Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/07/2024, 00:41

General

  • Target

    iUnlock GSM Ramdisk/iUnlock GSM Ramdisk.exe

  • Size

    1.0MB

  • MD5

    6ed2e8057953cd5c208fd0868b14a1af

  • SHA1

    b14da0008f68b18f21f8cde97d54425f797b84a8

  • SHA256

    726d13a1602c89102bd17660781a2bcd57306570c281f0c71c33268f27f58c79

  • SHA512

    6c3fcacdb185cf5629ff796a9696bfe1933fd4edb69dc6578cae6374c856aa0b3cbb9b9f219170abc67f4368df28b9e03fa11e9db873ddcf81d8ac1858c06ced

  • SSDEEP

    12288:KW2vL7h47bT9eyl+tBaDpxM0SLr2+XXXBQp0dlp+5W8spErYrnoLbq1S/JIgN0OX:x2vn8vQraDfmeyLdlG78joLbdDzORM

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Kills process with taskkill 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\iUnlock GSM Ramdisk\iUnlock GSM Ramdisk.exe
    "C:\Users\Admin\AppData\Local\Temp\iUnlock GSM Ramdisk\iUnlock GSM Ramdisk.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4704
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""tmp\shell.cmd""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4900
      • C:\Users\Admin\AppData\Local\Temp\iUnlock GSM Ramdisk\lib\curl.exe
        lib\curl.exe -s -k https://geminixteam.com/Message.php
        3⤵
          PID:4384
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""tmp\shell.cmd""
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4060
        • C:\Windows\system32\taskkill.exe
          TASKKILL /IM iproxy.exe /F
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3132

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\302b4517-bf81-4b85-8a36-553d0c421a3e\AgileDotNetRT64.dll

      Filesize

      75KB

      MD5

      42b2c266e49a3acd346b91e3b0e638c0

      SHA1

      2bc52134f03fcc51cb4e0f6c7cf70646b4df7dd1

      SHA256

      adeed015f06efa363d504a18acb671b1db4b20b23664a55c9bc28aef3283ca29

      SHA512

      770822fd681a1d98afe03f6fbe5f116321b54c8e2989fb07491811fd29fca5b666f1adf4c6900823af1271e342cacc9293e9db307c4eef852d1a253b00347a81

    • C:\Users\Admin\AppData\Local\Temp\iUnlock GSM Ramdisk\tmp\shell.cmd

      Filesize

      64B

      MD5

      c6c4ebed69d8e18386f2dc2ce13ccdd2

      SHA1

      aad3ed8cbd8ecfbea1e0df91fd06612c3ed1d046

      SHA256

      851607b42f0927db6e19d51dfec1b5fbcb9b4e9ab0c3fa9e2f55d9f463714a2a

      SHA512

      944a59aac27f93b2b8c755800759f00ddc4a602a127fff121d09cdf270fe48baeba5c8745761880692ec0562b614af02a30669cbf89ab0535f7f93958ec1228f

    • C:\Users\Admin\AppData\Local\Temp\iUnlock GSM Ramdisk\tmp\shell.cmd

      Filesize

      36B

      MD5

      0b6d7bf354a0986c97f5b96077cec97b

      SHA1

      d59089642b44a59b670bc3d64daf510ccd98dd8b

      SHA256

      c21d155a8dc5a7c06306c2fae1e6a240834973467f5c3ff489f42dbf75debf11

      SHA512

      8164d1b09fbb3be926c5616384d1ba60670d0a3a77c182d8a26e9c41a53b0038fddd14ad749fb8e142fff2371c05498ad2069ba6a6b9f86ab7e542f7e6d86957

    • memory/4384-32-0x00007FFB48690000-0x00007FFB486BC000-memory.dmp

      Filesize

      176KB

    • memory/4384-29-0x00007FFB48900000-0x00007FFB48933000-memory.dmp

      Filesize

      204KB

    • memory/4384-24-0x00007FFB4D170000-0x00007FFB4D21D000-memory.dmp

      Filesize

      692KB

    • memory/4384-25-0x00007FFB495C0000-0x00007FFB495D6000-memory.dmp

      Filesize

      88KB

    • memory/4384-27-0x00007FFB495A0000-0x00007FFB495B6000-memory.dmp

      Filesize

      88KB

    • memory/4384-28-0x00007FFB47FB0000-0x00007FFB48264000-memory.dmp

      Filesize

      2.7MB

    • memory/4384-30-0x00007FFB484E0000-0x00007FFB48527000-memory.dmp

      Filesize

      284KB

    • memory/4384-36-0x00007FFB39110000-0x00007FFB392C7000-memory.dmp

      Filesize

      1.7MB

    • memory/4384-31-0x00007FFB47F10000-0x00007FFB47FA2000-memory.dmp

      Filesize

      584KB

    • memory/4384-34-0x00007FFB394B0000-0x00007FFB395BB000-memory.dmp

      Filesize

      1.0MB

    • memory/4384-35-0x00007FFB395C0000-0x00007FFB396BB000-memory.dmp

      Filesize

      1004KB

    • memory/4384-26-0x00007FFB48E70000-0x00007FFB48EA0000-memory.dmp

      Filesize

      192KB

    • memory/4384-33-0x00007FFB484B0000-0x00007FFB484D8000-memory.dmp

      Filesize

      160KB

    • memory/4384-23-0x00007FF673DD0000-0x00007FF673E1C000-memory.dmp

      Filesize

      304KB

    • memory/4704-15-0x00007FFB36D80000-0x00007FFB36ECE000-memory.dmp

      Filesize

      1.3MB

    • memory/4704-8-0x00007FFB384D0000-0x00007FFB38F91000-memory.dmp

      Filesize

      10.8MB

    • memory/4704-19-0x00007FFB384D0000-0x00007FFB38F91000-memory.dmp

      Filesize

      10.8MB

    • memory/4704-18-0x00007FFB384D0000-0x00007FFB38F91000-memory.dmp

      Filesize

      10.8MB

    • memory/4704-17-0x00007FFB384D0000-0x00007FFB38F91000-memory.dmp

      Filesize

      10.8MB

    • memory/4704-4-0x000001CBE3070000-0x000001CBE3148000-memory.dmp

      Filesize

      864KB

    • memory/4704-2-0x000001CBC8D90000-0x000001CBC8E40000-memory.dmp

      Filesize

      704KB

    • memory/4704-1-0x000001CBC88B0000-0x000001CBC89BA000-memory.dmp

      Filesize

      1.0MB

    • memory/4704-16-0x00007FFB384D0000-0x00007FFB38F91000-memory.dmp

      Filesize

      10.8MB

    • memory/4704-3-0x000001CBC8E50000-0x000001CBC8E68000-memory.dmp

      Filesize

      96KB

    • memory/4704-0-0x00007FFB384D3000-0x00007FFB384D5000-memory.dmp

      Filesize

      8KB

    • memory/4704-7-0x000001CBE43F0000-0x000001CBE4612000-memory.dmp

      Filesize

      2.1MB

    • memory/4704-6-0x000001CBE3BD0000-0x000001CBE3C88000-memory.dmp

      Filesize

      736KB

    • memory/4704-5-0x000001CBE3FE0000-0x000001CBE43E6000-memory.dmp

      Filesize

      4.0MB

    • memory/4704-40-0x00007FFB384D0000-0x00007FFB38F91000-memory.dmp

      Filesize

      10.8MB