Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 18:16
Static task
static1
Behavioral task
behavioral1
Sample
val/Kernel.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
val/Kernel.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
val/Load Driver [ADMIN].bat
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
val/Load Driver [ADMIN].bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
val/Mapper.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
val/Mapper.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
val/Valorant.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
val/Valorant.exe
Resource
win10v2004-20240226-en
General
-
Target
val/Load Driver [ADMIN].bat
-
Size
38B
-
MD5
b56b9ab3209f7b0958976644f03776f8
-
SHA1
054c58ab6b517710776fa6ed8e20aabaf37d360f
-
SHA256
419124eb528c4c9ddb1e3713b72be124437f5632cf0ad1cbdc5b81c52407c401
-
SHA512
bf2515e032f3dd8885b4e8aead91dce3d46199d3dad242b8fee980b33a99def11def0f64936da7f3d456d4d376f0c3df68a4dca04b50f9cd314e99441a3d9f77
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\LXDKtgHIvQyxG\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\LXDKtgHIvQyxG" Mapper.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1788 Mapper.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 1788 Mapper.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3500 wrote to memory of 1788 3500 cmd.exe 88 PID 3500 wrote to memory of 1788 3500 cmd.exe 88
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\val\Load Driver [ADMIN].bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\val\Mapper.exeMapper.exe Kernel.sys2⤵
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:1788
-