Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

30/09/2024, 02:57

240930-dflr2svapl 3

30/09/2024, 02:54

240930-dedp2sydrf 3

30/09/2024, 02:49

240930-dbcnksycnh 3

30/09/2024, 02:46

240930-c9pkcsybqb 3

Analysis

  • max time kernel
    30s
  • max time network
    100s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    30/09/2024, 02:57

General

  • Target

    Balatro.v1.0.1c.Beta/Balatro/steam_settings/force_language.txt

  • Size

    7B

  • MD5

    ba0a6ddd94c73698a3658f92ac222f8a

  • SHA1

    1b669334dae8ebafa433f0175b5fd418a7bc0975

  • SHA256

    b6234d2ea0d6022be63db80d7b80e221097fe4a469dc44febcd2a9241effdeba

  • SHA512

    0882b702e0f4c1db1701789796ab1d12d72627811b67299bf36b9b25c29465cc24e72483d171c435368dc9f777837d2bd45ccff293de2207d32ba58a6ac01023

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Balatro.v1.0.1c.Beta\Balatro\steam_settings\force_language.txt
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3212
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Balatro.v1.0.1c.Beta\Balatro\steam_settings\force_language.txt
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:2300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads