Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
03/02/2023, 15:09
230203-sjgd3abd5y 8Analysis
-
max time kernel
48s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-es -
resource tags
arch:x64arch:x86image:win7-20220812-eslocale:es-esos:windows7-x64systemwindows -
submitted
03/02/2023, 15:09
Static task
static1
Behavioral task
behavioral1
Sample
Frozen Throne.exe
Resource
win7-20220812-es
Behavioral task
behavioral2
Sample
Frozen Throne.exe
Resource
win10v2004-20221111-es
General
-
Target
Frozen Throne.exe
-
Size
268KB
-
MD5
8d3a016ab7583a8df8d349d34d748eb0
-
SHA1
e41e7e406af5e34495e0df1335a2a59c06eae102
-
SHA256
3b4acc894c2052345e0be482f125c9af7a397a606a22e9e354d20fbfb1d35743
-
SHA512
fca9bcb8bb1dcbc5cb46adf1623bbb43c81bedc174c6f7b4b2284bb95ae40b6dd9bd8d20de856f860b885ba104216186fd318346fe6379ede2a53110aeea6118
-
SSDEEP
3072:OoRWSqI/qnSk8cJdOjO5OKUw7V89wmnfLSUkYhk9s42TqbVKuh+DEOXpq0q3/5ZV:JRWSqQq9RUzRnfLSokPvVADEO8TB
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 4 1752 rundll32.exe 6 1752 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\ServiceLocation rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\OOBGameInstalled = "1" rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1184 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1184 AUDIODG.EXE Token: 33 1184 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1184 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1748 wrote to memory of 1752 1748 Frozen Throne.exe 28 PID 1748 wrote to memory of 1752 1748 Frozen Throne.exe 28 PID 1748 wrote to memory of 1752 1748 Frozen Throne.exe 28 PID 1748 wrote to memory of 1752 1748 Frozen Throne.exe 28 PID 1748 wrote to memory of 1752 1748 Frozen Throne.exe 28 PID 1748 wrote to memory of 1752 1748 Frozen Throne.exe 28 PID 1748 wrote to memory of 1752 1748 Frozen Throne.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Frozen Throne.exe"C:\Users\Admin\AppData\Local\Temp\Frozen Throne.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\gameux.dll,GameUXShim {63dc63d0-97d3-4590-9ed7-3a682fc118df};C:\Users\Admin\AppData\Local\Temp\Frozen Throne.exe;17482⤵
- Blocklisted process makes network request
- Modifies registry class
PID:1752
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1156
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4641⤵
- Suspicious use of AdjustPrivilegeToken
PID:1184
-
C:\Windows\System32\control.exe"C:\Windows\System32\control.exe" SYSTEM1⤵PID:1816
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:976
-
C:\Windows\system32\systempropertiesadvanced.exe"C:\Windows\system32\systempropertiesadvanced.exe"1⤵PID:1628