Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 18:31
Static task
static1
Behavioral task
behavioral1
Sample
LOL卡牌大师切牌器V2.0/LOL卡牌大师切牌LOL卡牌大师切牌器下载 V2.0绿色版_ - pc6下载站.url
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
LOL卡牌大师切牌器V2.0/LOL卡牌大师切牌LOL卡牌大师切牌器下载 V2.0绿色版_ - pc6下载站.url
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
LOL卡牌大师切牌器V2.0/LOL卡牌大师切牌器V2.0.exe
Resource
win7-20241010-en
General
-
Target
LOL卡牌大师切牌器V2.0/LOL卡牌大师切牌器V2.0.exe
-
Size
387KB
-
MD5
6b39513fad6e602b7ad36cd2b1eb0914
-
SHA1
f86aa304770b036cef08455f948672abee7319eb
-
SHA256
4b3e6ad83f55b5423d9cae8245ff5ff293493683551c69c37aad4144493abca3
-
SHA512
82a58dd8c5c5664d93b29ace99b6905ee3809fe75692e5c754907691edb8b26576a465d8fa1fd7cba8cd8ac62b4ef43f3dbddaba98a1592ee41620cfb94b293b
-
SSDEEP
6144:MdTk3w8iPtyltARMo0RlE6scsogdcfzFQigR8IzkbnF:MdTzDPtylWyoClE6FsogdYzFQigRHzm
Malware Config
Signatures
-
resource yara_rule behavioral4/memory/2808-0-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/2808-37-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/2808-44-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/2808-48-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/2808-47-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/2808-42-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/2808-39-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/2808-35-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/2808-33-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/2808-31-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/2808-29-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/2808-27-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/2808-25-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/2808-21-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/2808-19-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/2808-18-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/2808-15-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/2808-13-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/2808-9-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/2808-5-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/2808-2-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/2808-23-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/2808-11-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/2808-7-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/2808-4-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/2808-3-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral4/memory/2808-49-0x0000000010000000-0x000000001003D000-memory.dmp upx -
Program crash 2 IoCs
pid pid_target Process procid_target 4160 2808 WerFault.exe 82 4860 2808 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LOL卡牌大师切牌器V2.0.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2808 LOL卡牌大师切牌器V2.0.exe 2808 LOL卡牌大师切牌器V2.0.exe 2808 LOL卡牌大师切牌器V2.0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\LOL卡牌大师切牌器V2.0\LOL卡牌大师切牌器V2.0.exe"C:\Users\Admin\AppData\Local\Temp\LOL卡牌大师切牌器V2.0\LOL卡牌大师切牌器V2.0.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 7562⤵
- Program crash
PID:4160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 7762⤵
- Program crash
PID:4860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2808 -ip 28081⤵PID:5084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2808 -ip 28081⤵PID:3176