Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
217s -
max time network
224s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 12:31
Behavioral task
behavioral1
Sample
AkrienBetaLoader.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
AkrienBetaLoader.exe
Resource
win10v2004-20240802-en
General
-
Target
AkrienBetaLoader.exe
-
Size
14.9MB
-
MD5
68a83efe554d24837a9f652f57d0d989
-
SHA1
ec4cc4c812e817fed751565707c08e7f9cbb6b39
-
SHA256
3839137c0450ca36256d511bc12c2a94fe35156908967784353a2839cd7182d3
-
SHA512
a785fdd177aebb55516435c892630a7e1ec832f2d37f4b1b0af457f4c697498620ba52d4837601fcd5cd90da67ab4d08cc319a7979c31a782b40a65a60571f34
-
SSDEEP
196608:NjmOIB5vCgkg9s2xW5NjVAhP+Zdruaz+hzxWquxBJ7jmmEHSWwP2LDYJ1o3cz3mG:N5IB5vCgkLKgVA+Run2zJ7ZCO3m9t
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation AkrienBetaLoader.exe -
Loads dropped DLL 9 IoCs
pid Process 4152 AkrienBetaLoader.exe 4152 AkrienBetaLoader.exe 4152 AkrienBetaLoader.exe 4152 AkrienBetaLoader.exe 4152 AkrienBetaLoader.exe 4152 AkrienBetaLoader.exe 4152 AkrienBetaLoader.exe 4152 AkrienBetaLoader.exe 4152 AkrienBetaLoader.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM32\ucrtbase.pdb AkrienBetaLoader.exe File opened for modification C:\Windows\SYSTEM32\DLL\kernel32.pdb AkrienBetaLoader.exe File opened for modification C:\Windows\SYSTEM32\symbols\DLL\kernel32.pdb AkrienBetaLoader.exe File opened for modification C:\Windows\SYSTEM32\dll\ucrtbase.pdb AkrienBetaLoader.exe File opened for modification C:\Windows\SYSTEM32\symbols\dll\ucrtbase.pdb AkrienBetaLoader.exe File opened for modification C:\Windows\SYSTEM32\kernel32.pdb AkrienBetaLoader.exe File opened for modification C:\Windows\SYSTEM32\ntdll.pdb AkrienBetaLoader.exe File opened for modification C:\Windows\SYSTEM32\dll\ntdll.pdb AkrienBetaLoader.exe File opened for modification C:\Windows\SYSTEM32\symbols\dll\ntdll.pdb AkrienBetaLoader.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4152 AkrienBetaLoader.exe 4152 AkrienBetaLoader.exe -
resource yara_rule behavioral2/memory/4152-1-0x00007FF77D540000-0x00007FF77E430000-memory.dmp upx behavioral2/memory/4152-5-0x00007FF77D540000-0x00007FF77E430000-memory.dmp upx behavioral2/memory/4152-13-0x00007FF77D540000-0x00007FF77E430000-memory.dmp upx behavioral2/memory/4152-3836-0x00007FF77D540000-0x00007FF77E430000-memory.dmp upx behavioral2/memory/4152-3849-0x00007FF77D540000-0x00007FF77E430000-memory.dmp upx behavioral2/memory/4152-4001-0x00007FF77D540000-0x00007FF77E430000-memory.dmp upx -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\symbols\DLL\kernel32.pdb AkrienBetaLoader.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ucrtbase.pdb AkrienBetaLoader.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\symbols\dll\ucrtbase.pdb AkrienBetaLoader.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DLL\kernel32.pdb AkrienBetaLoader.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ntdll.pdb AkrienBetaLoader.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dll\ntdll.pdb AkrienBetaLoader.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\symbols\dll\ntdll.pdb AkrienBetaLoader.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dll\ucrtbase.pdb AkrienBetaLoader.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\kernel32.pdb AkrienBetaLoader.exe -
Detected Akrien Game Cheat
Akrien.wtf is a cheat program for a selection of online PC games.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AkrienBetaLoader.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AkrienBetaLoader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision AkrienBetaLoader.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4152 AkrienBetaLoader.exe 4152 AkrienBetaLoader.exe 4152 AkrienBetaLoader.exe 4152 AkrienBetaLoader.exe 4152 AkrienBetaLoader.exe 4152 AkrienBetaLoader.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4152 wrote to memory of 3992 4152 AkrienBetaLoader.exe 83 PID 4152 wrote to memory of 3992 4152 AkrienBetaLoader.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\AkrienBetaLoader.exe"C:\Users\Admin\AppData\Local\Temp\AkrienBetaLoader.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147KB
MD57c5dc82d23b5e4f56f5cf08a042d381f
SHA184342fac8ad5b5e8cb478df6d95e6606608b20a7
SHA256f145bbeec0a0570b3f12c97dcba6f7cb698e0f0b8818daf0b72db5ed14908bfb
SHA51290510512827f4ee4920b8fe23b061624696b5883e5e664e451979219be110374b0248471d83e8fe750695a325fe7afb22cf32446362cfa29265edfd99acec349
-
Filesize
23KB
MD5a877adc3cc28680af0f7d85bc06ec0c2
SHA105e9bb414e9801bc138282ebdfcc73764e594a65
SHA256b411d0d447ba25b4b69cbf302e6e2a7342c58b45a04b2dea5dec2b4bf139c40d
SHA5125bf24d3fdd851fa7a79aa256bef27e754834cd114c3fc4f7835c1b076938eb3876031ad7eae43ebb9efaee64f590f9f3bff7eb7697b04f0d54bcf88ee974ad8e
-
Filesize
18KB
MD5afcc14a944ac2b49581186e511905296
SHA1842468621d3f08c9022610b1ca4de4d7c7999443
SHA256f94a69eadb651a310ccece5ec60629ffd147f550f778d1ce1d481e9c396e51e3
SHA512f69aab473868aaa7cf13937fa9d5d0ba628fdfa960f84f87b72f273032f1b7def53f9ce6aad5e3a42163a0e1ee981376f2dadd138bf69edd7c32be1ccf995ee4
-
Filesize
27KB
MD5cef252896f68c4990adbe1a82a02b5d4
SHA1a37855ff3aaeefc31cca3b14f1c279298f778daf
SHA256a0cc2524f6b7b1b8b4dfff2916fe5ced1bfddb210ac4dc0092d13f74e5704dda
SHA51278e8a42fdd80b23c0ab2ab4ad063a83219332e5282e1b96e7ce53eed6e36cdb3bd50c7f54c09284c53d466d7c9484f30f28379381e761f300946118963134a35
-
Filesize
91KB
MD59eae1444ac0bab3a74ac99c4622dd2a5
SHA155593019633b0a56f97aff0dc07f028b7ca7facd
SHA2566cef00e1f9d26fc21a8d75cceccacf616813f7b7927755d3cd47ce9a19dc92a3
SHA512b17e268892409e984677b912929cd70b568ad092ac2304676ad2ec56153d0fbc5e0034da53d9bfbbe2df33894f98b39c2de8151edecdf05681c8c1981d5a59ed
-
Filesize
63KB
MD5af2f7f5775d97e9d971cad36bc39bf6e
SHA1725391e22d7793282ec8481b6f24907b500e3c43
SHA25675a2897e45a6ffff9b3586b87b42b8af57eb0691e8dcbe87c7d7c37364748695
SHA5123d29529b77b9ec276a9d8e1ed61e443a6b8934b1c8134d1a55919cb994efbb3b9fa812f86b0acb2a34699317cac51ea2939d3064644e77e9122f3af37e0c2755
-
Filesize
9.6MB
MD57e010545a2640db175d239e3d72168f1
SHA1d425a23abc83584376788e9c64dd760ea93babb7
SHA256e485d77969d660ec6485a21b4b00f222e3bac35c2335846953a211abd667525c
SHA512d19fc9e5b7a3f94231de569c6e223a70d13fce147da199bbebb23ce96b962fa7779bba6f385caa4960f1ff55a81cbebb98f981cb7dcdf73cba1716de86bb0a26
-
Filesize
36KB
MD5cc257e19a802064c8ef5115d95d42933
SHA194c548178fd22c14e1aefd8c51429814fa43ef0a
SHA256f34fc80d553ca33369fb99dd1b27436fbc99a6fd6aec51211053c8210a0b9922
SHA5120d99df66b007a4578368adf09b569c14f1d81dff324f5afcd57418614c226408983ea2e3c9ed88aa111c57e3d4cf96d38ad96f1de2c2cd964de6324bd608e41b
-
Filesize
81KB
MD50ae350dea4985e5d3898737650019952
SHA1db2bdc33b910bbe8874cc4e467e914f351e78c36
SHA256763c41eb212f2d729c8023d251aad3932c97db5254f75b9935e2f1a4990155ef
SHA512a49c7163540dfb1f74f4f49af050af6f1f097d05597bca37333fd7f3d307831dc07a4a8872fd75a6d2fc407b170dafd41d4fa878b811c64d1f3ac99848c7a5c4