Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    83s
  • max time network
    91s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • submitted
    29/01/2025, 18:01

General

  • Target

    Survivalcraft_2_3_Multiplayer_x23_01_31_VD_zip.zip

  • Size

    16.7MB

  • MD5

    2c341d93784288891a95dcebdb13f0cc

  • SHA1

    3221d07491579b7d4290c22688760b64360cdb14

  • SHA256

    2922d5a4f2de932813d21422303133e01b9ea0ead5714b58f075f6afaf960b80

  • SHA512

    05cacc08227cc34c3beda2ba521a6c8605d8194924c627f46bd3da2d1bbe798cb5ad2b4061927e1521aef98cf579fc2607c41f62b1158c4e500a38a5a4a6397a

  • SSDEEP

    393216:MSRqleDPCJUDaek0bDrnnmmjestwC0GfeQfUpLPKO4zojRFBwQZJjw1RuCX0:/6eGJeR3znfeywITfUlyOTqQZd6PE

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 46 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Survivalcraft_2_3_Multiplayer_x23_01_31_VD_zip.zip
    1⤵
      PID:1176
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0xc8
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1636
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Survivalcraft_2_3_Multiplayer_x23_01_31_VD_zip.zip"
      1⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1036
    • C:\Users\Admin\Desktop\viruslolol\Survivalcraft.exe
      "C:\Users\Admin\Desktop\viruslolol\Survivalcraft.exe"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:808
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 808 -s 1684
        2⤵
          PID:1900
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\viruslolol\start.sh
        1⤵
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:1180
      • C:\Users\Admin\Desktop\viruslolol\Survivalcraft.exe
        "C:\Users\Admin\Desktop\viruslolol\Survivalcraft.exe"
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:472
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 472 -s 1652
          2⤵
            PID:2800

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\Desktop\viruslolol\Bugs\Game.log

          Filesize

          2KB

          MD5

          81b5b5e1cac07ebd140a1f887d26d03a

          SHA1

          7dc7d82c02b9364284eac08476ef02747caa4c7b

          SHA256

          db0fa3f9a0fa81ff8fd9b37327803928dc2bb3ab5b95b1bb87c0233deeec48fb

          SHA512

          06022f71ae7110fc82ccaf4990ea1fe45ee9e0b56349e9eaf0d900a1539d67f545f442572341ef9f62997ddefb7d56bf5479d3e788cbc523ca8bd65cb141170e

        • C:\Users\Admin\Desktop\viruslolol\Bugs\Game.log

          Filesize

          2KB

          MD5

          88bd917b34d77550ff94c8299a03c98c

          SHA1

          cf3510064d7b9c2fb28edb2a001f4c22d9a21d9c

          SHA256

          89263c14c17304ce5a8a6f98ffcae39402177c3e2c61f7b81e5186a00d4f46c6

          SHA512

          955ac4594ef6fc7bf52da10f822e944fceee3abad00b5bd8b97d74e47a6c71818a8d54e73988a348c44fd327745e72d28e7df6ed935fd8f8d741dfef84b303c0

        • C:\Users\Admin\Desktop\viruslolol\Content.zip

          Filesize

          14.0MB

          MD5

          e79821f8ab1adeaff842136d714f0396

          SHA1

          cff8ea8e17c72796e5412dd9f6da388d0798527c

          SHA256

          9c58a8d32146843ce98dce192294d7761d8962f97f92dd8bc4ecbd59c8e9bd94

          SHA512

          e88e60c70079fa9f4e18ccd6ce051b6aa72aa6fdf69dce8b9f395bafe65d7744f65b0d884f515f8d557c08344f1c9398088bad5335112ada4d65ce5a2253f95f

        • C:\Users\Admin\Desktop\viruslolol\Engine.dll

          Filesize

          550KB

          MD5

          52bf3551a5f058d2d1868f2580871c56

          SHA1

          295aa650cf394157310f9ad1a2477f9f928c2593

          SHA256

          9d7b1ed9bf64c169f29ea7288eaeed716d78438d4a56354001a99a4c4e2fd62e

          SHA512

          2968c55dae5a9e706019babc42a8ad9411096b15646bad91700636c5e3febcf70f0e4c3a31e42420b612ce44c43815d89e9e980d7f4f8932364279198942c4ab

        • C:\Users\Admin\Desktop\viruslolol\EntitySystem.dll

          Filesize

          57KB

          MD5

          57a6158a565357dad92729b657a5097c

          SHA1

          d29f759fdb2287405f4930524e923eeface24ca8

          SHA256

          01f8c69e17e4adee871611a25a3c509720085a9c19bf76b27154e0e13bc6d31e

          SHA512

          d0defd105f6e09834ec31f20f72cbac1dd10624ec4e9a270dbf53bcf483737f784b58f2bb3a7d38ea94f88e64c07e9ac0b063180368aff8c16d59d5513ecef29

        • C:\Users\Admin\Desktop\viruslolol\OpenAL\x64\openal32.dll

          Filesize

          407KB

          MD5

          2b5a427b85eea53675484405af5010e0

          SHA1

          19201c0fb48ed20effd74de7989c2fa45326e35e

          SHA256

          f42706c862bc3d66550eb0a929bd5cb195c7a1f6a181cc854d59fc124d771023

          SHA512

          f1793a8d9402da2d23e14046ca2618bdb5fc0dd8986880f07d54df8fd3b23359de9d9b515f53b072a1d843b492d000ac5f2716ceb01f3f9d694e1aa8c4cf10d3

        • C:\Users\Admin\Desktop\viruslolol\OpenTK.dll

          Filesize

          3.8MB

          MD5

          f53fc357a78ebb49d68d11ab84ac207b

          SHA1

          7aa877ccaffd3017bea679904b2bbf6101692a60

          SHA256

          fd7cb5fc016a15c619afe5d111b7d3b243aba210c32be279e80b72aa3290a8aa

          SHA512

          c66a3143eaaa2d0202acc8b56516008ad534626126f2bf49ce8c4622cb384f04a7be8681d3774cf1eacd78edb633b7ee9c0542ac699cf4141fdc9f6a3f8cc367

        • C:\Users\Admin\Desktop\viruslolol\Settings.xml

          Filesize

          8KB

          MD5

          b36c8f016d0386741a503711882daf64

          SHA1

          56a203f30d38a96624f481a19d6210053f4a42f4

          SHA256

          0cec165c863315f034d9e5bcbeb8538870ce81b5b7bf023310ce3f7b51e4f9bd

          SHA512

          d9fb08dcc66050edfa95bc73ee3b8f1569349d5ef2ccf25a745ce55ff2b5e5699fe81e4bce26c3956c7602725ac3d15c44f8234587bd9efea4282fa05302ad74

        • C:\Users\Admin\Desktop\viruslolol\Survivalcraft.exe

          Filesize

          2.0MB

          MD5

          a88eade8ef55207bb2cd93a5683336ec

          SHA1

          15a249a01c70264548093fede9a29925602842bd

          SHA256

          c5da3e9fff5d4b4327e4de3be09b826e9c339a2d72f0d55a6b1ad0df383ce179

          SHA512

          3817e76ff6afdeadaccf4196581dbe6f944c3bbf6fd9c5d088b2a4cfc0c2818c7314b3c18cdf0e6d7ebbf1b07817cfcd899859c6433ae2df7dc79b54efd90227

        • memory/472-113-0x0000000001260000-0x000000000146A000-memory.dmp

          Filesize

          2.0MB

        • memory/472-114-0x0000000001090000-0x0000000001120000-memory.dmp

          Filesize

          576KB

        • memory/472-116-0x000000001B640000-0x000000001BA18000-memory.dmp

          Filesize

          3.8MB

        • memory/472-118-0x0000000000DE0000-0x0000000000DF4000-memory.dmp

          Filesize

          80KB

        • memory/808-106-0x0000000000AF0000-0x0000000000B04000-memory.dmp

          Filesize

          80KB

        • memory/808-99-0x000000001A9A0000-0x000000001AA30000-memory.dmp

          Filesize

          576KB

        • memory/808-109-0x000000006B600000-0x000000006B65D000-memory.dmp

          Filesize

          372KB

        • memory/808-102-0x000000001BAA0000-0x000000001BE78000-memory.dmp

          Filesize

          3.8MB

        • memory/808-97-0x0000000001010000-0x000000000121A000-memory.dmp

          Filesize

          2.0MB

        • memory/1180-110-0x0000000003A60000-0x0000000003A70000-memory.dmp

          Filesize

          64KB