Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
3x64 beta/A...ss.dll
windows7-x64
1x64 beta/A...ss.dll
windows10-2004-x64
1x64 beta/beta.exe
windows7-x64
7x64 beta/beta.exe
windows10-2004-x64
7$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3LICENSES.c...m.html
windows7-x64
1LICENSES.c...m.html
windows10-2004-x64
1beta.exe
windows7-x64
7beta.exe
windows10-2004-x64
7d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1resources/elevate.exe
windows7-x64
1resources/elevate.exe
windows10-2004-x64
1swiftshade...GL.dll
windows7-x64
1swiftshade...GL.dll
windows10-2004-x64
1swiftshade...v2.dll
windows7-x64
1swiftshade...v2.dll
windows10-2004-x64
1vk_swiftshader.dll
windows7-x64
1vk_swiftshader.dll
windows10-2004-x64
1vulkan-1.dll
windows7-x64
1vulkan-1.dll
windows10-2004-x64
1$PLUGINSDI...7z.dll
windows7-x64
3$PLUGINSDI...7z.dll
windows10-2004-x64
3x64 beta/d...h..bat
windows7-x64
8Analysis
-
max time kernel
122s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/02/2024, 18:12
Static task
static1
Behavioral task
behavioral1
Sample
x64 beta/AntiBypass.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
x64 beta/AntiBypass.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
x64 beta/beta.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
x64 beta/beta.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
LICENSES.chromium.html
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
LICENSES.chromium.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
beta.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
beta.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
d3dcompiler_47.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral14
Sample
ffmpeg.dll
Resource
win7-20231215-en
Behavioral task
behavioral15
Sample
ffmpeg.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral16
Sample
libEGL.dll
Resource
win7-20231215-en
Behavioral task
behavioral17
Sample
libEGL.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral18
Sample
libGLESv2.dll
Resource
win7-20231215-en
Behavioral task
behavioral19
Sample
libGLESv2.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral20
Sample
resources/elevate.exe
Resource
win7-20231215-en
Behavioral task
behavioral21
Sample
resources/elevate.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral22
Sample
swiftshader/libEGL.dll
Resource
win7-20231215-en
Behavioral task
behavioral23
Sample
swiftshader/libEGL.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral24
Sample
swiftshader/libGLESv2.dll
Resource
win7-20231215-en
Behavioral task
behavioral25
Sample
swiftshader/libGLESv2.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral26
Sample
vk_swiftshader.dll
Resource
win7-20231215-en
Behavioral task
behavioral27
Sample
vk_swiftshader.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral28
Sample
vulkan-1.dll
Resource
win7-20231215-en
Behavioral task
behavioral29
Sample
vulkan-1.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win7-20231215-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10v2004-20231215-en
General
-
Target
x64 beta/dependencies/2024-1-12/auth..bat
-
Size
6KB
-
MD5
8825cf897e698ebbdb8c707bb39d73ca
-
SHA1
dcece549ce6ed0b24ecc1faf80280c225bdcccae
-
SHA256
b332d0f81de5a8eced6109033f05192e2aa5ca3ed0a523367428813924a9a28d
-
SHA512
e3c63dda17128929108ff5492364b4d2df8126f2a8c17d7384ba9f7b0651aec72c11681dd7196f2eef7d693b9b3165b96fc05c98afc40fab9252ef2c7a26e3f9
-
SSDEEP
192:sYHAivgiRwe5f11ATNLCAtMT7/4+tGs1PP/uQz8tz1hNn:8i4iRwe5f11ATNLCAtMT7/4+tGs1PP/M
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 3016 attrib.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Delays execution with timeout.exe 11 IoCs
pid Process 2168 timeout.exe 2036 timeout.exe 1580 timeout.exe 1560 timeout.exe 2028 timeout.exe 1344 timeout.exe 2016 timeout.exe 320 timeout.exe 1624 timeout.exe 1520 timeout.exe 2408 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1156 tasklist.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1868 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 3020 systeminfo.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1992 reg.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2824 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2344 powershell.exe 2344 powershell.exe 2344 powershell.exe 2736 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2344 powershell.exe Token: SeDebugPrivilege 2736 powershell.exe Token: SeDebugPrivilege 1156 tasklist.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1176 wrote to memory of 2344 1176 cmd.exe 29 PID 1176 wrote to memory of 2344 1176 cmd.exe 29 PID 1176 wrote to memory of 2344 1176 cmd.exe 29 PID 2344 wrote to memory of 2780 2344 powershell.exe 30 PID 2344 wrote to memory of 2780 2344 powershell.exe 30 PID 2344 wrote to memory of 2780 2344 powershell.exe 30 PID 2780 wrote to memory of 2932 2780 cmd.exe 32 PID 2780 wrote to memory of 2932 2780 cmd.exe 32 PID 2780 wrote to memory of 2932 2780 cmd.exe 32 PID 2932 wrote to memory of 2824 2932 cmd.exe 33 PID 2932 wrote to memory of 2824 2932 cmd.exe 33 PID 2932 wrote to memory of 2824 2932 cmd.exe 33 PID 2932 wrote to memory of 2708 2932 cmd.exe 34 PID 2932 wrote to memory of 2708 2932 cmd.exe 34 PID 2932 wrote to memory of 2708 2932 cmd.exe 34 PID 2780 wrote to memory of 2848 2780 cmd.exe 35 PID 2780 wrote to memory of 2848 2780 cmd.exe 35 PID 2780 wrote to memory of 2848 2780 cmd.exe 35 PID 2848 wrote to memory of 2736 2848 cmd.exe 36 PID 2848 wrote to memory of 2736 2848 cmd.exe 36 PID 2848 wrote to memory of 2736 2848 cmd.exe 36 PID 2780 wrote to memory of 3016 2780 cmd.exe 37 PID 2780 wrote to memory of 3016 2780 cmd.exe 37 PID 2780 wrote to memory of 3016 2780 cmd.exe 37 PID 2780 wrote to memory of 2168 2780 cmd.exe 38 PID 2780 wrote to memory of 2168 2780 cmd.exe 38 PID 2780 wrote to memory of 2168 2780 cmd.exe 38 PID 2780 wrote to memory of 3020 2780 cmd.exe 39 PID 2780 wrote to memory of 3020 2780 cmd.exe 39 PID 2780 wrote to memory of 3020 2780 cmd.exe 39 PID 2780 wrote to memory of 1156 2780 cmd.exe 42 PID 2780 wrote to memory of 1156 2780 cmd.exe 42 PID 2780 wrote to memory of 1156 2780 cmd.exe 42 PID 2780 wrote to memory of 872 2780 cmd.exe 43 PID 2780 wrote to memory of 872 2780 cmd.exe 43 PID 2780 wrote to memory of 872 2780 cmd.exe 43 PID 872 wrote to memory of 1472 872 net.exe 44 PID 872 wrote to memory of 1472 872 net.exe 44 PID 872 wrote to memory of 1472 872 net.exe 44 PID 2780 wrote to memory of 1992 2780 cmd.exe 45 PID 2780 wrote to memory of 1992 2780 cmd.exe 45 PID 2780 wrote to memory of 1992 2780 cmd.exe 45 PID 2780 wrote to memory of 1868 2780 cmd.exe 46 PID 2780 wrote to memory of 1868 2780 cmd.exe 46 PID 2780 wrote to memory of 1868 2780 cmd.exe 46 PID 2780 wrote to memory of 2028 2780 cmd.exe 47 PID 2780 wrote to memory of 2028 2780 cmd.exe 47 PID 2780 wrote to memory of 2028 2780 cmd.exe 47 PID 2780 wrote to memory of 2036 2780 cmd.exe 48 PID 2780 wrote to memory of 2036 2780 cmd.exe 48 PID 2780 wrote to memory of 2036 2780 cmd.exe 48 PID 2780 wrote to memory of 1580 2780 cmd.exe 49 PID 2780 wrote to memory of 1580 2780 cmd.exe 49 PID 2780 wrote to memory of 1580 2780 cmd.exe 49 PID 2780 wrote to memory of 1344 2780 cmd.exe 50 PID 2780 wrote to memory of 1344 2780 cmd.exe 50 PID 2780 wrote to memory of 1344 2780 cmd.exe 50 PID 2780 wrote to memory of 2016 2780 cmd.exe 53 PID 2780 wrote to memory of 2016 2780 cmd.exe 53 PID 2780 wrote to memory of 2016 2780 cmd.exe 53 PID 2780 wrote to memory of 1540 2780 cmd.exe 54 PID 2780 wrote to memory of 1540 2780 cmd.exe 54 PID 2780 wrote to memory of 1540 2780 cmd.exe 54 PID 2780 wrote to memory of 320 2780 cmd.exe 55 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3016 attrib.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\x64 beta\dependencies\2024-1-12\auth..bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell start -verb runas '"C:\Users\Admin\AppData\Local\Temp\x64 beta\dependencies\2024-1-12\auth..bat"' am_admin2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\x64 beta\dependencies\2024-1-12\auth..bat" am_admin3⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>NUL ping -4 -n 1 JUBFGPHD | findstr [4⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\system32\PING.EXEping -4 -n 1 JUBFGPHD5⤵
- Runs ping.exe
PID:2824
-
-
C:\Windows\system32\findstr.exefindstr [5⤵PID:2708
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell Invoke-RestMethod api.ipify.org4⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Invoke-RestMethod api.ipify.org5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
-
C:\Windows\system32\attrib.exeattrib "C:\ProgramData\s.exe" +h4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3016
-
-
C:\Windows\system32\timeout.exetimeout /t 5 /nobreak4⤵
- Delays execution with timeout.exe
PID:2168
-
-
C:\Windows\system32\systeminfo.exeSystemInfo4⤵
- Gathers system information
PID:3020
-
-
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
-
C:\Windows\system32\net.exenet user4⤵
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user5⤵PID:1472
-
-
-
C:\Windows\system32\reg.exereg query HKCU\Software\Microsoft\Windows\CurrentVersion\Run4⤵
- Modifies registry key
PID:1992
-
-
C:\Windows\system32\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:1868
-
-
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak4⤵
- Delays execution with timeout.exe
PID:2028
-
-
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak4⤵
- Delays execution with timeout.exe
PID:2036
-
-
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak4⤵
- Delays execution with timeout.exe
PID:1580
-
-
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak4⤵
- Delays execution with timeout.exe
PID:1344
-
-
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak4⤵
- Delays execution with timeout.exe
PID:2016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>NUL dir /b "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles"4⤵PID:1540
-
-
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak4⤵
- Delays execution with timeout.exe
PID:320
-
-
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak4⤵
- Delays execution with timeout.exe
PID:1624
-
-
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak4⤵
- Delays execution with timeout.exe
PID:1560
-
-
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak4⤵
- Delays execution with timeout.exe
PID:1520
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>NUL dir /b "C:\Users\Admin\AppData\Roaming\discord\Local Storage\leveldb\"4⤵PID:2316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>NUL dir /b "C:\Program Files (x86)\Steam\"4⤵PID:1200
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>NUL dir /b "C:\Program Files\Steam\"4⤵PID:2372
-
-
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak4⤵
- Delays execution with timeout.exe
PID:2408
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD591d3d40888f3e4281186521c0a155695
SHA10abbf71250b9661a28b82f584eac92507f6bdd5c
SHA256c11d5ba0feca102c56bb93c88cb4b0945fd383e7674e01e7d49b116d5e49472f
SHA512151579f3d06540299d3896a967ec2e55401c751b79b244aa849cb2e5764d664f991ab9681132db5d2af9c7a34ac331faa7446e00c69247ceb02956c038563ffd