Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10free cheats.exe
windows7-x64
7free cheats.exe
windows10-2004-x64
9discord_to...er.pyc
windows7-x64
3discord_to...er.pyc
windows10-2004-x64
3get_cookies.pyc
windows7-x64
3get_cookies.pyc
windows10-2004-x64
3misc.pyc
windows7-x64
3misc.pyc
windows10-2004-x64
3passwords_grabber.pyc
windows7-x64
3passwords_grabber.pyc
windows10-2004-x64
3source_prepared.pyc
windows7-x64
3source_prepared.pyc
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/12/2024, 07:42
Behavioral task
behavioral1
Sample
free cheats.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
free cheats.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
discord_token_grabber.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
discord_token_grabber.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
get_cookies.pyc
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
get_cookies.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
misc.pyc
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
misc.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
passwords_grabber.pyc
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
passwords_grabber.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
source_prepared.pyc
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
source_prepared.pyc
Resource
win10v2004-20241007-en
General
-
Target
free cheats.exe
-
Size
80.5MB
-
MD5
7ca09bdfb03e6b46348a0caabfc9f3db
-
SHA1
909774f22e54784a6cbdc418f1c1997500bd606f
-
SHA256
fa65b3e94dcc46f38095dc9e323f0e5571820142e41bc2bde20521640529d1fe
-
SHA512
c7e089686480062ce1429648546efdf601da56df46a4228d0082191d3cee7a0c7564d44b4908ba00a07f0fa0948d90003d0f9f995c6761093e609433487336c9
-
SSDEEP
1572864:+GKlqWL+smwSk8IpG7V+VPhqclE7TlifiYgj+h58sMwherXoxCcJ5A:vKM7smwSkB05awcawB51er4RA
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1960 free cheats.exe -
resource yara_rule behavioral1/files/0x0003000000020b48-1264.dat upx behavioral1/memory/1960-1266-0x000007FEF5D80000-0x000007FEF6369000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2056 wrote to memory of 1960 2056 free cheats.exe 31 PID 2056 wrote to memory of 1960 2056 free cheats.exe 31 PID 2056 wrote to memory of 1960 2056 free cheats.exe 31
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5546cc5fe76abc35fdbf92f682124e23d
SHA15c1030752d32aa067b49125194befee7b3ee985a
SHA25643bff2416ddd123dfb15d23dc3e99585646e8df95633333c56d85545029d1e76
SHA512cb75334f2f36812f3a5efd500b2ad97c21033a7a7054220e58550e95c3408db122997fee70a319aef8db6189781a9f2c00a9c19713a89356038b87b036456720