Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/03/2024, 18:16
Static task
static1
Behavioral task
behavioral1
Sample
val/Kernel.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
val/Kernel.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
val/Load Driver [ADMIN].bat
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
val/Load Driver [ADMIN].bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
val/Mapper.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
val/Mapper.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
val/Valorant.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
val/Valorant.exe
Resource
win10v2004-20240226-en
General
-
Target
val/Load Driver [ADMIN].bat
-
Size
38B
-
MD5
b56b9ab3209f7b0958976644f03776f8
-
SHA1
054c58ab6b517710776fa6ed8e20aabaf37d360f
-
SHA256
419124eb528c4c9ddb1e3713b72be124437f5632cf0ad1cbdc5b81c52407c401
-
SHA512
bf2515e032f3dd8885b4e8aead91dce3d46199d3dad242b8fee980b33a99def11def0f64936da7f3d456d4d376f0c3df68a4dca04b50f9cd314e99441a3d9f77
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\ukiUrIntQLICiRwsiwfjVwrzI\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\ukiUrIntQLICiRwsiwfjVwrzI" Mapper.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2196 Mapper.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 2196 Mapper.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2196 1704 cmd.exe 29 PID 1704 wrote to memory of 2196 1704 cmd.exe 29 PID 1704 wrote to memory of 2196 1704 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\val\Load Driver [ADMIN].bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\val\Mapper.exeMapper.exe Kernel.sys2⤵
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2196
-