Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    95s
  • max time network
    100s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    23/01/2024, 19:23

General

  • Target

    GlowUp_Public.exe

  • Size

    626KB

  • MD5

    54854d90a9563e3a95d6ef7a584dd6d6

  • SHA1

    521eb6601f9134deb672f8f116078556fa3f922b

  • SHA256

    2d2bd3e5cd3fa994dcea616ed4ad9b128652b61f8ef3e6ff0e83cd9c710a476b

  • SHA512

    879c224b44984871b3c101145663ef58f78053abe9c38b8b52d9bcc048474fca49b9b0b6155b2458ba2725660db1748f21244def6daa8bb3600d375bab72e9c7

  • SSDEEP

    12288:xJmNygWN/gwgAKgdbjXXnf3UK2A2Xg70SWiuoBOZpM:xJmNyg0gRAKMbL/UK2A2bSYYO

Score
8/10

Malware Config

Signatures

  • Stops running service(s) 3 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 16 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\GlowUp_Public.exe
    "C:\Users\Admin\AppData\Local\Temp\GlowUp_Public.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\GlowUp_Public.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2252
      • C:\Windows\system32\certutil.exe
        certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\GlowUp_Public.exe" MD5
        3⤵
          PID:2644
        • C:\Windows\system32\find.exe
          find /i /v "md5"
          3⤵
            PID:2128
          • C:\Windows\system32\find.exe
            find /i /v "certutil"
            3⤵
              PID:2676
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2220
            • C:\Windows\system32\taskkill.exe
              taskkill /f /im HTTPDebuggerUI.exe
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2796
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3064
            • C:\Windows\system32\taskkill.exe
              taskkill /f /im HTTPDebuggerSvc.exe
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1244
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2528
            • C:\Windows\system32\sc.exe
              sc stop HTTPDebuggerPro
              3⤵
              • Launches sc.exe
              PID:2548
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2576
            • C:\Windows\system32\taskkill.exe
              taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2600
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3068
            • C:\Windows\system32\taskkill.exe
              taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2584
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3056
            • C:\Windows\system32\taskkill.exe
              taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:572
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /f /im epicgameslauncher.exe > nul
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2036
            • C:\Windows\system32\taskkill.exe
              taskkill /f /im epicgameslauncher.exe
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1476
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /f /im EpicWebHelper.exe > nul
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1168
            • C:\Windows\system32\taskkill.exe
              taskkill /f /im EpicWebHelper.exe
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:908
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /f /im FortniteClient - Win64 - Shipping_EAC.exe > nul
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:568
            • C:\Windows\system32\taskkill.exe
              taskkill /f /im FortniteClient - Win64 - Shipping_EAC.exe
              3⤵
              • Kills process with taskkill
              PID:952
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /f /im FortniteClient - Win64 - Shipping_BE.exe > nul
            2⤵
              PID:876
              • C:\Windows\system32\taskkill.exe
                taskkill /f /im FortniteClient - Win64 - Shipping_BE.exe
                3⤵
                • Kills process with taskkill
                PID:2728
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c taskkill /f /im FortniteLauncher.exe > nul
              2⤵
                PID:2768
                • C:\Windows\system32\taskkill.exe
                  taskkill /f /im FortniteLauncher.exe
                  3⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2756
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c taskkill /f /im FortniteClient - Win64 - Shipping.exe > nul
                2⤵
                  PID:948
                  • C:\Windows\system32\taskkill.exe
                    taskkill /f /im FortniteClient - Win64 - Shipping.exe
                    3⤵
                    • Kills process with taskkill
                    PID:2864
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c taskkill /f /im EpicGamesLauncher.exe > nul
                  2⤵
                    PID:2896
                    • C:\Windows\system32\taskkill.exe
                      taskkill /f /im EpicGamesLauncher.exe
                      3⤵
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2912
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c taskkill /f /im EasyAntiCheat.exe > nul
                    2⤵
                      PID:1856
                      • C:\Windows\system32\taskkill.exe
                        taskkill /f /im EasyAntiCheat.exe
                        3⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1192
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c taskkill /f /im BEService.exe > nul
                      2⤵
                        PID:1804
                        • C:\Windows\system32\taskkill.exe
                          taskkill /f /im BEService.exe
                          3⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2088
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c taskkill /f /im BEServices.exe > nul
                        2⤵
                          PID:2504
                          • C:\Windows\system32\taskkill.exe
                            taskkill /f /im BEServices.exe
                            3⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:860
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c taskkill /f /im BattleEye.exe > nul
                          2⤵
                            PID:1704
                            • C:\Windows\system32\taskkill.exe
                              taskkill /f /im BattleEye.exe
                              3⤵
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1824
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c sc stop BattlEye Service
                            2⤵
                              PID:1872
                              • C:\Windows\system32\sc.exe
                                sc stop BattlEye Service
                                3⤵
                                • Launches sc.exe
                                PID:1084
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c sc stop EasyAntiCheat
                              2⤵
                                PID:1880
                                • C:\Windows\system32\sc.exe
                                  sc stop EasyAntiCheat
                                  3⤵
                                  • Launches sc.exe
                                  PID:2636
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c cls
                                2⤵
                                  PID:836
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c cls
                                  2⤵
                                    PID:1928
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo Signature checksum failed. Request was tampered with or session ended most likely. & echo: & echo Message: Invalid license key && timeout /t 5"
                                    2⤵
                                      PID:1852
                                      • C:\Windows\system32\cmd.exe
                                        cmd /C "color b && title Error && echo Signature checksum failed. Request was tampered with or session ended most likely. & echo: & echo Message: Invalid license key && timeout /t 5"
                                        3⤵
                                          PID:1012
                                          • C:\Windows\system32\timeout.exe
                                            timeout /t 5
                                            4⤵
                                            • Delays execution with timeout.exe
                                            PID:872
                                      • C:\Windows\system32\WerFault.exe
                                        C:\Windows\system32\WerFault.exe -u -p 2360 -s 6276
                                        2⤵
                                          PID:1352

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads