Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/06/2023, 19:38

General

  • Target

    Nudes-Generator.exe

  • Size

    63.3MB

  • MD5

    c4562705f21b16b89189a304570d1c7d

  • SHA1

    a366590d12463e2ec1b5ef62f739a1c1645d9b2f

  • SHA256

    b3b847d14b1877a7b82e05ceef5365ce3cd5c2ee251763f42daabd4e1a5d6b14

  • SHA512

    ed6e8d2d59befd05c7d002da7a2bf572440bdb932b9b7dd53a641f57a0d8d753fb93147d4ed10e35832bab25dd6682002514bf8fcb8e21a90065df0532afc71b

  • SSDEEP

    786432:CX8r2z/iyKBQs3PE7Hx6IVswnbOo525r+7dOLBaTgr:CsSrizZ3PEEnl1BydOta8r

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Nudes-Generator.exe
    "C:\Users\Admin\AppData\Local\Temp\Nudes-Generator.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1560
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "chcp"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4028
      • C:\Windows\system32\chcp.com
        chcp
        3⤵
          PID:4588
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -c "Add-Type -Name Window -Namespace Console -MemberDefinition ' [DllImport(\"Kernel32.dll\")] public static extern IntPtr GetConsoleWindow(); [DllImport(\"user32.dll\")] public static extern bool ShowWindow(IntPtr hWnd, Int32 nCmdShow); ' $consolePtr = [Console.Window]::GetConsoleWindow() #0 hide [Console.Window]::ShowWindow($consolePtr, 0) "
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4532
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\eyeysyrx\eyeysyrx.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:216
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES95AD.tmp" "c:\Users\Admin\AppData\Local\Temp\eyeysyrx\CSC69E842D9307148A2885A8F3853C98481.TMP"
            4⤵
              PID:2668
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3696
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3320
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1548
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "echo %COMPUTERNAME%.%USERDNSDOMAIN%"
          2⤵
            PID:2228
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4584
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3128
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2448
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log""
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4796
            • C:\Windows\system32\findstr.exe
              findstr /C:"Detected boot environment" "C:\Windows\Panther\setupact.log"
              3⤵
                PID:4356
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:1944
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography" /v MachineGuid"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4708
              • C:\Windows\System32\reg.exe
                C:\Windows\System32\reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography" /v MachineGuid
                3⤵
                  PID:2176
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c ""undefined\VBoxManage.exe" list vms --long"
                2⤵
                  PID:372

              Network

              MITRE ATT&CK Matrix

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                Filesize

                2KB

                MD5

                2f57fde6b33e89a63cf0dfdd6e60a351

                SHA1

                445bf1b07223a04f8a159581a3d37d630273010f

                SHA256

                3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

                SHA512

                42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                2KB

                MD5

                2f87410b0d834a14ceff69e18946d066

                SHA1

                f2ec80550202d493db61806693439a57b76634f3

                SHA256

                5422bc17b852ad463110de0db9b59ffa4219e065d3e2843618d6ebbd14273c65

                SHA512

                a313702f22450ceff0a1d7f890b0c16cf667dbcd668dbafa6dbecd0791236c0bc68e834d12113cc75352365c2a2b6cfcf30b6ef7c97ea53ed135da50de389db4

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                2KB

                MD5

                39605d8ad4c5963923159395469ba537

                SHA1

                f814a6d3ac03bb485c01667229ac524c276ebdae

                SHA256

                a75dd388afab531c8a478a29921dd43a81eb759bb9398885fff7527ae2a28644

                SHA512

                0b1d0c55f2ba8f262a31378bda2fb513718c73fb6bd1cc631c979577d6d1ea07e45832ce25ee1410e152a4b7f6c6247cee797bedf2b0cf8823c5673e65a3eab6

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                2KB

                MD5

                f74ea6b1661468273d09825256e09a2f

                SHA1

                92f1bf87ca8ddf2e08bf889a2bfc94ede253bee3

                SHA256

                1d451db68faea3fd014726a131de541496772e7d58848f40a0abda1397f7fc70

                SHA512

                d8fe0de28a52bfab589d43d089c74aaf62af3175c4985d0c0729e6ddc7a2434fd2ea633015c7ee52cdcfbd65ee17098ef284c2c58afd7bc754ede096c70d9bb7

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                2KB

                MD5

                539a1b64c833024c8732822a2d702bd3

                SHA1

                2f01b84cbe27c27413edab7891739352630a17f4

                SHA256

                0cdd34e470990374848ebb5f11a5006b9c50eab815b8eb3a0475ee1c26aa0bf2

                SHA512

                ad43436849353bb5a6b7564dd0d06cd4aebf97bc5e7acd878060ac9503ffd73328c409541ae7dfd0c9b38278e8b1c4803faeb2562f485bd298c95a6748ee641b

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                2KB

                MD5

                c2142228f14e03f22fcac51eea1c8533

                SHA1

                c124038153646c1f9a5339c5bdb9fb9f54ab8b29

                SHA256

                30c8e8ac34637b241ec59f32afef65cb8924a7bc0799c34339fb7554e4e75011

                SHA512

                4f9372c342b467beda0ded4ce042bf6d52b06adc3efd1c6535afe2750a7f313187c084953ab2310174124683ed53114ce4b4581607276ea91db52f92a1592099

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                2KB

                MD5

                c2142228f14e03f22fcac51eea1c8533

                SHA1

                c124038153646c1f9a5339c5bdb9fb9f54ab8b29

                SHA256

                30c8e8ac34637b241ec59f32afef65cb8924a7bc0799c34339fb7554e4e75011

                SHA512

                4f9372c342b467beda0ded4ce042bf6d52b06adc3efd1c6535afe2750a7f313187c084953ab2310174124683ed53114ce4b4581607276ea91db52f92a1592099

              • C:\Users\Admin\AppData\Local\Temp\RES95AD.tmp

                Filesize

                1KB

                MD5

                367637cdba26de1a7b8eebbb42049d84

                SHA1

                db41bee14f037f7eb811828f91e87260d18ce1a9

                SHA256

                4c83cae5fb53878399507a0f0f7c44bb8950e5c01316e560bbab4110083a847c

                SHA512

                8b7411530cd1e4b3ba8125a69798960d2c5d5705fed7f59a91d9e8f2c502d8f6bf92f824f11d3063b5f5ec17f08ee3f8f30651b4adb10a6d89c614ba7bd4bd84

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5ou0zbb2.brn.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Users\Admin\AppData\Local\Temp\eyeysyrx\eyeysyrx.dll

                Filesize

                3KB

                MD5

                e5858e6cc81920969a317d19a002928b

                SHA1

                995e3d8e08a4093e1eb380f906bbf36a047989c9

                SHA256

                e3f3c1c3a133f48ba3e4e4064bb01bc90b016eb74b9412e68ca84437bf7e7a04

                SHA512

                10a98bae5d55503f72e13a83e279ed13e746d24c7dc7dabc30269abc7bbc1a8ed79ecbe5ad33b557038ea487f9939d2ac87f5af8bbec9e9fe6c87db1fbf61832

              • \??\c:\Users\Admin\AppData\Local\Temp\eyeysyrx\CSC69E842D9307148A2885A8F3853C98481.TMP

                Filesize

                652B

                MD5

                b78de8b5635530ea8dbcda0629e5460d

                SHA1

                7c848c879b5f89e17a475183d7ced320a0a7527a

                SHA256

                f70c878ed705f2a29419d25666517fbd961feee6a94aec6ef44870d22224c336

                SHA512

                f660233abdddeb1358958ea4bb661996af870efd4bbe8240e4b978bdf883c141ab25f38a2c7ceff785393c165ac9740cd9c2bb4e4a2d4be3b2faa13c957c256a

              • \??\c:\Users\Admin\AppData\Local\Temp\eyeysyrx\eyeysyrx.0.cs

                Filesize

                312B

                MD5

                ecbf151f81ff98f7dff196304a40239e

                SHA1

                ccf6b97b6f8276656b042d64f0595963fe9ec79c

                SHA256

                295ca195631c485c876e7c468ddcbb3fe7cd219d3e5005a2441be2de54e62ac8

                SHA512

                4526a59055a18af6c0c13fb9f55a9a9bc15aa1407b697849e19b6cc32c88ee7206b3efff806bd154d36bce144ae1d9c407c6ea0f5077c54fbe92cd172c203720

              • \??\c:\Users\Admin\AppData\Local\Temp\eyeysyrx\eyeysyrx.cmdline

                Filesize

                369B

                MD5

                33fbe97c8712c0c87f59ba803dbd5994

                SHA1

                2eb250b02ec87bc925c00ac1dc2976cf8e2e37df

                SHA256

                ea46294e4ab9c45d897487e9a7072479526c7e3312cdea822bd49c0c5e6d4783

                SHA512

                6c1172cbc4a4e5be13728cfddc5b57b5f233c7efb02d5b9f790cd3125c3c4517a49b1a573f49720b96ec543194560fba7bbc681671948c47b6b43f8b2a605eb0

              • memory/1548-214-0x00000249309D0000-0x00000249309E0000-memory.dmp

                Filesize

                64KB

              • memory/1548-215-0x00000249309D0000-0x00000249309E0000-memory.dmp

                Filesize

                64KB

              • memory/1548-216-0x00000249309D0000-0x00000249309E0000-memory.dmp

                Filesize

                64KB

              • memory/1944-281-0x000001B74EDC0000-0x000001B74EDD0000-memory.dmp

                Filesize

                64KB

              • memory/1944-283-0x000001B74EDC0000-0x000001B74EDD0000-memory.dmp

                Filesize

                64KB

              • memory/1944-282-0x000001B74EDC0000-0x000001B74EDD0000-memory.dmp

                Filesize

                64KB

              • memory/2448-256-0x00000239F3100000-0x00000239F3110000-memory.dmp

                Filesize

                64KB

              • memory/2448-252-0x00000239F3100000-0x00000239F3110000-memory.dmp

                Filesize

                64KB

              • memory/2448-253-0x00000239F3100000-0x00000239F3110000-memory.dmp

                Filesize

                64KB

              • memory/3128-254-0x0000017975C30000-0x0000017975C40000-memory.dmp

                Filesize

                64KB

              • memory/3320-186-0x00000243E6740000-0x00000243E6750000-memory.dmp

                Filesize

                64KB

              • memory/3320-187-0x00000243E6740000-0x00000243E6750000-memory.dmp

                Filesize

                64KB

              • memory/3320-198-0x00000243E6740000-0x00000243E6750000-memory.dmp

                Filesize

                64KB

              • memory/3696-159-0x000001F647FE0000-0x000001F647FF0000-memory.dmp

                Filesize

                64KB

              • memory/3696-137-0x000001F62FD80000-0x000001F62FDA2000-memory.dmp

                Filesize

                136KB

              • memory/3696-157-0x000001F647FE0000-0x000001F647FF0000-memory.dmp

                Filesize

                64KB

              • memory/3696-158-0x000001F647FE0000-0x000001F647FF0000-memory.dmp

                Filesize

                64KB

              • memory/3696-156-0x000001F64A200000-0x000001F64A244000-memory.dmp

                Filesize

                272KB

              • memory/3696-163-0x000001F64A630000-0x000001F64A6A6000-memory.dmp

                Filesize

                472KB

              • memory/3696-181-0x000001F64A250000-0x000001F64A274000-memory.dmp

                Filesize

                144KB

              • memory/3696-180-0x000001F64A250000-0x000001F64A27A000-memory.dmp

                Filesize

                168KB

              • memory/4532-160-0x0000025BFB880000-0x0000025BFB890000-memory.dmp

                Filesize

                64KB

              • memory/4584-250-0x00000213BB4B0000-0x00000213BB4C0000-memory.dmp

                Filesize

                64KB