Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 13:46
Static task
static1
Behavioral task
behavioral1
Sample
gdifuncs.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
gdifuncs.exe
Resource
win10v2004-20240802-en
General
-
Target
gdifuncs.exe
-
Size
5.5MB
-
MD5
b76fba5c80e125db35e012c5247933f2
-
SHA1
dd51010977c10838b6217e1686608d4bbc60d86c
-
SHA256
0c1085f8ec50c34ebda4e87ed7db31ed707ff8fe21d111dde8ecefb042deb067
-
SHA512
cace1d777c8d29cfcee4601d7513b45255dbb24954e28fe6fbb61fe0162551435fab877e26dbb02305b2c6c09c878e17ded87ca11c31e0eb4e004ef8295edd78
-
SSDEEP
98304:CDFrA8y4D+i4DBz2NHlruSSDllNmd+5z/Le7q2//Le7q2:CD5y4D+i4DZmLclKez/Lkq4/Lkq
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, wscript.exe \"C:\\windows\\winbase_base_procid_none\\secureloc0x65\\WinRapistI386.vbs\"" gdifuncs.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" gdifuncs.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" gdifuncs.exe -
Disables Task Manager via registry modification
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdifuncs.exe -
Modifies Control Panel 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Control Panel\Cursors\Arrow = "C:\\Windows\\winbase_base_procid_none\\secureloc0x65\\rcur.cur" gdifuncs.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Control Panel\Cursors\AppStarting = "C:\\Windows\\winbase_base_procid_none\\secureloc0x65\\rcur.cur" gdifuncs.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Control Panel\Cursors\Hand = "C:\\Windows\\winbase_base_procid_none\\secureloc0x65\\rcur.cur" gdifuncs.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe 2352 gdifuncs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2352 gdifuncs.exe Token: SeDebugPrivilege 2352 gdifuncs.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" gdifuncs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\gdifuncs.exe"C:\Users\Admin\AppData\Local\Temp\gdifuncs.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Disables RegEdit via registry modification
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2352
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1