Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    ArenaWarsSetup.exe

  • Size

    76.5MB

  • Sample

    250328-fsrj6ssse1

  • MD5

    73b91750c741a597ef361fca8905b107

  • SHA1

    56cfc17681d3fe4ce9c00bc04e4870e0879ecd3f

  • SHA256

    3bf431de4fbe5cf2143efe06b3580e1223a6ce835dfe157a0d51b1a92d396bda

  • SHA512

    f2207edc26f1c1bce619380c25471cc88faacc4c1ac4946628a52f90734d04e87818a4a8e62157fdd37f265b7d7abeed8ca59bd2b25b76f57c1653c8e0e22e66

  • SSDEEP

    1572864:Ip+e4h7TL9BH01GwCXKyYmaBcSrufGanp7GgtcQ3AsER0qmF:IAe4NkYwCapmaBcSruZkUEfc

Malware Config

Targets

    • Target

      ArenaWarsSetup.exe

    • Size

      76.5MB

    • MD5

      73b91750c741a597ef361fca8905b107

    • SHA1

      56cfc17681d3fe4ce9c00bc04e4870e0879ecd3f

    • SHA256

      3bf431de4fbe5cf2143efe06b3580e1223a6ce835dfe157a0d51b1a92d396bda

    • SHA512

      f2207edc26f1c1bce619380c25471cc88faacc4c1ac4946628a52f90734d04e87818a4a8e62157fdd37f265b7d7abeed8ca59bd2b25b76f57c1653c8e0e22e66

    • SSDEEP

      1572864:Ip+e4h7TL9BH01GwCXKyYmaBcSrufGanp7GgtcQ3AsER0qmF:IAe4NkYwCapmaBcSruZkUEfc

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • Target

      $PLUGINSDIR/SpiderBanner.dll

    • Size

      9KB

    • MD5

      17309e33b596ba3a5693b4d3e85cf8d7

    • SHA1

      7d361836cf53df42021c7f2b148aec9458818c01

    • SHA256

      996a259e53ca18b89ec36d038c40148957c978c0fd600a268497d4c92f882a93

    • SHA512

      1abac3ce4f2d5e4a635162e16cf9125e059ba1539f70086c2d71cd00d41a6e2a54d468e6f37792e55a822d7082fb388b8dfecc79b59226bbb047b7d28d44d298

    • SSDEEP

      192:5lkE3uqRI1y7/xcfK4PRef6gQzJyY1rpKlVrw:5lkMBI1y7UKcef6XzJrpKY

    Score
    3/10
    • Target

      $PLUGINSDIR/StdUtils.dll

    • Size

      100KB

    • MD5

      c6a6e03f77c313b267498515488c5740

    • SHA1

      3d49fc2784b9450962ed6b82b46e9c3c957d7c15

    • SHA256

      b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e

    • SHA512

      9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

    • SSDEEP

      3072:WNuZmJ9TDP3ahD2TF7Rq9cJNPhF9vyHf:WNuZ81zaAFHhF9v

    Score
    3/10
    • Target

      $PLUGINSDIR/System.dll

    • Size

      12KB

    • MD5

      0d7ad4f45dc6f5aa87f606d0331c6901

    • SHA1

      48df0911f0484cbe2a8cdd5362140b63c41ee457

    • SHA256

      3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

    • SHA512

      c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

    • SSDEEP

      192:1enY0LWelt70elWjvfstJcVtwtYbjnIOg5AaDnbC7ypXhtIj:18PJlt70esj0Mt9vn6ay6

    Score
    3/10
    • Target

      $PLUGINSDIR/WinShell.dll

    • Size

      3KB

    • MD5

      1cc7c37b7e0c8cd8bf04b6cc283e1e56

    • SHA1

      0b9519763be6625bd5abce175dcc59c96d100d4c

    • SHA256

      9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6

    • SHA512

      7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

    Score
    3/10
    • Target

      ArenaWars.exe

    • Size

      164.7MB

    • MD5

      e7ae2908187c403ae1e8f49b846b611f

    • SHA1

      02e262e2b6ffe53bbfa30edfb94c20fb4c51c490

    • SHA256

      ca505edb4b71c5f61a56dfd5e9fef03fc05ba0174849444f926c23efc3361681

    • SHA512

      44f87de23778a6d1803a1fbeb77565691172250ade04a88dd9c4b54cc350f9a1fb494279fd7e3f0a4b7119d57c00468976454968b725a23e3bdf34c0c945962d

    • SSDEEP

      1572864:wmIh9FimkfWTs6+LkanRWYS8a4lN+WTi6qSFK2u73JvPaKD2JsR2/tVBcpZOcrQD:OsFWY7ihS4kVP

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • Target

      LICENSES.chromium.html

    • Size

      8.8MB

    • MD5

      2675b30d524b6c79b6cee41af86fc619

    • SHA1

      407716c1bb83c211bcb51efbbcb6bf2ef1664e5b

    • SHA256

      6a717038f81271f62318212f00b1a2173b9cb0cc435f984710ac8355eb409081

    • SHA512

      3214341da8bf3347a6874535bb0ff8d059ee604e779491780f2b29172f9963e23acbe3c534d888f7a3b99274f46d0628962e1e72a5d3fc6f18ca2b62343df485

    • SSDEEP

      24576:cpD6826x5kSWSsRinoHnmfm646a6N6z68SH4SApTJ:cHSek

    Score
    4/10
    • Target

      d3dcompiler_47.dll

    • Size

      4.7MB

    • MD5

      2191e768cc2e19009dad20dc999135a3

    • SHA1

      f49a46ba0e954e657aaed1c9019a53d194272b6a

    • SHA256

      7353f25dc5cf84d09894e3e0461cef0e56799adbc617fce37620ca67240b547d

    • SHA512

      5adcb00162f284c16ec78016d301fc11559dd0a781ffbeff822db22efbed168b11d7e5586ea82388e9503b0c7d3740cf2a08e243877f5319202491c8a641c970

    • SSDEEP

      49152:KCZnRO4XyM53Rkq4ypQqdoRpmruVNYvkaRwvhiD0N+YEzI4og/RfzHLeHTRhFRNc:xG2QCwmHPnog/pzHAo/A6l

    Score
    1/10
    • Target

      ffmpeg.dll

    • Size

      2.8MB

    • MD5

      14e00bf1d9d0df65f8b1a31240d474a8

    • SHA1

      f9fe033725b7b1b5c0efce7a14ed7ab223cb32e8

    • SHA256

      9d1eb0c6eb12bfa87e74a65c2fde5d61c4c93e21fb0800bbdccb6559527036a5

    • SHA512

      652724450296a739de802ba8fac482953146f37665718446e448a350295e1e7b09bd460835bcd0ac26b2e54bb9b791624a9eea11e6c96573c7c4aed22450ed14

    • SSDEEP

      49152:IF5qb84KtStWEK/Ju2lf3tAtiLHQVTf6yfcrhCHDXLl8+0LKSQ1SCu:IFvSkJXv+tiLAD0+D1S5

    Score
    1/10
    • Target

      libEGL.dll

    • Size

      477KB

    • MD5

      1dcf5ac3cb0dcda9c9679eeb018d01bd

    • SHA1

      bc21697c5665aab5eaaba61f55719d43328f7e7c

    • SHA256

      9cfc3001191e8b3eb9c96ba29e57e5bf9aaab264e83897e47cb968167a8a811b

    • SHA512

      47d8769bf00cc7555479542abf5e0684799e424d9801dad8c6bd199680d9c40cfa2380d969515db7a0753cf6f3a9733b5afb931fe33863fe30a37092d8dc96b1

    • SSDEEP

      6144:o8hd1BSjuMmof2SEXVVfgV8hxN7h2NIIEOg51f0FticyQ:o8DXSjZmof2SEsmN12NIIE7f0FticyQ

    Score
    1/10
    • Target

      libGLESv2.dll

    • Size

      7.3MB

    • MD5

      51378647d290f3a08affa8454a3d59d5

    • SHA1

      32152a6677c82ea9e2e842baa907d708b46a6779

    • SHA256

      80c2ef6ca6d0ff4877bd0c0bc082ff19c3a5002d53648bcf5f54368560f9a411

    • SHA512

      ca90f5131d95fdb1e4a5cb7cb2bbef08676f70367b255270871754f776937994e34258084bf46437b25e1745728c279594d64e0718643eac0ac00cfc43d2c53b

    • SSDEEP

      98304:1aUIRsMRk/yUt1ngliXWeamn0B8LfdAbvZ3gtT7:1anxRk/Pwzedpag1

    Score
    1/10
    • Target

      resources/app.asar.unpacked/node_modules/ilovingcats/dist/index.js

    • Size

      412B

    • MD5

      0b33e83d33b01a51625a0fdcbef42ce3

    • SHA1

      1c29d999ff7da39426b97f2eb31a3d83db8f5fc7

    • SHA256

      a7ff0225cb5ebcbef8499c6c8ac2be924f584eb375dacb1d8bd3dc6540b510f2

    • SHA512

      1d04caf4fc2e876bdf2a089ae938a41fe4d3f2928aa846709bafd2de236fa8c754fcc84d7e8a5f5734bc1cecc04b395ab9d2114945b35e8c85cd3b9ee8f9799c

    Score
    3/10
    • Target

      resources/app.asar.unpacked/node_modules/ilovingcats/prebuilds/win32-x64/node.napi.node

    • Size

      137KB

    • MD5

      04bfbfec8db966420fe4c7b85ebb506a

    • SHA1

      939bb742a354a92e1dcd3661a62d69e48030a335

    • SHA256

      da2172ce055fa47d6a0ea1c90654f530abed33f69a74d52fab06c4c7653b48fd

    • SHA512

      4ea97a9a120ed5bee8638e0a69561c2159fc3769062d7102167b0e92b4f1a5c002a761bd104282425f6cee8d0e39dbe7e12ad4e4a38570c3f90f31b65072dd65

    • SSDEEP

      3072:94PTD6FEzMju6bzJKjpEPeTOKvJhEnww+YbRYvPuq:94jQju6b9KilKvJurR8W

    Score
    1/10
    • Target

      resources/app.asar.unpacked/node_modules/sqlite3/build/Release/node_sqlite3.node

    • Size

      1.8MB

    • MD5

      55c17fc28239b0e8ea873f9c9c4e2c02

    • SHA1

      c1be46fc03e63eae5145018c1ee3e70b3af9338f

    • SHA256

      85ec4e3bcec60ec481cd712b4fcbe83631d5ac1e189a87b08a33e1c85f206a66

    • SHA512

      4d670cf1a2d88452b0d384044f0d0c0f83475e0844711df5420c0cfd0567ac6b655aa75fda81dd2f35bbe7db6c380f0b50e3c6f1d9506096ef17f8d3a8cab7d2

    • SSDEEP

      49152:AVtIA1xRrGLYLn9M+BMPPivsICK9rzoNEqt:mtH4X3inMZt

    Score
    1/10
    • Target

      resources/app.asar.unpacked/node_modules/sqlite3/deps/extract.js

    • Size

      224B

    • MD5

      f0a82a6a6043bf87899114337c67df6c

    • SHA1

      a906c146eb0a359742ff85c1d96a095bd0dd95fd

    • SHA256

      5be353d29c0fabea29cfd34448c196da9506009c0b20fde55e01d4191941dd74

    • SHA512

      d26879f890226808d9bd2644c5ca85cc339760e86b330212505706e5749464fafad1cb5f018c59a8f034d68d327cd3fa5234ceac0677de1ac9ae09039f574240

    Score
    3/10
    • Target

      sqlite-autoconf-3440200/Makefile.fallback

    • Size

      547B

    • MD5

      8ff4cdbeec29d794549a0aa48da06bc3

    • SHA1

      7fd897fc720b6c9c6f760867c97a95431fa4693e

    • SHA256

      67d473327dd92f5cad68fddb78b8bb3e8745aba851147945893e4db5a2b59892

    • SHA512

      9871a654d8b140ad5d6768d385b86ba7f32927f8ed6374e62c93db99be4a40841f6900d648f33d07dc118b6ea93f00c45f53e4b675643b2b487c9c0df1ea1474

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks

static1

Score
3/10

behavioral1

discovery
Score
7/10

behavioral2

credential_accessdiscoveryspywarestealer
Score
8/10

behavioral3

discovery
Score
3/10

behavioral4

discovery
Score
3/10

behavioral5

discovery
Score
3/10

behavioral6

discovery
Score
3/10

behavioral7

discovery
Score
3/10

behavioral8

discovery
Score
3/10

behavioral9

discovery
Score
3/10

behavioral10

discovery
Score
3/10

behavioral11

Score
1/10

behavioral12

credential_accessdiscoveryspywarestealer
Score
8/10

behavioral13

discovery
Score
3/10

behavioral14

discovery
Score
4/10

behavioral15

Score
1/10

behavioral16

Score
1/10

behavioral17

Score
1/10

behavioral18

Score
1/10

behavioral19

Score
1/10

behavioral20

Score
1/10

behavioral21

Score
1/10

behavioral22

execution
Score
3/10

behavioral23

execution
Score
3/10

behavioral24

Score
1/10

behavioral25

Score
1/10

behavioral26

Score
1/10

behavioral27

Score
1/10

behavioral28

execution
Score
3/10

behavioral29

execution
Score
3/10

behavioral30

Score
1/10

behavioral31

Score
1/10

behavioral32

Score
1/10