Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

12/10/2024, 18:38

241012-w94h3avfja 10

Analysis

  • max time kernel
    91s
  • max time network
    75s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 18:38

General

  • Target

    CheatEngine75.exe

  • Size

    28.5MB

  • MD5

    647a2177841aebe2f1bb1b3767f41287

  • SHA1

    446575615e7fcc9c58fb04cad12909a183a2eb15

  • SHA256

    07c1abb57c4498748c4f1344a786c2c136b82651786ed005d999ecbf6054fb2c

  • SHA512

    f3165aec7a4b7adb7e6ffca56812f769b7b085000d50bf235ca1c7e74d76dfb5549de9561e281623c734c2dec9fc37b54af572c3e97fcb9fb1411102ae3da0c0

  • SSDEEP

    786432:5l3LNCxuEnwFho+zM77UDZiZCd08jFZJAI5E70TZFHi6t:5l3LMEXFhV0KAcNjxAItjFt

Score
6/10

Malware Config

Signatures

  • Checks for any installed AV software in registry 1 TTPs 9 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe
    "C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1780
    • C:\Users\Admin\AppData\Local\Temp\is-CEQEN.tmp\CheatEngine75.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-CEQEN.tmp\CheatEngine75.tmp" /SL5="$401B2,29027361,780800,C:\Users\Admin\AppData\Local\Temp\CheatEngine75.exe"
      2⤵
      • Checks for any installed AV software in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      PID:1196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c4956c45a0578b6b5932fca4173c650

    SHA1

    d980883ad1e279263a4511b10ba9207c1603b375

    SHA256

    c6ed17a69d7d44d57ca30f4746775bb3f41d2fef9fde27423e60aa115cd30f88

    SHA512

    774c1387970037784f26b7cb2aedb1c09bedf4f617b5f1d32424190c01812c572375e064691e9cb290dbbcbe6d6a46cf071ab403fbe7226f4402fd2c82ee9d85

  • C:\Users\Admin\AppData\Local\Temp\Cab2158.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar216B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\is-FMCNR.tmp\AVG_AV.png

    Filesize

    51KB

    MD5

    aee8e80b35dcb3cf2a5733ba99231560

    SHA1

    7bcf9feb3094b7d79d080597b56a18da5144ca7b

    SHA256

    35bbd8f390865173d65ba2f38320a04755541a0783e9f825fdb9862f80d97aa9

    SHA512

    dcd84221571bf809107f7aeaf94bab2f494ea0431b9dadb97feed63074322d1cf0446dbd52429a70186d3ecd631fb409102afcf7e11713e9c1041caacdb8b976

  • C:\Users\Admin\AppData\Local\Temp\is-FMCNR.tmp\AVG_BRW.png

    Filesize

    29KB

    MD5

    0b4fa89d69051df475b75ca654752ef6

    SHA1

    81bf857a2af9e3c3e4632cbb88cd71e40a831a73

    SHA256

    60a9085cea2e072d4b65748cc71f616d3137c1f0b7eed4f77e1b6c9e3aa78b7e

    SHA512

    8106a4974f3453a1e894fec8939038a9692fd87096f716e5aa5895aa14ee1c187a9a9760c0d4aec7c1e0cc7614b4a2dbf9b6c297cc0f7a38ba47837bede3b296

  • C:\Users\Admin\AppData\Local\Temp\is-FMCNR.tmp\CCleaner.png

    Filesize

    193KB

    MD5

    7c87614f099c75a0bed6ab01555143dd

    SHA1

    07ab72dc4a1e53e2c62ecccc1221472854d78635

    SHA256

    02335420cb5c2fa33eec48f32706d2353f8b609daaf337458f04a8f98d999a7c

    SHA512

    29b7ce896332ed2a05235645adb963b77920a0a252561684ea9f1f925f69dbcee4685e1b30584c1034a15b7efc18b911902d1ecb41c523cf2552ff23e165bf43

  • C:\Users\Admin\AppData\Local\Temp\is-FMCNR.tmp\logo.png

    Filesize

    248KB

    MD5

    9cc8a637a7de5c9c101a3047c7fbbb33

    SHA1

    5e7b92e7ed3ca15d31a48ebe0297539368fff15c

    SHA256

    8c5c80bbc6b0fdb367eab1253517d8b156c85545a2d37d1ee4b78f3041d9b5db

    SHA512

    cf60556817dba2d7a39b72018f619b0dbea36fb227526943046b67d1ae501a96c838d6d5e3da64618592ac1e2fa14d4440baa91618aa66256f99ea2100a427b4

  • \Users\Admin\AppData\Local\Temp\is-CEQEN.tmp\CheatEngine75.tmp

    Filesize

    2.9MB

    MD5

    2c94c19646786c4ee5283b02fd8ce5a5

    SHA1

    bf3dd30300126ba9b51c343d64da2d8eda23ebea

    SHA256

    9be09875aa698a85c446fb80e075087d6c0a543a493a7f033f3015fe2f0680d5

    SHA512

    7c3d5e740340042e34f25047a29add080e89027db2d49775aad529ecb8e13bfb83f73adb3b2999e129a27d85c9b0021e3bf3e110ac93cdf6c6393d121a0f7d4e

  • \Users\Admin\AppData\Local\Temp\is-FMCNR.tmp\zbShieldUtils.dll

    Filesize

    2.0MB

    MD5

    3037e3d5409fb6a697f12addb01ba99b

    SHA1

    5d80d1c9811bdf8a6ce8751061e21f4af532f036

    SHA256

    a860bd74595430802f4e2e7ad8fd1d31d3da3b0c9faf17ad4641035181a5ce9e

    SHA512

    80a78a5d18afc83ba96264638820d9eed3dae9c7fc596312ac56f7e0ba97976647f27bd86ea586524b16176280bd26daed64a3d126c3454a191b0adc2bc4e35d

  • memory/1196-149-0x0000000003870000-0x00000000039B0000-memory.dmp

    Filesize

    1.2MB

  • memory/1196-132-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/1196-140-0x0000000003870000-0x00000000039B0000-memory.dmp

    Filesize

    1.2MB

  • memory/1196-131-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/1196-145-0x0000000003870000-0x00000000039B0000-memory.dmp

    Filesize

    1.2MB

  • memory/1196-151-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/1196-8-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/1196-155-0x0000000003870000-0x00000000039B0000-memory.dmp

    Filesize

    1.2MB

  • memory/1196-157-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/1196-164-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/1780-130-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/1780-0-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/1780-2-0x0000000000401000-0x00000000004B7000-memory.dmp

    Filesize

    728KB