Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
432s -
max time network
433s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2024, 13:57
Static task
static1
Behavioral task
behavioral1
Sample
gamebanned_2024_v1.zip
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
gamebanned_2024_v1.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
gamebanned_2024_v1/Hurtworld/HurtworldClient_Data/Managed/Assembly-CSharp.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
gamebanned_2024_v1/Hurtworld/HurtworldClient_Data/Managed/Assembly-CSharp.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
gamebanned_2024_v1/Hurtworld/bking.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
gamebanned_2024_v1/Hurtworld/bking.dll
Resource
win10v2004-20241007-en
General
-
Target
gamebanned_2024_v1.zip
-
Size
1.0MB
-
MD5
f2f76c61e29007097869ada2ad9812dd
-
SHA1
8921cead68fa88bbd30b58f28f79f081120bf1fd
-
SHA256
7ba8dd69197379fc2fba05be5f2f20ef9ca7749d6c1bdcd2ba9d5de6e7598a20
-
SHA512
8e1abc2204c6dc521129fec4f5f6c069e24b170223fb4f52b59dfa86604763e22daa297ad3be243b16c005a59722d82023b8d7aae763ee55eb7fb89d7036fac3
-
SSDEEP
12288:TN9ZojhZExKZ0bnS9nAwuTPlubMoY+8U6XklFSlZfbRKQwOHGqbCYZdMYS3ETJxM:LZ8jWbSvAoT8elF+dLGqbCYYYSSxtgt
Malware Config
Signatures
-
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.log svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSStmp.log svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00001.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00002.jrs svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jcp svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.jfm svchost.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings mspaint.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4816 WINWORD.EXE 4816 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3544 mspaint.exe 3544 mspaint.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 5116 7zFM.exe 1628 OpenWith.exe 3280 OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 5116 7zFM.exe Token: 35 5116 7zFM.exe Token: SeSecurityPrivilege 5116 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5116 7zFM.exe 5116 7zFM.exe -
Suspicious use of SetWindowsHookEx 32 IoCs
pid Process 4056 OpenWith.exe 4488 OpenWith.exe 3544 mspaint.exe 1628 OpenWith.exe 4816 WINWORD.EXE 4816 WINWORD.EXE 4816 WINWORD.EXE 4816 WINWORD.EXE 4816 WINWORD.EXE 4816 WINWORD.EXE 4816 WINWORD.EXE 4816 WINWORD.EXE 4816 WINWORD.EXE 4816 WINWORD.EXE 4816 WINWORD.EXE 4816 WINWORD.EXE 4816 WINWORD.EXE 4816 WINWORD.EXE 4816 WINWORD.EXE 3280 OpenWith.exe 3280 OpenWith.exe 3280 OpenWith.exe 3280 OpenWith.exe 3280 OpenWith.exe 3280 OpenWith.exe 3280 OpenWith.exe 3280 OpenWith.exe 3280 OpenWith.exe 3280 OpenWith.exe 3280 OpenWith.exe 3280 OpenWith.exe 3280 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3280 wrote to memory of 2164 3280 OpenWith.exe 123 PID 3280 wrote to memory of 2164 3280 OpenWith.exe 123
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\gamebanned_2024_v1.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5116
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4056
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4488
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\ShowExit.jpg" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3544
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc1⤵
- Drops file in System32 directory
PID:3636
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1628
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n /f "C:\Users\Admin\Desktop\CloseWatch.dot"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4816
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Assembly-CSharp.dll2⤵PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
347B
MD5fc5d61814e5efe846e6620775a026e43
SHA1aa350323c5090ba67531d571e6c831ac76d8c69b
SHA256a6c5818c4bf816cb23cd9b7e07c239e352e19efbd2a5bed2b8bfa6aaa3fb121c
SHA512e40f4b9e3bf02f80ad859d2f7ec2f4c2f02a5ea2c3350b22aa01a26be963414a394f2c658797bfcef30815be4ebe2eec4cfda0f381b51148a2b61429b5ab30c7
-
Filesize
2.7MB
MD578c278a6954af7b2892e4da62d90ecd7
SHA1b591429f9ce96283f91e00349cb6731bc0ac4d9e
SHA256cb8b43a421926fbbb212295e197daf21cfd0003ee3ba18042e4d380183b434a9
SHA5125c7405e9757edd92dfd625c7ef70545b418e3915294b18fe41d9cfb5820be5ce5a82b9e0709fff81e0e04080c7072082b7c937af00496b50f00277197e129db5