Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3ggpermV3/A...64.exe
windows7-x64
1ggpermV3/A...64.exe
windows10-2004-x64
1ggpermV3/F...er.bat
windows7-x64
1ggpermV3/F...er.bat
windows10-2004-x64
1ggpermV3/N...on.dll
windows7-x64
1ggpermV3/N...on.dll
windows10-2004-x64
1ggpermV3/S...UI.dll
windows7-x64
1ggpermV3/S...UI.dll
windows10-2004-x64
1ggpermV3/T...er.exe
windows7-x64
ggpermV3/T...er.exe
windows10-2004-x64
10ggpermV3/a...64.sys
windows7-x64
1ggpermV3/a...64.sys
windows10-2004-x64
1ggpermV3/ggpermV3.exe
windows7-x64
6ggpermV3/ggpermV3.exe
windows10-2004-x64
3ggpermV3/m...er.bat
windows7-x64
3ggpermV3/m...er.bat
windows10-2004-x64
3ggpermV3/s...er.exe
windows7-x64
1ggpermV3/s...er.exe
windows10-2004-x64
1ggpermV3/s...er.exe
windows7-x64
1ggpermV3/s...er.exe
windows10-2004-x64
1ggpermV3/woof.bat
windows7-x64
8ggpermV3/woof.bat
windows10-2004-x64
8Resubmissions
09/11/2024, 22:49
241109-2r2veatfrl 1009/11/2024, 22:47
241109-2qkjqssrdz 1009/11/2024, 22:46
241109-2p2fvstfqj 1009/11/2024, 22:44
241109-2nsgkasrbt 1007/11/2024, 16:00
241107-tfl1taxpgl 1010/02/2024, 17:17
240210-vtnl8sge36 10Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/11/2024, 16:00
Static task
static1
Behavioral task
behavioral1
Sample
ggpermV3/AMIDEWINx64.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ggpermV3/AMIDEWINx64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
ggpermV3/Final_Cleaner.bat
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
ggpermV3/Final_Cleaner.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
ggpermV3/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
ggpermV3/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
ggpermV3/Siticone.UI.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
ggpermV3/Siticone.UI.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
ggpermV3/Trinity Cleaner.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
ggpermV3/Trinity Cleaner.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
ggpermV3/amifldrv64.sys
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
ggpermV3/amifldrv64.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
ggpermV3/ggpermV3.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
ggpermV3/ggpermV3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
ggpermV3/macchanger.bat
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
ggpermV3/macchanger.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
ggpermV3/sxghr-driver.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
ggpermV3/sxghr-driver.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
ggpermV3/sxghr-driver.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
ggpermV3/sxghr-driver.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
ggpermV3/woof.bat
Resource
win7-20240903-en
General
-
Target
ggpermV3/woof.bat
-
Size
1KB
-
MD5
9dfe4e730dcc5e0d3951038ad2a095a1
-
SHA1
e033d9a40234b9544606ec4d603add264cb38841
-
SHA256
bfffd2faf6710e02912de0eec63b593f35a8bebef114932b4a4bc9c67fad59b8
-
SHA512
297e9950fd207687af957a94c5fb7d073bb89dcebdd6ee047fa0465f55bb95b42563c7310980bf1e41ca671a1f8c824e86dfe515b844f99f307965d199d8dbfd
Malware Config
Signatures
-
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2336 sc.exe 2168 sc.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 664 ipconfig.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 26 IoCs
pid Process 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2412 1704 cmd.exe 31 PID 1704 wrote to memory of 2412 1704 cmd.exe 31 PID 1704 wrote to memory of 2412 1704 cmd.exe 31 PID 1704 wrote to memory of 2420 1704 cmd.exe 32 PID 1704 wrote to memory of 2420 1704 cmd.exe 32 PID 1704 wrote to memory of 2420 1704 cmd.exe 32 PID 1704 wrote to memory of 2556 1704 cmd.exe 33 PID 1704 wrote to memory of 2556 1704 cmd.exe 33 PID 1704 wrote to memory of 2556 1704 cmd.exe 33 PID 1704 wrote to memory of 2088 1704 cmd.exe 34 PID 1704 wrote to memory of 2088 1704 cmd.exe 34 PID 1704 wrote to memory of 2088 1704 cmd.exe 34 PID 1704 wrote to memory of 2560 1704 cmd.exe 35 PID 1704 wrote to memory of 2560 1704 cmd.exe 35 PID 1704 wrote to memory of 2560 1704 cmd.exe 35 PID 1704 wrote to memory of 2376 1704 cmd.exe 36 PID 1704 wrote to memory of 2376 1704 cmd.exe 36 PID 1704 wrote to memory of 2376 1704 cmd.exe 36 PID 1704 wrote to memory of 2524 1704 cmd.exe 37 PID 1704 wrote to memory of 2524 1704 cmd.exe 37 PID 1704 wrote to memory of 2524 1704 cmd.exe 37 PID 1704 wrote to memory of 1908 1704 cmd.exe 38 PID 1704 wrote to memory of 1908 1704 cmd.exe 38 PID 1704 wrote to memory of 1908 1704 cmd.exe 38 PID 1704 wrote to memory of 2952 1704 cmd.exe 39 PID 1704 wrote to memory of 2952 1704 cmd.exe 39 PID 1704 wrote to memory of 2952 1704 cmd.exe 39 PID 1704 wrote to memory of 2080 1704 cmd.exe 40 PID 1704 wrote to memory of 2080 1704 cmd.exe 40 PID 1704 wrote to memory of 2080 1704 cmd.exe 40 PID 1704 wrote to memory of 2956 1704 cmd.exe 41 PID 1704 wrote to memory of 2956 1704 cmd.exe 41 PID 1704 wrote to memory of 2956 1704 cmd.exe 41 PID 1704 wrote to memory of 2804 1704 cmd.exe 42 PID 1704 wrote to memory of 2804 1704 cmd.exe 42 PID 1704 wrote to memory of 2804 1704 cmd.exe 42 PID 1704 wrote to memory of 2468 1704 cmd.exe 43 PID 1704 wrote to memory of 2468 1704 cmd.exe 43 PID 1704 wrote to memory of 2468 1704 cmd.exe 43 PID 1704 wrote to memory of 2268 1704 cmd.exe 44 PID 1704 wrote to memory of 2268 1704 cmd.exe 44 PID 1704 wrote to memory of 2268 1704 cmd.exe 44 PID 1704 wrote to memory of 2760 1704 cmd.exe 45 PID 1704 wrote to memory of 2760 1704 cmd.exe 45 PID 1704 wrote to memory of 2760 1704 cmd.exe 45 PID 1704 wrote to memory of 2768 1704 cmd.exe 46 PID 1704 wrote to memory of 2768 1704 cmd.exe 46 PID 1704 wrote to memory of 2768 1704 cmd.exe 46 PID 1704 wrote to memory of 2884 1704 cmd.exe 47 PID 1704 wrote to memory of 2884 1704 cmd.exe 47 PID 1704 wrote to memory of 2884 1704 cmd.exe 47 PID 1704 wrote to memory of 2908 1704 cmd.exe 48 PID 1704 wrote to memory of 2908 1704 cmd.exe 48 PID 1704 wrote to memory of 2908 1704 cmd.exe 48 PID 1704 wrote to memory of 2888 1704 cmd.exe 49 PID 1704 wrote to memory of 2888 1704 cmd.exe 49 PID 1704 wrote to memory of 2888 1704 cmd.exe 49 PID 1704 wrote to memory of 3036 1704 cmd.exe 50 PID 1704 wrote to memory of 3036 1704 cmd.exe 50 PID 1704 wrote to memory of 3036 1704 cmd.exe 50 PID 1704 wrote to memory of 2776 1704 cmd.exe 51 PID 1704 wrote to memory of 2776 1704 cmd.exe 51 PID 1704 wrote to memory of 2776 1704 cmd.exe 51 PID 1704 wrote to memory of 3032 1704 cmd.exe 52
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ggpermV3\woof.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SS 254181516630379168832⤵PID:2412
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SS 207672137629665139862⤵PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BS 29537718231614118282⤵PID:2556
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SV 191218271863160992⤵PID:2088
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BV 27883217681901554302⤵PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CS 230562700529815282192⤵PID:2376
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /PSN 7556132732214318092⤵PID:2524
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SU AUTO2⤵PID:1908
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /PAT 3962155672517196422⤵PID:2952
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /PPN 19116119062729778872⤵PID:2080
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /IV 108311091412386321012⤵PID:2956
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SM 256701941628336120142⤵PID:2804
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SP 50142211722743228672⤵PID:2468
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BS 182022355816046158402⤵PID:2268
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SF 267442229819240198562⤵PID:2760
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BM 39232624390211312⤵PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BP 53142658523183212292⤵PID:2884
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BT 3148918362806742972⤵PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BLC 321032670115500193102⤵PID:2888
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CM 2370434841311097042⤵PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CT 15100115725985222182⤵PID:2776
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CV 7536324621202113232⤵PID:3032
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CA 2565984198341304472⤵PID:2920
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CO 205472280117014297682⤵PID:2188
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CSK 26753132481931411472⤵PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SK 21426181816744266002⤵PID:2736
-
-
C:\Windows\system32\net.exenet stop winmgmt /y2⤵PID:2656
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop winmgmt /y3⤵PID:2708
-
-
-
C:\Windows\system32\net.exenet start winmgmt /y2⤵PID:2740
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start winmgmt /y3⤵PID:1440
-
-
-
C:\Windows\system32\sc.exesc stop winmgmt2⤵
- Launches sc.exe
PID:2168
-
-
C:\Windows\system32\sc.exesc start winmgmt2⤵
- Launches sc.exe
PID:2336
-
-
C:\Windows\system32\ipconfig.exeipconfig /flushdns2⤵
- Gathers network information
PID:664
-