Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3AimmyLauncher.exe
windows10-2004-x64
7DirectML.dll
windows10-2004-x64
1TotallyNotAimmyV2.exe
windows10-2004-x64
1TotallyNotAimmyV2.exe
windows10-2004-x64
1onnxruntime.dll
windows10-2004-x64
1runtimes/w...me.dll
windows10-2004-x64
1runtimes/w...me.dll
windows10-2004-x64
1runtimes/w...me.dll
windows10-2004-x64
1runtimes/w...nt.dll
windows10-2004-x64
1Analysis
-
max time kernel
1383s -
max time network
1166s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2024, 20:47
Static task
static1
Behavioral task
behavioral1
Sample
AimmyLauncher.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
DirectML.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
TotallyNotAimmyV2.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral4
Sample
TotallyNotAimmyV2.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
onnxruntime.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral6
Sample
runtimes/win-arm64/native/onnxruntime.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
runtimes/win-x64/native/onnxruntime.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral8
Sample
runtimes/win-x86/native/onnxruntime.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
runtimes/win/lib/net8.0/System.Management.dll
Resource
win10v2004-20240412-en
General
-
Target
runtimes/win-x86/native/onnxruntime.dll
-
Size
11.3MB
-
MD5
c729f190fc5e167957b6b2b5161c9311
-
SHA1
7bff0b54c05c1f12e317e115551be239296a902c
-
SHA256
9aac6501125a2d3c32d0fb9595c94e373038b162fca46207dd161645e09ed920
-
SHA512
2d250cb0cb0c842a8b616e8539ba71822535915fa089b2f5ae95aec2eb4a9d689f1a1ee86e1eeb14797e8b5e49c107208ff03ce897fb4d3b33d70492812f1a79
-
SSDEEP
196608:8wkiQfuSJkmK8Lkciy8G+4EEhWTIP2jv1b8gVhTIRhHQldBTlaCoAEO1CtUPC2k+:8aQfuSJKciy834EEhWTIP2p8gVhTIRB2
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 364 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3332 wrote to memory of 3968 3332 rundll32.exe 85 PID 3332 wrote to memory of 3968 3332 rundll32.exe 85 PID 3332 wrote to memory of 3968 3332 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\runtimes\win-x86\native\onnxruntime.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\runtimes\win-x86\native\onnxruntime.dll,#12⤵PID:3968
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:1736
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:364