Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2023, 19:38
Static task
static1
Behavioral task
behavioral1
Sample
Nudes-Generator.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Nudes-Generator.exe
Resource
win10v2004-20230220-en
General
-
Target
Nudes-Generator.exe
-
Size
63.3MB
-
MD5
c4562705f21b16b89189a304570d1c7d
-
SHA1
a366590d12463e2ec1b5ef62f739a1c1645d9b2f
-
SHA256
b3b847d14b1877a7b82e05ceef5365ce3cd5c2ee251763f42daabd4e1a5d6b14
-
SHA512
ed6e8d2d59befd05c7d002da7a2bf572440bdb932b9b7dd53a641f57a0d8d753fb93147d4ed10e35832bab25dd6682002514bf8fcb8e21a90065df0532afc71b
-
SSDEEP
786432:CX8r2z/iyKBQs3PE7Hx6IVswnbOo525r+7dOLBaTgr:CsSrizZ3PEEnl1BydOta8r
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3696 powershell.exe 3696 powershell.exe 4532 powershell.exe 4532 powershell.exe 3320 powershell.exe 3320 powershell.exe 1548 powershell.exe 1548 powershell.exe 4584 powershell.exe 3128 powershell.exe 2448 powershell.exe 4584 powershell.exe 3128 powershell.exe 2448 powershell.exe 1944 powershell.exe 1944 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3696 powershell.exe Token: SeDebugPrivilege 4532 powershell.exe Token: SeIncreaseQuotaPrivilege 3696 powershell.exe Token: SeSecurityPrivilege 3696 powershell.exe Token: SeTakeOwnershipPrivilege 3696 powershell.exe Token: SeLoadDriverPrivilege 3696 powershell.exe Token: SeSystemProfilePrivilege 3696 powershell.exe Token: SeSystemtimePrivilege 3696 powershell.exe Token: SeProfSingleProcessPrivilege 3696 powershell.exe Token: SeIncBasePriorityPrivilege 3696 powershell.exe Token: SeCreatePagefilePrivilege 3696 powershell.exe Token: SeBackupPrivilege 3696 powershell.exe Token: SeRestorePrivilege 3696 powershell.exe Token: SeShutdownPrivilege 3696 powershell.exe Token: SeDebugPrivilege 3696 powershell.exe Token: SeSystemEnvironmentPrivilege 3696 powershell.exe Token: SeRemoteShutdownPrivilege 3696 powershell.exe Token: SeUndockPrivilege 3696 powershell.exe Token: SeManageVolumePrivilege 3696 powershell.exe Token: 33 3696 powershell.exe Token: 34 3696 powershell.exe Token: 35 3696 powershell.exe Token: 36 3696 powershell.exe Token: SeDebugPrivilege 3320 powershell.exe Token: SeIncreaseQuotaPrivilege 3320 powershell.exe Token: SeSecurityPrivilege 3320 powershell.exe Token: SeTakeOwnershipPrivilege 3320 powershell.exe Token: SeLoadDriverPrivilege 3320 powershell.exe Token: SeSystemProfilePrivilege 3320 powershell.exe Token: SeSystemtimePrivilege 3320 powershell.exe Token: SeProfSingleProcessPrivilege 3320 powershell.exe Token: SeIncBasePriorityPrivilege 3320 powershell.exe Token: SeCreatePagefilePrivilege 3320 powershell.exe Token: SeBackupPrivilege 3320 powershell.exe Token: SeRestorePrivilege 3320 powershell.exe Token: SeShutdownPrivilege 3320 powershell.exe Token: SeDebugPrivilege 3320 powershell.exe Token: SeSystemEnvironmentPrivilege 3320 powershell.exe Token: SeRemoteShutdownPrivilege 3320 powershell.exe Token: SeUndockPrivilege 3320 powershell.exe Token: SeManageVolumePrivilege 3320 powershell.exe Token: 33 3320 powershell.exe Token: 34 3320 powershell.exe Token: 35 3320 powershell.exe Token: 36 3320 powershell.exe Token: SeDebugPrivilege 1548 powershell.exe Token: SeIncreaseQuotaPrivilege 1548 powershell.exe Token: SeSecurityPrivilege 1548 powershell.exe Token: SeTakeOwnershipPrivilege 1548 powershell.exe Token: SeLoadDriverPrivilege 1548 powershell.exe Token: SeSystemProfilePrivilege 1548 powershell.exe Token: SeSystemtimePrivilege 1548 powershell.exe Token: SeProfSingleProcessPrivilege 1548 powershell.exe Token: SeIncBasePriorityPrivilege 1548 powershell.exe Token: SeCreatePagefilePrivilege 1548 powershell.exe Token: SeBackupPrivilege 1548 powershell.exe Token: SeRestorePrivilege 1548 powershell.exe Token: SeShutdownPrivilege 1548 powershell.exe Token: SeDebugPrivilege 1548 powershell.exe Token: SeSystemEnvironmentPrivilege 1548 powershell.exe Token: SeRemoteShutdownPrivilege 1548 powershell.exe Token: SeUndockPrivilege 1548 powershell.exe Token: SeManageVolumePrivilege 1548 powershell.exe Token: 33 1548 powershell.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1560 wrote to memory of 4028 1560 Nudes-Generator.exe 85 PID 1560 wrote to memory of 4028 1560 Nudes-Generator.exe 85 PID 4028 wrote to memory of 4588 4028 cmd.exe 87 PID 4028 wrote to memory of 4588 4028 cmd.exe 87 PID 1560 wrote to memory of 4532 1560 Nudes-Generator.exe 88 PID 1560 wrote to memory of 4532 1560 Nudes-Generator.exe 88 PID 1560 wrote to memory of 3696 1560 Nudes-Generator.exe 89 PID 1560 wrote to memory of 3696 1560 Nudes-Generator.exe 89 PID 4532 wrote to memory of 216 4532 powershell.exe 91 PID 4532 wrote to memory of 216 4532 powershell.exe 91 PID 216 wrote to memory of 2668 216 csc.exe 92 PID 216 wrote to memory of 2668 216 csc.exe 92 PID 1560 wrote to memory of 3320 1560 Nudes-Generator.exe 93 PID 1560 wrote to memory of 3320 1560 Nudes-Generator.exe 93 PID 1560 wrote to memory of 1548 1560 Nudes-Generator.exe 96 PID 1560 wrote to memory of 1548 1560 Nudes-Generator.exe 96 PID 1560 wrote to memory of 2228 1560 Nudes-Generator.exe 98 PID 1560 wrote to memory of 2228 1560 Nudes-Generator.exe 98 PID 1560 wrote to memory of 4584 1560 Nudes-Generator.exe 100 PID 1560 wrote to memory of 4584 1560 Nudes-Generator.exe 100 PID 1560 wrote to memory of 2448 1560 Nudes-Generator.exe 105 PID 1560 wrote to memory of 2448 1560 Nudes-Generator.exe 105 PID 1560 wrote to memory of 3128 1560 Nudes-Generator.exe 102 PID 1560 wrote to memory of 3128 1560 Nudes-Generator.exe 102 PID 1560 wrote to memory of 4796 1560 Nudes-Generator.exe 107 PID 1560 wrote to memory of 4796 1560 Nudes-Generator.exe 107 PID 4796 wrote to memory of 4356 4796 cmd.exe 108 PID 4796 wrote to memory of 4356 4796 cmd.exe 108 PID 1560 wrote to memory of 1944 1560 Nudes-Generator.exe 109 PID 1560 wrote to memory of 1944 1560 Nudes-Generator.exe 109 PID 1560 wrote to memory of 4708 1560 Nudes-Generator.exe 111 PID 1560 wrote to memory of 4708 1560 Nudes-Generator.exe 111 PID 4708 wrote to memory of 2176 4708 cmd.exe 113 PID 4708 wrote to memory of 2176 4708 cmd.exe 113 PID 1560 wrote to memory of 372 1560 Nudes-Generator.exe 114 PID 1560 wrote to memory of 372 1560 Nudes-Generator.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nudes-Generator.exe"C:\Users\Admin\AppData\Local\Temp\Nudes-Generator.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "chcp"2⤵
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\system32\chcp.comchcp3⤵PID:4588
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -c "Add-Type -Name Window -Namespace Console -MemberDefinition ' [DllImport(\"Kernel32.dll\")] public static extern IntPtr GetConsoleWindow(); [DllImport(\"user32.dll\")] public static extern bool ShowWindow(IntPtr hWnd, Int32 nCmdShow); ' $consolePtr = [Console.Window]::GetConsoleWindow() #0 hide [Console.Window]::ShowWindow($consolePtr, 0) "2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\eyeysyrx\eyeysyrx.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES95AD.tmp" "c:\Users\Admin\AppData\Local\Temp\eyeysyrx\CSC69E842D9307148A2885A8F3853C98481.TMP"4⤵PID:2668
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3696
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3320
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "echo %COMPUTERNAME%.%USERDNSDOMAIN%"2⤵PID:2228
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4584
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3128
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2448
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log""2⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\system32\findstr.exefindstr /C:"Detected boot environment" "C:\Windows\Panther\setupact.log"3⤵PID:4356
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1944
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography" /v MachineGuid"2⤵
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography" /v MachineGuid3⤵PID:2176
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c ""undefined\VBoxManage.exe" list vms --long"2⤵PID:372
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
2KB
MD52f87410b0d834a14ceff69e18946d066
SHA1f2ec80550202d493db61806693439a57b76634f3
SHA2565422bc17b852ad463110de0db9b59ffa4219e065d3e2843618d6ebbd14273c65
SHA512a313702f22450ceff0a1d7f890b0c16cf667dbcd668dbafa6dbecd0791236c0bc68e834d12113cc75352365c2a2b6cfcf30b6ef7c97ea53ed135da50de389db4
-
Filesize
2KB
MD539605d8ad4c5963923159395469ba537
SHA1f814a6d3ac03bb485c01667229ac524c276ebdae
SHA256a75dd388afab531c8a478a29921dd43a81eb759bb9398885fff7527ae2a28644
SHA5120b1d0c55f2ba8f262a31378bda2fb513718c73fb6bd1cc631c979577d6d1ea07e45832ce25ee1410e152a4b7f6c6247cee797bedf2b0cf8823c5673e65a3eab6
-
Filesize
2KB
MD5f74ea6b1661468273d09825256e09a2f
SHA192f1bf87ca8ddf2e08bf889a2bfc94ede253bee3
SHA2561d451db68faea3fd014726a131de541496772e7d58848f40a0abda1397f7fc70
SHA512d8fe0de28a52bfab589d43d089c74aaf62af3175c4985d0c0729e6ddc7a2434fd2ea633015c7ee52cdcfbd65ee17098ef284c2c58afd7bc754ede096c70d9bb7
-
Filesize
2KB
MD5539a1b64c833024c8732822a2d702bd3
SHA12f01b84cbe27c27413edab7891739352630a17f4
SHA2560cdd34e470990374848ebb5f11a5006b9c50eab815b8eb3a0475ee1c26aa0bf2
SHA512ad43436849353bb5a6b7564dd0d06cd4aebf97bc5e7acd878060ac9503ffd73328c409541ae7dfd0c9b38278e8b1c4803faeb2562f485bd298c95a6748ee641b
-
Filesize
2KB
MD5c2142228f14e03f22fcac51eea1c8533
SHA1c124038153646c1f9a5339c5bdb9fb9f54ab8b29
SHA25630c8e8ac34637b241ec59f32afef65cb8924a7bc0799c34339fb7554e4e75011
SHA5124f9372c342b467beda0ded4ce042bf6d52b06adc3efd1c6535afe2750a7f313187c084953ab2310174124683ed53114ce4b4581607276ea91db52f92a1592099
-
Filesize
2KB
MD5c2142228f14e03f22fcac51eea1c8533
SHA1c124038153646c1f9a5339c5bdb9fb9f54ab8b29
SHA25630c8e8ac34637b241ec59f32afef65cb8924a7bc0799c34339fb7554e4e75011
SHA5124f9372c342b467beda0ded4ce042bf6d52b06adc3efd1c6535afe2750a7f313187c084953ab2310174124683ed53114ce4b4581607276ea91db52f92a1592099
-
Filesize
1KB
MD5367637cdba26de1a7b8eebbb42049d84
SHA1db41bee14f037f7eb811828f91e87260d18ce1a9
SHA2564c83cae5fb53878399507a0f0f7c44bb8950e5c01316e560bbab4110083a847c
SHA5128b7411530cd1e4b3ba8125a69798960d2c5d5705fed7f59a91d9e8f2c502d8f6bf92f824f11d3063b5f5ec17f08ee3f8f30651b4adb10a6d89c614ba7bd4bd84
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3KB
MD5e5858e6cc81920969a317d19a002928b
SHA1995e3d8e08a4093e1eb380f906bbf36a047989c9
SHA256e3f3c1c3a133f48ba3e4e4064bb01bc90b016eb74b9412e68ca84437bf7e7a04
SHA51210a98bae5d55503f72e13a83e279ed13e746d24c7dc7dabc30269abc7bbc1a8ed79ecbe5ad33b557038ea487f9939d2ac87f5af8bbec9e9fe6c87db1fbf61832
-
Filesize
652B
MD5b78de8b5635530ea8dbcda0629e5460d
SHA17c848c879b5f89e17a475183d7ced320a0a7527a
SHA256f70c878ed705f2a29419d25666517fbd961feee6a94aec6ef44870d22224c336
SHA512f660233abdddeb1358958ea4bb661996af870efd4bbe8240e4b978bdf883c141ab25f38a2c7ceff785393c165ac9740cd9c2bb4e4a2d4be3b2faa13c957c256a
-
Filesize
312B
MD5ecbf151f81ff98f7dff196304a40239e
SHA1ccf6b97b6f8276656b042d64f0595963fe9ec79c
SHA256295ca195631c485c876e7c468ddcbb3fe7cd219d3e5005a2441be2de54e62ac8
SHA5124526a59055a18af6c0c13fb9f55a9a9bc15aa1407b697849e19b6cc32c88ee7206b3efff806bd154d36bce144ae1d9c407c6ea0f5077c54fbe92cd172c203720
-
Filesize
369B
MD533fbe97c8712c0c87f59ba803dbd5994
SHA12eb250b02ec87bc925c00ac1dc2976cf8e2e37df
SHA256ea46294e4ab9c45d897487e9a7072479526c7e3312cdea822bd49c0c5e6d4783
SHA5126c1172cbc4a4e5be13728cfddc5b57b5f233c7efb02d5b9f790cd3125c3c4517a49b1a573f49720b96ec543194560fba7bbc681671948c47b6b43f8b2a605eb0