Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
3ArenaWarsSetup.exe
windows7-x64
7ArenaWarsSetup.exe
windows10-2004-x64
8$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3ArenaWars.exe
windows7-x64
1ArenaWars.exe
windows10-2004-x64
8LICENSES.c...m.html
windows7-x64
3LICENSES.c...m.html
windows10-2004-x64
4d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1resources/...dex.js
windows7-x64
3resources/...dex.js
windows10-2004-x64
3resources/...pi.dll
windows7-x64
1resources/...pi.dll
windows10-2004-x64
1resources/...e3.dll
windows7-x64
1resources/...e3.dll
windows10-2004-x64
1resources/...act.js
windows7-x64
3resources/...act.js
windows10-2004-x64
3sqlite-aut...llback
ubuntu-18.04-amd64
1sqlite-aut...llback
debian-9-armhf
1sqlite-aut...llback
debian-9-mips
1General
-
Target
ArenaWarsSetup.exe
-
Size
76.5MB
-
Sample
250328-fsrj6ssse1
-
MD5
73b91750c741a597ef361fca8905b107
-
SHA1
56cfc17681d3fe4ce9c00bc04e4870e0879ecd3f
-
SHA256
3bf431de4fbe5cf2143efe06b3580e1223a6ce835dfe157a0d51b1a92d396bda
-
SHA512
f2207edc26f1c1bce619380c25471cc88faacc4c1ac4946628a52f90734d04e87818a4a8e62157fdd37f265b7d7abeed8ca59bd2b25b76f57c1653c8e0e22e66
-
SSDEEP
1572864:Ip+e4h7TL9BH01GwCXKyYmaBcSrufGanp7GgtcQ3AsER0qmF:IAe4NkYwCapmaBcSruZkUEfc
Static task
static1
Behavioral task
behavioral1
Sample
ArenaWarsSetup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ArenaWarsSetup.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20250207-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20250313-en
Behavioral task
behavioral11
Sample
ArenaWars.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
ArenaWars.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
LICENSES.chromium.html
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
LICENSES.chromium.html
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
d3dcompiler_47.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral16
Sample
ffmpeg.dll
Resource
win7-20241010-en
Behavioral task
behavioral17
Sample
ffmpeg.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral18
Sample
libEGL.dll
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
libEGL.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral20
Sample
libGLESv2.dll
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
libGLESv2.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral22
Sample
resources/app.asar.unpacked/node_modules/ilovingcats/dist/index.js
Resource
win7-20240729-en
Behavioral task
behavioral23
Sample
resources/app.asar.unpacked/node_modules/ilovingcats/dist/index.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral24
Sample
resources/app.asar.unpacked/node_modules/ilovingcats/prebuilds/win32-x64/node.napi.dll
Resource
win7-20241010-en
Behavioral task
behavioral25
Sample
resources/app.asar.unpacked/node_modules/ilovingcats/prebuilds/win32-x64/node.napi.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral26
Sample
resources/app.asar.unpacked/node_modules/sqlite3/build/Release/node_sqlite3.dll
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
resources/app.asar.unpacked/node_modules/sqlite3/build/Release/node_sqlite3.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral28
Sample
resources/app.asar.unpacked/node_modules/sqlite3/deps/extract.js
Resource
win7-20241023-en
Behavioral task
behavioral29
Sample
resources/app.asar.unpacked/node_modules/sqlite3/deps/extract.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral30
Sample
sqlite-autoconf-3440200/Makefile.fallback
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral31
Sample
sqlite-autoconf-3440200/Makefile.fallback
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral32
Sample
sqlite-autoconf-3440200/Makefile.fallback
Resource
debian9-mipsbe-20240729-en
Malware Config
Targets
-
-
Target
ArenaWarsSetup.exe
-
Size
76.5MB
-
MD5
73b91750c741a597ef361fca8905b107
-
SHA1
56cfc17681d3fe4ce9c00bc04e4870e0879ecd3f
-
SHA256
3bf431de4fbe5cf2143efe06b3580e1223a6ce835dfe157a0d51b1a92d396bda
-
SHA512
f2207edc26f1c1bce619380c25471cc88faacc4c1ac4946628a52f90734d04e87818a4a8e62157fdd37f265b7d7abeed8ca59bd2b25b76f57c1653c8e0e22e66
-
SSDEEP
1572864:Ip+e4h7TL9BH01GwCXKyYmaBcSrufGanp7GgtcQ3AsER0qmF:IAe4NkYwCapmaBcSruZkUEfc
Score8/10-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
-
-
Target
$PLUGINSDIR/SpiderBanner.dll
-
Size
9KB
-
MD5
17309e33b596ba3a5693b4d3e85cf8d7
-
SHA1
7d361836cf53df42021c7f2b148aec9458818c01
-
SHA256
996a259e53ca18b89ec36d038c40148957c978c0fd600a268497d4c92f882a93
-
SHA512
1abac3ce4f2d5e4a635162e16cf9125e059ba1539f70086c2d71cd00d41a6e2a54d468e6f37792e55a822d7082fb388b8dfecc79b59226bbb047b7d28d44d298
-
SSDEEP
192:5lkE3uqRI1y7/xcfK4PRef6gQzJyY1rpKlVrw:5lkMBI1y7UKcef6XzJrpKY
Score3/10 -
-
-
Target
$PLUGINSDIR/StdUtils.dll
-
Size
100KB
-
MD5
c6a6e03f77c313b267498515488c5740
-
SHA1
3d49fc2784b9450962ed6b82b46e9c3c957d7c15
-
SHA256
b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e
-
SHA512
9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803
-
SSDEEP
3072:WNuZmJ9TDP3ahD2TF7Rq9cJNPhF9vyHf:WNuZ81zaAFHhF9v
Score3/10 -
-
-
Target
$PLUGINSDIR/System.dll
-
Size
12KB
-
MD5
0d7ad4f45dc6f5aa87f606d0331c6901
-
SHA1
48df0911f0484cbe2a8cdd5362140b63c41ee457
-
SHA256
3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
-
SHA512
c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
SSDEEP
192:1enY0LWelt70elWjvfstJcVtwtYbjnIOg5AaDnbC7ypXhtIj:18PJlt70esj0Mt9vn6ay6
Score3/10 -
-
-
Target
$PLUGINSDIR/WinShell.dll
-
Size
3KB
-
MD5
1cc7c37b7e0c8cd8bf04b6cc283e1e56
-
SHA1
0b9519763be6625bd5abce175dcc59c96d100d4c
-
SHA256
9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6
-
SHA512
7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f
Score3/10 -
-
-
Target
ArenaWars.exe
-
Size
164.7MB
-
MD5
e7ae2908187c403ae1e8f49b846b611f
-
SHA1
02e262e2b6ffe53bbfa30edfb94c20fb4c51c490
-
SHA256
ca505edb4b71c5f61a56dfd5e9fef03fc05ba0174849444f926c23efc3361681
-
SHA512
44f87de23778a6d1803a1fbeb77565691172250ade04a88dd9c4b54cc350f9a1fb494279fd7e3f0a4b7119d57c00468976454968b725a23e3bdf34c0c945962d
-
SSDEEP
1572864:wmIh9FimkfWTs6+LkanRWYS8a4lN+WTi6qSFK2u73JvPaKD2JsR2/tVBcpZOcrQD:OsFWY7ihS4kVP
Score8/10-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
-
-
Target
LICENSES.chromium.html
-
Size
8.8MB
-
MD5
2675b30d524b6c79b6cee41af86fc619
-
SHA1
407716c1bb83c211bcb51efbbcb6bf2ef1664e5b
-
SHA256
6a717038f81271f62318212f00b1a2173b9cb0cc435f984710ac8355eb409081
-
SHA512
3214341da8bf3347a6874535bb0ff8d059ee604e779491780f2b29172f9963e23acbe3c534d888f7a3b99274f46d0628962e1e72a5d3fc6f18ca2b62343df485
-
SSDEEP
24576:cpD6826x5kSWSsRinoHnmfm646a6N6z68SH4SApTJ:cHSek
Score4/10 -
-
-
Target
d3dcompiler_47.dll
-
Size
4.7MB
-
MD5
2191e768cc2e19009dad20dc999135a3
-
SHA1
f49a46ba0e954e657aaed1c9019a53d194272b6a
-
SHA256
7353f25dc5cf84d09894e3e0461cef0e56799adbc617fce37620ca67240b547d
-
SHA512
5adcb00162f284c16ec78016d301fc11559dd0a781ffbeff822db22efbed168b11d7e5586ea82388e9503b0c7d3740cf2a08e243877f5319202491c8a641c970
-
SSDEEP
49152:KCZnRO4XyM53Rkq4ypQqdoRpmruVNYvkaRwvhiD0N+YEzI4og/RfzHLeHTRhFRNc:xG2QCwmHPnog/pzHAo/A6l
Score1/10 -
-
-
Target
ffmpeg.dll
-
Size
2.8MB
-
MD5
14e00bf1d9d0df65f8b1a31240d474a8
-
SHA1
f9fe033725b7b1b5c0efce7a14ed7ab223cb32e8
-
SHA256
9d1eb0c6eb12bfa87e74a65c2fde5d61c4c93e21fb0800bbdccb6559527036a5
-
SHA512
652724450296a739de802ba8fac482953146f37665718446e448a350295e1e7b09bd460835bcd0ac26b2e54bb9b791624a9eea11e6c96573c7c4aed22450ed14
-
SSDEEP
49152:IF5qb84KtStWEK/Ju2lf3tAtiLHQVTf6yfcrhCHDXLl8+0LKSQ1SCu:IFvSkJXv+tiLAD0+D1S5
Score1/10 -
-
-
Target
libEGL.dll
-
Size
477KB
-
MD5
1dcf5ac3cb0dcda9c9679eeb018d01bd
-
SHA1
bc21697c5665aab5eaaba61f55719d43328f7e7c
-
SHA256
9cfc3001191e8b3eb9c96ba29e57e5bf9aaab264e83897e47cb968167a8a811b
-
SHA512
47d8769bf00cc7555479542abf5e0684799e424d9801dad8c6bd199680d9c40cfa2380d969515db7a0753cf6f3a9733b5afb931fe33863fe30a37092d8dc96b1
-
SSDEEP
6144:o8hd1BSjuMmof2SEXVVfgV8hxN7h2NIIEOg51f0FticyQ:o8DXSjZmof2SEsmN12NIIE7f0FticyQ
Score1/10 -
-
-
Target
libGLESv2.dll
-
Size
7.3MB
-
MD5
51378647d290f3a08affa8454a3d59d5
-
SHA1
32152a6677c82ea9e2e842baa907d708b46a6779
-
SHA256
80c2ef6ca6d0ff4877bd0c0bc082ff19c3a5002d53648bcf5f54368560f9a411
-
SHA512
ca90f5131d95fdb1e4a5cb7cb2bbef08676f70367b255270871754f776937994e34258084bf46437b25e1745728c279594d64e0718643eac0ac00cfc43d2c53b
-
SSDEEP
98304:1aUIRsMRk/yUt1ngliXWeamn0B8LfdAbvZ3gtT7:1anxRk/Pwzedpag1
Score1/10 -
-
-
Target
resources/app.asar.unpacked/node_modules/ilovingcats/dist/index.js
-
Size
412B
-
MD5
0b33e83d33b01a51625a0fdcbef42ce3
-
SHA1
1c29d999ff7da39426b97f2eb31a3d83db8f5fc7
-
SHA256
a7ff0225cb5ebcbef8499c6c8ac2be924f584eb375dacb1d8bd3dc6540b510f2
-
SHA512
1d04caf4fc2e876bdf2a089ae938a41fe4d3f2928aa846709bafd2de236fa8c754fcc84d7e8a5f5734bc1cecc04b395ab9d2114945b35e8c85cd3b9ee8f9799c
Score3/10 -
-
-
Target
resources/app.asar.unpacked/node_modules/ilovingcats/prebuilds/win32-x64/node.napi.node
-
Size
137KB
-
MD5
04bfbfec8db966420fe4c7b85ebb506a
-
SHA1
939bb742a354a92e1dcd3661a62d69e48030a335
-
SHA256
da2172ce055fa47d6a0ea1c90654f530abed33f69a74d52fab06c4c7653b48fd
-
SHA512
4ea97a9a120ed5bee8638e0a69561c2159fc3769062d7102167b0e92b4f1a5c002a761bd104282425f6cee8d0e39dbe7e12ad4e4a38570c3f90f31b65072dd65
-
SSDEEP
3072:94PTD6FEzMju6bzJKjpEPeTOKvJhEnww+YbRYvPuq:94jQju6b9KilKvJurR8W
Score1/10 -
-
-
Target
resources/app.asar.unpacked/node_modules/sqlite3/build/Release/node_sqlite3.node
-
Size
1.8MB
-
MD5
55c17fc28239b0e8ea873f9c9c4e2c02
-
SHA1
c1be46fc03e63eae5145018c1ee3e70b3af9338f
-
SHA256
85ec4e3bcec60ec481cd712b4fcbe83631d5ac1e189a87b08a33e1c85f206a66
-
SHA512
4d670cf1a2d88452b0d384044f0d0c0f83475e0844711df5420c0cfd0567ac6b655aa75fda81dd2f35bbe7db6c380f0b50e3c6f1d9506096ef17f8d3a8cab7d2
-
SSDEEP
49152:AVtIA1xRrGLYLn9M+BMPPivsICK9rzoNEqt:mtH4X3inMZt
Score1/10 -
-
-
Target
resources/app.asar.unpacked/node_modules/sqlite3/deps/extract.js
-
Size
224B
-
MD5
f0a82a6a6043bf87899114337c67df6c
-
SHA1
a906c146eb0a359742ff85c1d96a095bd0dd95fd
-
SHA256
5be353d29c0fabea29cfd34448c196da9506009c0b20fde55e01d4191941dd74
-
SHA512
d26879f890226808d9bd2644c5ca85cc339760e86b330212505706e5749464fafad1cb5f018c59a8f034d68d327cd3fa5234ceac0677de1ac9ae09039f574240
Score3/10 -
-
-
Target
sqlite-autoconf-3440200/Makefile.fallback
-
Size
547B
-
MD5
8ff4cdbeec29d794549a0aa48da06bc3
-
SHA1
7fd897fc720b6c9c6f760867c97a95431fa4693e
-
SHA256
67d473327dd92f5cad68fddb78b8bb3e8745aba851147945893e4db5a2b59892
-
SHA512
9871a654d8b140ad5d6768d385b86ba7f32927f8ed6374e62c93db99be4a40841f6900d648f33d07dc118b6ea93f00c45f53e4b675643b2b487c9c0df1ea1474
Score1/10 -
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1