Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
100s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23/01/2024, 19:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
GlowUp_Public.exe
Resource
win7-20231215-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
GlowUp_Public.exe
Resource
win10v2004-20231222-en
7 signatures
150 seconds
General
-
Target
GlowUp_Public.exe
-
Size
626KB
-
MD5
54854d90a9563e3a95d6ef7a584dd6d6
-
SHA1
521eb6601f9134deb672f8f116078556fa3f922b
-
SHA256
2d2bd3e5cd3fa994dcea616ed4ad9b128652b61f8ef3e6ff0e83cd9c710a476b
-
SHA512
879c224b44984871b3c101145663ef58f78053abe9c38b8b52d9bcc048474fca49b9b0b6155b2458ba2725660db1748f21244def6daa8bb3600d375bab72e9c7
-
SSDEEP
12288:xJmNygWN/gwgAKgdbjXXnf3UK2A2Xg70SWiuoBOZpM:xJmNyg0gRAKMbL/UK2A2bSYYO
Score
8/10
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2360 GlowUp_Public.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2548 sc.exe 1084 sc.exe 2636 sc.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 872 timeout.exe -
Kills process with taskkill 16 IoCs
pid Process 572 taskkill.exe 2864 taskkill.exe 2912 taskkill.exe 1244 taskkill.exe 1476 taskkill.exe 2728 taskkill.exe 860 taskkill.exe 1824 taskkill.exe 2796 taskkill.exe 2600 taskkill.exe 2584 taskkill.exe 908 taskkill.exe 952 taskkill.exe 2756 taskkill.exe 1192 taskkill.exe 2088 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2360 GlowUp_Public.exe 2360 GlowUp_Public.exe 2360 GlowUp_Public.exe 2360 GlowUp_Public.exe 2360 GlowUp_Public.exe 2360 GlowUp_Public.exe 2360 GlowUp_Public.exe 2360 GlowUp_Public.exe 2360 GlowUp_Public.exe 2360 GlowUp_Public.exe 2360 GlowUp_Public.exe 2360 GlowUp_Public.exe 2360 GlowUp_Public.exe 2360 GlowUp_Public.exe 2360 GlowUp_Public.exe 2360 GlowUp_Public.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 2796 taskkill.exe Token: SeDebugPrivilege 1244 taskkill.exe Token: SeDebugPrivilege 2600 taskkill.exe Token: SeDebugPrivilege 2584 taskkill.exe Token: SeDebugPrivilege 572 taskkill.exe Token: SeDebugPrivilege 1476 taskkill.exe Token: SeDebugPrivilege 908 taskkill.exe Token: SeDebugPrivilege 2756 taskkill.exe Token: SeDebugPrivilege 2912 taskkill.exe Token: SeDebugPrivilege 1192 taskkill.exe Token: SeDebugPrivilege 2088 taskkill.exe Token: SeDebugPrivilege 860 taskkill.exe Token: SeDebugPrivilege 1824 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2252 2360 GlowUp_Public.exe 29 PID 2360 wrote to memory of 2252 2360 GlowUp_Public.exe 29 PID 2360 wrote to memory of 2252 2360 GlowUp_Public.exe 29 PID 2252 wrote to memory of 2644 2252 cmd.exe 30 PID 2252 wrote to memory of 2644 2252 cmd.exe 30 PID 2252 wrote to memory of 2644 2252 cmd.exe 30 PID 2252 wrote to memory of 2128 2252 cmd.exe 31 PID 2252 wrote to memory of 2128 2252 cmd.exe 31 PID 2252 wrote to memory of 2128 2252 cmd.exe 31 PID 2252 wrote to memory of 2676 2252 cmd.exe 32 PID 2252 wrote to memory of 2676 2252 cmd.exe 32 PID 2252 wrote to memory of 2676 2252 cmd.exe 32 PID 2360 wrote to memory of 2220 2360 GlowUp_Public.exe 33 PID 2360 wrote to memory of 2220 2360 GlowUp_Public.exe 33 PID 2360 wrote to memory of 2220 2360 GlowUp_Public.exe 33 PID 2220 wrote to memory of 2796 2220 cmd.exe 34 PID 2220 wrote to memory of 2796 2220 cmd.exe 34 PID 2220 wrote to memory of 2796 2220 cmd.exe 34 PID 2360 wrote to memory of 3064 2360 GlowUp_Public.exe 36 PID 2360 wrote to memory of 3064 2360 GlowUp_Public.exe 36 PID 2360 wrote to memory of 3064 2360 GlowUp_Public.exe 36 PID 3064 wrote to memory of 1244 3064 cmd.exe 37 PID 3064 wrote to memory of 1244 3064 cmd.exe 37 PID 3064 wrote to memory of 1244 3064 cmd.exe 37 PID 2360 wrote to memory of 2528 2360 GlowUp_Public.exe 38 PID 2360 wrote to memory of 2528 2360 GlowUp_Public.exe 38 PID 2360 wrote to memory of 2528 2360 GlowUp_Public.exe 38 PID 2528 wrote to memory of 2548 2528 cmd.exe 39 PID 2528 wrote to memory of 2548 2528 cmd.exe 39 PID 2528 wrote to memory of 2548 2528 cmd.exe 39 PID 2360 wrote to memory of 2576 2360 GlowUp_Public.exe 40 PID 2360 wrote to memory of 2576 2360 GlowUp_Public.exe 40 PID 2360 wrote to memory of 2576 2360 GlowUp_Public.exe 40 PID 2576 wrote to memory of 2600 2576 cmd.exe 41 PID 2576 wrote to memory of 2600 2576 cmd.exe 41 PID 2576 wrote to memory of 2600 2576 cmd.exe 41 PID 2360 wrote to memory of 3068 2360 GlowUp_Public.exe 42 PID 2360 wrote to memory of 3068 2360 GlowUp_Public.exe 42 PID 2360 wrote to memory of 3068 2360 GlowUp_Public.exe 42 PID 3068 wrote to memory of 2584 3068 cmd.exe 43 PID 3068 wrote to memory of 2584 3068 cmd.exe 43 PID 3068 wrote to memory of 2584 3068 cmd.exe 43 PID 2360 wrote to memory of 3056 2360 GlowUp_Public.exe 44 PID 2360 wrote to memory of 3056 2360 GlowUp_Public.exe 44 PID 2360 wrote to memory of 3056 2360 GlowUp_Public.exe 44 PID 3056 wrote to memory of 572 3056 cmd.exe 45 PID 3056 wrote to memory of 572 3056 cmd.exe 45 PID 3056 wrote to memory of 572 3056 cmd.exe 45 PID 2360 wrote to memory of 2036 2360 GlowUp_Public.exe 46 PID 2360 wrote to memory of 2036 2360 GlowUp_Public.exe 46 PID 2360 wrote to memory of 2036 2360 GlowUp_Public.exe 46 PID 2036 wrote to memory of 1476 2036 cmd.exe 47 PID 2036 wrote to memory of 1476 2036 cmd.exe 47 PID 2036 wrote to memory of 1476 2036 cmd.exe 47 PID 2360 wrote to memory of 1168 2360 GlowUp_Public.exe 48 PID 2360 wrote to memory of 1168 2360 GlowUp_Public.exe 48 PID 2360 wrote to memory of 1168 2360 GlowUp_Public.exe 48 PID 1168 wrote to memory of 908 1168 cmd.exe 49 PID 1168 wrote to memory of 908 1168 cmd.exe 49 PID 1168 wrote to memory of 908 1168 cmd.exe 49 PID 2360 wrote to memory of 568 2360 GlowUp_Public.exe 50 PID 2360 wrote to memory of 568 2360 GlowUp_Public.exe 50 PID 2360 wrote to memory of 568 2360 GlowUp_Public.exe 50 PID 568 wrote to memory of 952 568 cmd.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\GlowUp_Public.exe"C:\Users\Admin\AppData\Local\Temp\GlowUp_Public.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\GlowUp_Public.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\GlowUp_Public.exe" MD53⤵PID:2644
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:2128
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2676
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\system32\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1244
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:2548
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:572
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im epicgameslauncher.exe > nul2⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\system32\taskkill.exetaskkill /f /im epicgameslauncher.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im EpicWebHelper.exe > nul2⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\system32\taskkill.exetaskkill /f /im EpicWebHelper.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:908
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im FortniteClient - Win64 - Shipping_EAC.exe > nul2⤵
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient - Win64 - Shipping_EAC.exe3⤵
- Kills process with taskkill
PID:952
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im FortniteClient - Win64 - Shipping_BE.exe > nul2⤵PID:876
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient - Win64 - Shipping_BE.exe3⤵
- Kills process with taskkill
PID:2728
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im FortniteLauncher.exe > nul2⤵PID:2768
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteLauncher.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im FortniteClient - Win64 - Shipping.exe > nul2⤵PID:948
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient - Win64 - Shipping.exe3⤵
- Kills process with taskkill
PID:2864
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im EpicGamesLauncher.exe > nul2⤵PID:2896
-
C:\Windows\system32\taskkill.exetaskkill /f /im EpicGamesLauncher.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im EasyAntiCheat.exe > nul2⤵PID:1856
-
C:\Windows\system32\taskkill.exetaskkill /f /im EasyAntiCheat.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1192
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im BEService.exe > nul2⤵PID:1804
-
C:\Windows\system32\taskkill.exetaskkill /f /im BEService.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im BEServices.exe > nul2⤵PID:2504
-
C:\Windows\system32\taskkill.exetaskkill /f /im BEServices.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:860
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im BattleEye.exe > nul2⤵PID:1704
-
C:\Windows\system32\taskkill.exetaskkill /f /im BattleEye.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1824
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop BattlEye Service2⤵PID:1872
-
C:\Windows\system32\sc.exesc stop BattlEye Service3⤵
- Launches sc.exe
PID:1084
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop EasyAntiCheat2⤵PID:1880
-
C:\Windows\system32\sc.exesc stop EasyAntiCheat3⤵
- Launches sc.exe
PID:2636
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:836
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1928
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo Signature checksum failed. Request was tampered with or session ended most likely. & echo: & echo Message: Invalid license key && timeout /t 5"2⤵PID:1852
-
C:\Windows\system32\cmd.execmd /C "color b && title Error && echo Signature checksum failed. Request was tampered with or session ended most likely. & echo: & echo Message: Invalid license key && timeout /t 5"3⤵PID:1012
-
C:\Windows\system32\timeout.exetimeout /t 54⤵
- Delays execution with timeout.exe
PID:872
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2360 -s 62762⤵PID:1352
-