Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3Mauqes.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3LICENSES.c...m.html
windows10-2004-x64
1asdasdasd.exe
windows10-2004-x64
7d3dcompiler_47.dll
windows10-2004-x64
3ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows10-2004-x64
3locales/af.ps1
windows10-2004-x64
1locales/uk.ps1
windows10-2004-x64
1resources/elevate.exe
windows10-2004-x64
1vk_swiftshader.dll
windows10-2004-x64
3vulkan-1.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...7z.dll
windows10-2004-x64
3$R0/Uninst...sd.exe
windows10-2004-x64
7$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3Analysis
-
max time kernel
123s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
Mauqes.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral6
Sample
LICENSES.chromium.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
asdasdasd.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral8
Sample
d3dcompiler_47.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
ffmpeg.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral10
Sample
libEGL.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
libGLESv2.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral12
Sample
locales/af.ps1
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
locales/uk.ps1
Resource
win10v2004-20240412-en
Behavioral task
behavioral14
Sample
resources/elevate.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
vk_swiftshader.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral16
Sample
vulkan-1.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
$R0/Uninstall asdasdasd.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240412-en
General
-
Target
asdasdasd.exe
-
Size
131.9MB
-
MD5
7bfb255681df845fa08e937447fa5c4a
-
SHA1
3132cb69dbcf8964b9f8f286b2e2a14e47e614f7
-
SHA256
b018ff7173447e00dcdf50ea416152ca45eafa0b373d15c02a45f52ae9ce142c
-
SHA512
85aab548b1bfd1d9c4323af21a3c4231c75e8bd4484df53137799043c63677827779c3e99c00a95d5ea713165d29c9c95978a510c9ae33676e8656faf6e15228
-
SSDEEP
1572864:84sMLl/BkZTVV2iplzf+ekzrMdTOG0AfhgojwlwVgmPQtn06H9rejAEdCoIZXCVv:hl/BkVVPBDgmPKa5Wnu3X7
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4688 asdasdasd.exe 4688 asdasdasd.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 47 ipinfo.io 48 ipinfo.io -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 asdasdasd.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 asdasdasd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz asdasdasd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString asdasdasd.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 asdasdasd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz asdasdasd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString asdasdasd.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4472 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2952 powershell.exe 2952 powershell.exe 4744 powershell.exe 4744 powershell.exe 684 powershell.exe 684 powershell.exe 2348 asdasdasd.exe 2348 asdasdasd.exe 2952 powershell.exe 684 powershell.exe 4744 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4472 tasklist.exe Token: SeDebugPrivilege 2952 powershell.exe Token: SeDebugPrivilege 684 powershell.exe Token: SeDebugPrivilege 4744 powershell.exe Token: SeShutdownPrivilege 4688 asdasdasd.exe Token: SeCreatePagefilePrivilege 4688 asdasdasd.exe Token: SeShutdownPrivilege 4688 asdasdasd.exe Token: SeCreatePagefilePrivilege 4688 asdasdasd.exe Token: SeShutdownPrivilege 4688 asdasdasd.exe Token: SeCreatePagefilePrivilege 4688 asdasdasd.exe Token: SeShutdownPrivilege 4688 asdasdasd.exe Token: SeCreatePagefilePrivilege 4688 asdasdasd.exe Token: SeIncreaseQuotaPrivilege 4744 powershell.exe Token: SeSecurityPrivilege 4744 powershell.exe Token: SeTakeOwnershipPrivilege 4744 powershell.exe Token: SeLoadDriverPrivilege 4744 powershell.exe Token: SeSystemProfilePrivilege 4744 powershell.exe Token: SeSystemtimePrivilege 4744 powershell.exe Token: SeProfSingleProcessPrivilege 4744 powershell.exe Token: SeIncBasePriorityPrivilege 4744 powershell.exe Token: SeCreatePagefilePrivilege 4744 powershell.exe Token: SeBackupPrivilege 4744 powershell.exe Token: SeRestorePrivilege 4744 powershell.exe Token: SeShutdownPrivilege 4744 powershell.exe Token: SeDebugPrivilege 4744 powershell.exe Token: SeSystemEnvironmentPrivilege 4744 powershell.exe Token: SeRemoteShutdownPrivilege 4744 powershell.exe Token: SeUndockPrivilege 4744 powershell.exe Token: SeManageVolumePrivilege 4744 powershell.exe Token: 33 4744 powershell.exe Token: 34 4744 powershell.exe Token: 35 4744 powershell.exe Token: 36 4744 powershell.exe Token: SeIncreaseQuotaPrivilege 2952 powershell.exe Token: SeSecurityPrivilege 2952 powershell.exe Token: SeTakeOwnershipPrivilege 2952 powershell.exe Token: SeLoadDriverPrivilege 2952 powershell.exe Token: SeSystemProfilePrivilege 2952 powershell.exe Token: SeSystemtimePrivilege 2952 powershell.exe Token: SeProfSingleProcessPrivilege 2952 powershell.exe Token: SeIncBasePriorityPrivilege 2952 powershell.exe Token: SeCreatePagefilePrivilege 2952 powershell.exe Token: SeBackupPrivilege 2952 powershell.exe Token: SeRestorePrivilege 2952 powershell.exe Token: SeShutdownPrivilege 2952 powershell.exe Token: SeDebugPrivilege 2952 powershell.exe Token: SeSystemEnvironmentPrivilege 2952 powershell.exe Token: SeRemoteShutdownPrivilege 2952 powershell.exe Token: SeUndockPrivilege 2952 powershell.exe Token: SeManageVolumePrivilege 2952 powershell.exe Token: 33 2952 powershell.exe Token: 34 2952 powershell.exe Token: 35 2952 powershell.exe Token: 36 2952 powershell.exe Token: SeShutdownPrivilege 4688 asdasdasd.exe Token: SeCreatePagefilePrivilege 4688 asdasdasd.exe Token: SeShutdownPrivilege 4688 asdasdasd.exe Token: SeCreatePagefilePrivilege 4688 asdasdasd.exe Token: SeShutdownPrivilege 4688 asdasdasd.exe Token: SeCreatePagefilePrivilege 4688 asdasdasd.exe Token: SeShutdownPrivilege 4688 asdasdasd.exe Token: SeCreatePagefilePrivilege 4688 asdasdasd.exe Token: SeShutdownPrivilege 4688 asdasdasd.exe Token: SeCreatePagefilePrivilege 4688 asdasdasd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4688 wrote to memory of 3984 4688 asdasdasd.exe 90 PID 4688 wrote to memory of 3984 4688 asdasdasd.exe 90 PID 4688 wrote to memory of 3984 4688 asdasdasd.exe 90 PID 3984 wrote to memory of 3736 3984 cmd.exe 92 PID 3984 wrote to memory of 3736 3984 cmd.exe 92 PID 3984 wrote to memory of 3736 3984 cmd.exe 92 PID 4688 wrote to memory of 4988 4688 asdasdasd.exe 93 PID 4688 wrote to memory of 4988 4688 asdasdasd.exe 93 PID 4688 wrote to memory of 4988 4688 asdasdasd.exe 93 PID 4988 wrote to memory of 4472 4988 cmd.exe 95 PID 4988 wrote to memory of 4472 4988 cmd.exe 95 PID 4988 wrote to memory of 4472 4988 cmd.exe 95 PID 4688 wrote to memory of 1568 4688 asdasdasd.exe 97 PID 4688 wrote to memory of 1568 4688 asdasdasd.exe 97 PID 4688 wrote to memory of 1568 4688 asdasdasd.exe 97 PID 4688 wrote to memory of 2952 4688 asdasdasd.exe 99 PID 4688 wrote to memory of 2952 4688 asdasdasd.exe 99 PID 4688 wrote to memory of 2952 4688 asdasdasd.exe 99 PID 4688 wrote to memory of 4744 4688 asdasdasd.exe 100 PID 4688 wrote to memory of 4744 4688 asdasdasd.exe 100 PID 4688 wrote to memory of 4744 4688 asdasdasd.exe 100 PID 4688 wrote to memory of 684 4688 asdasdasd.exe 102 PID 4688 wrote to memory of 684 4688 asdasdasd.exe 102 PID 4688 wrote to memory of 684 4688 asdasdasd.exe 102 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2216 4688 asdasdasd.exe 105 PID 4688 wrote to memory of 2348 4688 asdasdasd.exe 106 PID 4688 wrote to memory of 2348 4688 asdasdasd.exe 106 PID 4688 wrote to memory of 2348 4688 asdasdasd.exe 106 PID 4688 wrote to memory of 1556 4688 asdasdasd.exe 107 PID 4688 wrote to memory of 1556 4688 asdasdasd.exe 107 PID 4688 wrote to memory of 1556 4688 asdasdasd.exe 107 PID 1556 wrote to memory of 4440 1556 cmd.exe 109 PID 1556 wrote to memory of 4440 1556 cmd.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\asdasdasd.exe"C:\Users\Admin\AppData\Local\Temp\asdasdasd.exe"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "chcp"2⤵
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\chcp.comchcp3⤵PID:3736
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "echo %COMPUTERNAME%.%USERDNSDOMAIN%"2⤵PID:1568
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:684
-
-
C:\Users\Admin\AppData\Local\Temp\asdasdasd.exe"C:\Users\Admin\AppData\Local\Temp\asdasdasd.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\asdasdasd" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1936 --field-trial-handle=1940,i,14345400694268570474,11855482771547899091,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵PID:2216
-
-
C:\Users\Admin\AppData\Local\Temp\asdasdasd.exe"C:\Users\Admin\AppData\Local\Temp\asdasdasd.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\asdasdasd" --mojo-platform-channel-handle=2152 --field-trial-handle=1940,i,14345400694268570474,11855482771547899091,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log""2⤵
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\findstr.exefindstr /C:"Detected boot environment" "C:\Windows\Panther\setupact.log"3⤵PID:4440
-
-
-
C:\Users\Admin\AppData\Local\Temp\asdasdasd.exe"C:\Users\Admin\AppData\Local\Temp\asdasdasd.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\asdasdasd" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2908 --field-trial-handle=1940,i,14345400694268570474,11855482771547899091,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵PID:1964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD56ef1ee07865201ee53d9998ed1ec394e
SHA1d33f4b751c38a0bc6c20516ec3c131b17b72a68f
SHA256ca596afc4b092d0fc06d63d64b8e98790e3246b975763b72bfd2c185dbf546a3
SHA51213315a7f1defdba4284f7e7a2250f3757f693f2891ca221ff251b4fe517c91866929f1b6992aea92ca7cdc96bc91ecb62b68f0e766d6d6a8ff5fad7041dc91d7
-
Filesize
21KB
MD572e1d460bc6cc17304157b47b1b30846
SHA143ea6f6fd3e50abbd31b20cdbe5c75ddc2ced1b3
SHA25685ff19acae879b3a15a97a803a1bab3f7adb900565b0e5a2a8b9fc44b157c35a
SHA51272ded1552e58e018cdff74789f3b19656412f17d87adfb8fa444beee45cd109c19f0cf895143334a50f23c3103803e8249f1c968c731950ab75ec821af3ecdf2
-
Filesize
21KB
MD58ff5a5a62c9d97422d9068c4deb01ccb
SHA1601b28b7d80f7365727382d976b3e41c37c1623f
SHA256b7936afb7836d5f19ec5f301bf605d67a07c1e47ff72eb9445f0be86b41d5857
SHA512e30dfb01246c7c7ed10e1b7ced26e18c3906b624e87874850ab7a283b244c3d73a968f55892814ba574a1e47881deedff5177b3a65753efc2e7df0391d77c495
-
Filesize
1.5MB
MD5780a9a3098c31b205974a45dc3a15278
SHA16308103a4f97d5e0daff24a28d576fe852ef17ce
SHA2569668a9002fa87090cc78771e6365d1f8cbb7d85e54f963c5afcd23963ce3d2ba
SHA5124a9071beaa94f44e88148e731f218ea2bab6594afe837a7414c94287939ba4e20fbd3afc91904ec52f0c104d537fed95516cc278e37e1981adeaacebccb6651d
-
Filesize
95KB
MD594d886881682434857d21ad7f08c9889
SHA11a3562ca09fa5a7ee075d78e1a360268e64b8617
SHA256adac304b4e0b93ec46f469bd2a7451ab58ea1ed16e17d7a80e8b91312202c0a8
SHA51292063672cdc076ca670b88a6d8eadaf9ae9fccf585a323b31c321d5a43ee7a9032ff4c0aea6e35e8847b1a9e149806322adf160c7f851e1c92112f43d093dc8e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82