Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10Bugs.dll
windows7-x64
1Bugs.dll
windows10-2004-x64
1Decompiler V.2.4.exe
windows7-x64
7Decompiler V.2.4.exe
windows10-2004-x64
9LoaderScripts.py
windows7-x64
3LoaderScripts.py
windows10-2004-x64
3Roblox HWD/Bugs.dll
windows7-x64
1Roblox HWD/Bugs.dll
windows10-2004-x64
1Roblox HWD/Scripts.py
windows7-x64
3Roblox HWD/Scripts.py
windows10-2004-x64
3Scripts/Scripts.py
windows7-x64
3Scripts/Scripts.py
windows10-2004-x64
3Scripts/ServerSide.py
windows7-x64
3Scripts/ServerSide.py
windows10-2004-x64
3decompile.dll
windows7-x64
1decompile.dll
windows10-2004-x64
1krnlapi.dll
windows7-x64
1krnlapi.dll
windows10-2004-x64
1saveinstance.dll
windows7-x64
1saveinstance.dll
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
12/01/2025, 14:03
Behavioral task
behavioral1
Sample
Bugs.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Bugs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Decompiler V.2.4.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
Decompiler V.2.4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
LoaderScripts.py
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
LoaderScripts.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Roblox HWD/Bugs.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Roblox HWD/Bugs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Roblox HWD/Scripts.py
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Roblox HWD/Scripts.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Scripts/Scripts.py
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
Scripts/Scripts.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Scripts/ServerSide.py
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Scripts/ServerSide.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
decompile.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
decompile.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
krnlapi.dll
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
krnlapi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
saveinstance.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
saveinstance.dll
Resource
win10v2004-20241007-en
General
-
Target
Decompiler V.2.4.exe
-
Size
75.4MB
-
MD5
7eaef81d5fa7765c87f64c9e8781957b
-
SHA1
e1e390048941688e1bc92c8c4e9dc8401da3405b
-
SHA256
55e26286c6d116b54651a895ecc736d8087ad9527547f61eec2d0ee3d95d9cb3
-
SHA512
fc698f58ff38c0d107c413e951429f111ad13221931c65580b2cbddcb883816640cf024e48e971bf34b150829a6432cd7e9be25b65a8cc89dfbb761da252c476
-
SSDEEP
1572864:HvhQ6l8xSk8IpG7V+VPhqIbE7WTylPj4iY4MHHLeqPNLtDaSWRvZv2BYK:Hvh1ixSkB05awIxTy5nMHVLteSYYBZ
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2752 Decompiler V.2.4.exe -
resource yara_rule behavioral3/files/0x000400000001d166-1260.dat upx behavioral3/memory/2752-1262-0x000007FEF5820000-0x000007FEF5C8E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2752 2412 Decompiler V.2.4.exe 31 PID 2412 wrote to memory of 2752 2412 Decompiler V.2.4.exe 31 PID 2412 wrote to memory of 2752 2412 Decompiler V.2.4.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Decompiler V.2.4.exe"C:\Users\Admin\AppData\Local\Temp\Decompiler V.2.4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\Decompiler V.2.4.exe"C:\Users\Admin\AppData\Local\Temp\Decompiler V.2.4.exe"2⤵
- Loads dropped DLL
PID:2752
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5933b49da4d229294aad0c6a805ad2d71
SHA19828e3ce504151c2f933173ef810202d405510a4
SHA256ab3e996db016ba87004a3c4227313a86919ff6195eb4b03ac1ce523f126f2206
SHA5126023188f3b412dd12c2d4f3a8e279dcace945b6e24e1f6bbd4e49a5d2939528620ceb9a5f77b9a47d2d0454e472e2999240b81bed0239e7e400a4e25c96e1165