Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    91s
  • max time network
    89s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/01/2024, 19:23

General

  • Target

    GlowUp_Public.exe

  • Size

    626KB

  • MD5

    54854d90a9563e3a95d6ef7a584dd6d6

  • SHA1

    521eb6601f9134deb672f8f116078556fa3f922b

  • SHA256

    2d2bd3e5cd3fa994dcea616ed4ad9b128652b61f8ef3e6ff0e83cd9c710a476b

  • SHA512

    879c224b44984871b3c101145663ef58f78053abe9c38b8b52d9bcc048474fca49b9b0b6155b2458ba2725660db1748f21244def6daa8bb3600d375bab72e9c7

  • SSDEEP

    12288:xJmNygWN/gwgAKgdbjXXnf3UK2A2Xg70SWiuoBOZpM:xJmNyg0gRAKMbL/UK2A2bSYYO

Score
8/10

Malware Config

Signatures

  • Stops running service(s) 3 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Kills process with taskkill 16 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\GlowUp_Public.exe
    "C:\Users\Admin\AppData\Local\Temp\GlowUp_Public.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\GlowUp_Public.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4836
      • C:\Windows\system32\certutil.exe
        certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\GlowUp_Public.exe" MD5
        3⤵
          PID:428
        • C:\Windows\system32\find.exe
          find /i /v "certutil"
          3⤵
            PID:1916
          • C:\Windows\system32\find.exe
            find /i /v "md5"
            3⤵
              PID:540
            • C:\Windows\system32\taskkill.exe
              taskkill /f /im BattleEye.exe
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2380
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1976
            • C:\Windows\system32\taskkill.exe
              taskkill /f /im HTTPDebuggerUI.exe
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3184
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4236
            • C:\Windows\system32\taskkill.exe
              taskkill /f /im HTTPDebuggerSvc.exe
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3872
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3912
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:464
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4728
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4240
            • C:\Windows\system32\taskkill.exe
              taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4460
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /f /im epicgameslauncher.exe > nul
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3692
            • C:\Windows\system32\taskkill.exe
              taskkill /f /im epicgameslauncher.exe
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1204
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /f /im FortniteClient - Win64 - Shipping_EAC.exe > nul
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1400
            • C:\Windows\system32\taskkill.exe
              taskkill /f /im FortniteClient - Win64 - Shipping_EAC.exe
              3⤵
              • Kills process with taskkill
              PID:4820
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /f /im FortniteClient - Win64 - Shipping_BE.exe > nul
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1772
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /f /im FortniteLauncher.exe > nul
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4500
            • C:\Windows\system32\taskkill.exe
              taskkill /f /im FortniteLauncher.exe
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3404
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /f /im EpicGamesLauncher.exe > nul
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4540
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /f /im EasyAntiCheat.exe > nul
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2148
            • C:\Windows\system32\taskkill.exe
              taskkill /f /im EasyAntiCheat.exe
              3⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3972
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c taskkill /f /im BEService.exe > nul
            2⤵
              PID:5100
              • C:\Windows\system32\taskkill.exe
                taskkill /f /im BEService.exe
                3⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4388
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c taskkill /f /im BEServices.exe > nul
              2⤵
                PID:980
                • C:\Windows\system32\taskkill.exe
                  taskkill /f /im BEServices.exe
                  3⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4528
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c taskkill /f /im BattleEye.exe > nul
                2⤵
                  PID:4836
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c sc stop EasyAntiCheat
                  2⤵
                    PID:3316
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c sc stop BattlEye Service
                    2⤵
                      PID:968
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c taskkill /f /im FortniteClient - Win64 - Shipping.exe > nul
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4564
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c taskkill /f /im EpicWebHelper.exe > nul
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3480
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c cls
                      2⤵
                        PID:2220
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c cls
                        2⤵
                          PID:3456
                      • C:\Windows\system32\sc.exe
                        sc stop HTTPDebuggerPro
                        1⤵
                        • Launches sc.exe
                        PID:4480
                      • C:\Windows\system32\taskkill.exe
                        taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
                        1⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2692
                      • C:\Windows\system32\taskkill.exe
                        taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                        1⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2336
                      • C:\Windows\system32\taskkill.exe
                        taskkill /f /im EpicWebHelper.exe
                        1⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:396
                      • C:\Windows\system32\taskkill.exe
                        taskkill /f /im FortniteClient - Win64 - Shipping_BE.exe
                        1⤵
                        • Kills process with taskkill
                        PID:2648
                      • C:\Windows\system32\taskkill.exe
                        taskkill /f /im EpicGamesLauncher.exe
                        1⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:652
                      • C:\Windows\system32\sc.exe
                        sc stop EasyAntiCheat
                        1⤵
                        • Launches sc.exe
                        PID:3836
                      • C:\Windows\system32\sc.exe
                        sc stop BattlEye Service
                        1⤵
                        • Launches sc.exe
                        PID:1292
                      • C:\Windows\system32\taskkill.exe
                        taskkill /f /im FortniteClient - Win64 - Shipping.exe
                        1⤵
                        • Kills process with taskkill
                        PID:4020

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads