Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10Acc_Generator_V3.rar
windows7-x64
3Acc_Generator_V3.rar
windows10-2004-x64
8Acc Genera...V3.exe
windows7-x64
7Acc Genera...V3.exe
windows10-2004-x64
7�3D�tn�.pyc
windows7-x64
�3D�tn�.pyc
windows10-2004-x64
Acc Genera...V3.pdb
windows7-x64
3Acc Genera...V3.pdb
windows10-2004-x64
3Acc Genera...I2.dll
windows7-x64
1Acc Genera...I2.dll
windows10-2004-x64
1Acc Genera...ui.ini
windows7-x64
1Acc Genera...ui.ini
windows10-2004-x64
1Analysis
-
max time kernel
845s -
max time network
846s -
platform
windows7_x64 -
resource
win7-20240220-de -
resource tags
arch:x64arch:x86image:win7-20240220-delocale:de-deos:windows7-x64systemwindows -
submitted
16/04/2024, 20:12
Behavioral task
behavioral1
Sample
Acc_Generator_V3.rar
Resource
win7-20240220-de
Behavioral task
behavioral2
Sample
Acc_Generator_V3.rar
Resource
win10v2004-20240412-de
Behavioral task
behavioral3
Sample
Acc Generator V3/Acc Generator V3.exe
Resource
win7-20240220-de
Behavioral task
behavioral4
Sample
Acc Generator V3/Acc Generator V3.exe
Resource
win10v2004-20240226-de
Behavioral task
behavioral5
Sample
�3D�tn�.pyc
Resource
win7-20240221-de
Behavioral task
behavioral6
Sample
�3D�tn�.pyc
Resource
win10v2004-20240412-de
Behavioral task
behavioral7
Sample
Acc Generator V3/Acc Generator V3.pdb
Resource
win7-20240221-de
Behavioral task
behavioral8
Sample
Acc Generator V3/Acc Generator V3.pdb
Resource
win10v2004-20240412-de
Behavioral task
behavioral9
Sample
Acc Generator V3/Guna.UI2.dll
Resource
win7-20240221-de
Behavioral task
behavioral10
Sample
Acc Generator V3/Guna.UI2.dll
Resource
win10v2004-20240412-de
Behavioral task
behavioral11
Sample
Acc Generator V3/imgui.ini
Resource
win7-20240221-de
Behavioral task
behavioral12
Sample
Acc Generator V3/imgui.ini
Resource
win10v2004-20240412-de
General
-
Target
Acc_Generator_V3.rar
-
Size
10.4MB
-
MD5
627267770e3421378e82a76b53fd1b4e
-
SHA1
dbab8da0c78ac6ec4baa31ddd83b93dc4ea62259
-
SHA256
922efe7b4d690b09a100538e8031ef77597059488f8693c46f02e79de036f5bb
-
SHA512
320250198c93b2074e090abe17ef0daa92ee281c3d910dce8de635fce7e96f8d8f369e50da9505398ef492072993b282d5e5e78da5a2c9abb107a5e65ab0cea9
-
SSDEEP
196608:VJpWC8XiWjTbI8IxI46xtNSxLhKaLuM6W+mPhX2xaEwM4hvmZQN0d5:VvErjTbBdtNaA0uM6qXXEF44GOd5
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2580 7zFM.exe Token: 35 2580 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2580 7zFM.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2580 2196 cmd.exe 29 PID 2196 wrote to memory of 2580 2196 cmd.exe 29 PID 2196 wrote to memory of 2580 2196 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Acc_Generator_V3.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Acc_Generator_V3.rar"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2580
-