Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    102s
  • max time network
    209s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    06/01/2025, 12:09

General

  • Target

    Survivalcraft.exe

  • Size

    2.1MB

  • MD5

    6d08234db22fc3c62b23e08f28a71ffd

  • SHA1

    d2eb49802a4247739763e106413e06b3e8c8a43e

  • SHA256

    857a6fc48daa936120537557458f6417b433dd18f11d4e749943c45732b86cbc

  • SHA512

    9ce6cb8145191000797b2894ab1f1a7a1a595e45c32dbfc0e5e1a803cfb194aadf661cc9b5dd116f47f82a8d18d20a6be8764e9c2a275b4b4290d8446bd13ff3

  • SSDEEP

    24576:23PoTvLEjxMdgsiH79MgGPPc464eXD2AUyQW1qrucuMwuNnoqdOqjfRv01sHQb2V:i6v3Jc2J9HK68kdlT

Score
10/10

Malware Config

Extracted

Family

warmcookie

Signatures

  • Warmcookie family
  • Warmcookie, Badspace

    Warmcookie aka Badspace is a backdoor written in C++.

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Survivalcraft.exe
    "C:\Users\Admin\AppData\Local\Temp\Survivalcraft.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4696
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x494 0x2d0
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3880

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4696-0-0x00007FFC07BE3000-0x00007FFC07BE5000-memory.dmp

    Filesize

    8KB

  • memory/4696-1-0x0000018CE1620000-0x0000018CE1840000-memory.dmp

    Filesize

    2.1MB

  • memory/4696-2-0x0000018CFBE00000-0x0000018CFBE90000-memory.dmp

    Filesize

    576KB

  • memory/4696-3-0x0000018CFC370000-0x0000018CFC748000-memory.dmp

    Filesize

    3.8MB

  • memory/4696-4-0x00007FFC07BE0000-0x00007FFC086A2000-memory.dmp

    Filesize

    10.8MB

  • memory/4696-5-0x0000018CFBF20000-0x0000018CFBF36000-memory.dmp

    Filesize

    88KB

  • memory/4696-6-0x0000018CFC320000-0x0000018CFC370000-memory.dmp

    Filesize

    320KB

  • memory/4696-7-0x0000018CFE330000-0x0000018CFE3E2000-memory.dmp

    Filesize

    712KB

  • memory/4696-8-0x000000006B600000-0x000000006B65D000-memory.dmp

    Filesize

    372KB

  • memory/4696-9-0x00007FFC07BE0000-0x00007FFC086A2000-memory.dmp

    Filesize

    10.8MB