Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 23:53
Static task
static1
Behavioral task
behavioral1
Sample
极品飞车8通用完全通关存档.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
极品飞车8通用完全通关存档.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
欢迎访问YXDOWN游戏下载@www.yxdown.com.url
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
欢迎访问YXDOWN游戏下载@www.yxdown.com.url
Resource
win10v2004-20240802-en
General
-
Target
极品飞车8通用完全通关存档.exe
-
Size
199KB
-
MD5
ff4fc3871ff3279f1691fecbf81ebc4e
-
SHA1
fe1b06528fa1459128b2f5fcb48805cd834cfd31
-
SHA256
33c8b76aa9997ec0df6dc34bca05ca71dc3b28b14c6f2de68d1dd912e5236114
-
SHA512
caf04d4c04783a5903feea575cafee139cd043e93654da850285b9d90ffec67414baec0e98349325fb70c2da764d99dc911559795cbe344fc54128776118dbfc
-
SSDEEP
6144:VG5dgJE6suvocZUK1ktdzLxmBF0eZmVRX:Vsqpsr8qfLG09R
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{A697BC46-BC93-4833-93F5-1E365011E88A} Regsvr32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ODBINT.dll 极品飞车8通用完全通关存档.exe File opened for modification C:\Windows\downews.ini Regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 极品飞车8通用完全通关存档.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A697BC46-BC93-4833-93F5-1E365011E88A} Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A697BC46-BC93-4833-93F5-1E365011E88A}\InprocServer32 Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ODBINT.Yahoo Bar Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ODBINT.Yahoo Bar\ = "Yahoo Bar" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ODBINT.Yahoo Bar\Clsid Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ODBINT.Yahoo Bar\Clsid\ = "{A697BC46-BC93-4833-93F5-1E365011E88A}" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A697BC46-BC93-4833-93F5-1E365011E88A}\ProgID Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A697BC46-BC93-4833-93F5-1E365011E88A}\ProgID\ = "ODBINT.Yahoo Bar" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A697BC46-BC93-4833-93F5-1E365011E88A}\ = "Yahoo Bar" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A697BC46-BC93-4833-93F5-1E365011E88A}\InprocServer32\ = "C:\\Windows\\ODBINT.dll" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A697BC46-BC93-4833-93F5-1E365011E88A}\InprocServer32\ThreadingModel = "Apartment" Regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2148 3004 极品飞车8通用完全通关存档.exe 30 PID 3004 wrote to memory of 2148 3004 极品飞车8通用完全通关存档.exe 30 PID 3004 wrote to memory of 2148 3004 极品飞车8通用完全通关存档.exe 30 PID 3004 wrote to memory of 2148 3004 极品飞车8通用完全通关存档.exe 30 PID 3004 wrote to memory of 2148 3004 极品飞车8通用完全通关存档.exe 30 PID 3004 wrote to memory of 2148 3004 极品飞车8通用完全通关存档.exe 30 PID 3004 wrote to memory of 2148 3004 极品飞车8通用完全通关存档.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\极品飞车8通用完全通关存档.exe"C:\Users\Admin\AppData\Local\Temp\极品飞车8通用完全通关存档.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\Regsvr32.exeRegsvr32.exe /s C:\Windows\ODBINT.dll2⤵
- Installs/modifies Browser Helper Object
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154KB
MD5a074987333dd834af2b756574ff6deb6
SHA1bda5244a8f747aa87c7e2f6790e366698f974d5d
SHA256ae76ad272b95d28969923a2480caa39b85d421e818bb9d96848ed92c89ca5fbc
SHA51228b635ab6329e02c4420edffae4d6b3b9e430007a8862e37fc8efe390b1926a8e4a75eb1090e70eb24350c47fd0e5cd9422bc46c852a8b58becbe8c296b86e66