
SSDEEP
6144:O5/1evXsbwi+ifQFKgkFNWhWleeKkfv1FX9:OB1evYGiAtIWhWlGkfTX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Minecraft.exe