Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3ggpermV3.rar
windows7-x64
1ggpermV3.rar
windows10-2004-x64
1ggpermV3/A...64.exe
windows7-x64
1ggpermV3/A...64.exe
windows10-2004-x64
1ggpermV3/F...er.bat
windows7-x64
1ggpermV3/F...er.bat
windows10-2004-x64
1ggpermV3/N...on.dll
windows7-x64
1ggpermV3/N...on.dll
windows10-2004-x64
1ggpermV3/S...UI.dll
windows7-x64
1ggpermV3/S...UI.dll
windows10-2004-x64
1ggpermV3/T...er.exe
windows7-x64
ggpermV3/T...er.exe
windows10-2004-x64
8ggpermV3/a...64.sys
windows7-x64
1ggpermV3/a...64.sys
windows10-2004-x64
1ggpermV3/ggpermV3.exe
windows7-x64
3ggpermV3/ggpermV3.exe
windows10-2004-x64
3ggpermV3/m...er.bat
windows7-x64
3ggpermV3/m...er.bat
windows10-2004-x64
3ggpermV3/s...er.exe
windows7-x64
1ggpermV3/s...er.exe
windows10-2004-x64
1ggpermV3/s...er.exe
windows7-x64
1ggpermV3/s...er.exe
windows10-2004-x64
1ggpermV3/s...er.pdb
windows7-x64
3ggpermV3/s...er.pdb
windows10-2004-x64
3ggpermV3/s...g.json
windows7-x64
3ggpermV3/s...g.json
windows10-2004-x64
3ggpermV3/woof.bat
windows7-x64
8ggpermV3/woof.bat
windows10-2004-x64
8Resubmissions
09/11/2024, 22:49 UTC
241109-2r2veatfrl 1009/11/2024, 22:47 UTC
241109-2qkjqssrdz 1009/11/2024, 22:46 UTC
241109-2p2fvstfqj 1009/11/2024, 22:44 UTC
241109-2nsgkasrbt 1007/11/2024, 16:00 UTC
241107-tfl1taxpgl 1010/02/2024, 17:17 UTC
240210-vtnl8sge36 10Analysis
-
max time kernel
36s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09/11/2024, 22:49 UTC
Static task
static1
Behavioral task
behavioral1
Sample
ggpermV3.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ggpermV3.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
ggpermV3/AMIDEWINx64.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
ggpermV3/AMIDEWINx64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
ggpermV3/Final_Cleaner.bat
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
ggpermV3/Final_Cleaner.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
ggpermV3/Newtonsoft.Json.dll
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
ggpermV3/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
ggpermV3/Siticone.UI.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
ggpermV3/Siticone.UI.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
ggpermV3/Trinity Cleaner.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
ggpermV3/Trinity Cleaner.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
ggpermV3/amifldrv64.sys
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
ggpermV3/amifldrv64.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
ggpermV3/ggpermV3.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
ggpermV3/ggpermV3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
ggpermV3/macchanger.bat
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
ggpermV3/macchanger.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
ggpermV3/sxghr-driver.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
ggpermV3/sxghr-driver.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
ggpermV3/sxghr-driver.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
ggpermV3/sxghr-driver.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
ggpermV3/sxghr-driver.pdb
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
ggpermV3/sxghr-driver.pdb
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
ggpermV3/sxghr-driver.runtimeconfig.json
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
ggpermV3/sxghr-driver.runtimeconfig.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
ggpermV3/woof.bat
Resource
win7-20241010-en
General
-
Target
ggpermV3/woof.bat
-
Size
1KB
-
MD5
9dfe4e730dcc5e0d3951038ad2a095a1
-
SHA1
e033d9a40234b9544606ec4d603add264cb38841
-
SHA256
bfffd2faf6710e02912de0eec63b593f35a8bebef114932b4a4bc9c67fad59b8
-
SHA512
297e9950fd207687af957a94c5fb7d073bb89dcebdd6ee047fa0465f55bb95b42563c7310980bf1e41ca671a1f8c824e86dfe515b844f99f307965d199d8dbfd
Malware Config
Signatures
-
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2096 sc.exe 1036 sc.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2168 ipconfig.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 26 IoCs
pid Process 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2572 2336 cmd.exe 30 PID 2336 wrote to memory of 2572 2336 cmd.exe 30 PID 2336 wrote to memory of 2572 2336 cmd.exe 30 PID 2336 wrote to memory of 2828 2336 cmd.exe 31 PID 2336 wrote to memory of 2828 2336 cmd.exe 31 PID 2336 wrote to memory of 2828 2336 cmd.exe 31 PID 2336 wrote to memory of 2320 2336 cmd.exe 32 PID 2336 wrote to memory of 2320 2336 cmd.exe 32 PID 2336 wrote to memory of 2320 2336 cmd.exe 32 PID 2336 wrote to memory of 572 2336 cmd.exe 33 PID 2336 wrote to memory of 572 2336 cmd.exe 33 PID 2336 wrote to memory of 572 2336 cmd.exe 33 PID 2336 wrote to memory of 3032 2336 cmd.exe 34 PID 2336 wrote to memory of 3032 2336 cmd.exe 34 PID 2336 wrote to memory of 3032 2336 cmd.exe 34 PID 2336 wrote to memory of 1624 2336 cmd.exe 35 PID 2336 wrote to memory of 1624 2336 cmd.exe 35 PID 2336 wrote to memory of 1624 2336 cmd.exe 35 PID 2336 wrote to memory of 2636 2336 cmd.exe 36 PID 2336 wrote to memory of 2636 2336 cmd.exe 36 PID 2336 wrote to memory of 2636 2336 cmd.exe 36 PID 2336 wrote to memory of 2204 2336 cmd.exe 37 PID 2336 wrote to memory of 2204 2336 cmd.exe 37 PID 2336 wrote to memory of 2204 2336 cmd.exe 37 PID 2336 wrote to memory of 2888 2336 cmd.exe 38 PID 2336 wrote to memory of 2888 2336 cmd.exe 38 PID 2336 wrote to memory of 2888 2336 cmd.exe 38 PID 2336 wrote to memory of 2936 2336 cmd.exe 39 PID 2336 wrote to memory of 2936 2336 cmd.exe 39 PID 2336 wrote to memory of 2936 2336 cmd.exe 39 PID 2336 wrote to memory of 2948 2336 cmd.exe 40 PID 2336 wrote to memory of 2948 2336 cmd.exe 40 PID 2336 wrote to memory of 2948 2336 cmd.exe 40 PID 2336 wrote to memory of 3008 2336 cmd.exe 41 PID 2336 wrote to memory of 3008 2336 cmd.exe 41 PID 2336 wrote to memory of 3008 2336 cmd.exe 41 PID 2336 wrote to memory of 2940 2336 cmd.exe 42 PID 2336 wrote to memory of 2940 2336 cmd.exe 42 PID 2336 wrote to memory of 2940 2336 cmd.exe 42 PID 2336 wrote to memory of 2884 2336 cmd.exe 43 PID 2336 wrote to memory of 2884 2336 cmd.exe 43 PID 2336 wrote to memory of 2884 2336 cmd.exe 43 PID 2336 wrote to memory of 2852 2336 cmd.exe 44 PID 2336 wrote to memory of 2852 2336 cmd.exe 44 PID 2336 wrote to memory of 2852 2336 cmd.exe 44 PID 2336 wrote to memory of 2968 2336 cmd.exe 45 PID 2336 wrote to memory of 2968 2336 cmd.exe 45 PID 2336 wrote to memory of 2968 2336 cmd.exe 45 PID 2336 wrote to memory of 2876 2336 cmd.exe 46 PID 2336 wrote to memory of 2876 2336 cmd.exe 46 PID 2336 wrote to memory of 2876 2336 cmd.exe 46 PID 2336 wrote to memory of 1528 2336 cmd.exe 47 PID 2336 wrote to memory of 1528 2336 cmd.exe 47 PID 2336 wrote to memory of 1528 2336 cmd.exe 47 PID 2336 wrote to memory of 2960 2336 cmd.exe 48 PID 2336 wrote to memory of 2960 2336 cmd.exe 48 PID 2336 wrote to memory of 2960 2336 cmd.exe 48 PID 2336 wrote to memory of 2904 2336 cmd.exe 49 PID 2336 wrote to memory of 2904 2336 cmd.exe 49 PID 2336 wrote to memory of 2904 2336 cmd.exe 49 PID 2336 wrote to memory of 2776 2336 cmd.exe 50 PID 2336 wrote to memory of 2776 2336 cmd.exe 50 PID 2336 wrote to memory of 2776 2336 cmd.exe 50 PID 2336 wrote to memory of 2768 2336 cmd.exe 51
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ggpermV3\woof.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SS 1471997482386827512⤵PID:2572
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SS 2769784712896214042⤵PID:2828
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BS 2287493529597236002⤵PID:2320
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SV 119422250227313300452⤵PID:572
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BV 341731324874220632⤵PID:3032
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CS 156662691326848111842⤵PID:1624
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /PSN 3047130374666297552⤵PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SU AUTO2⤵PID:2204
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /PAT 255661361831985238592⤵PID:2888
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /PPN 5599811726134104842⤵PID:2936
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /IV 64682784822359125542⤵PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SM 158052263523422226902⤵PID:3008
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SP 385924405236108292⤵PID:2940
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BS 1665228843362255162⤵PID:2884
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SF 4752229292039141362⤵PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BM 276572867932297166732⤵PID:2968
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BP 156325109911767302⤵PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BT 23877601813998105462⤵PID:1528
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /BLC 298221260918802220542⤵PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CM 118132918912350204052⤵PID:2904
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CT 153231970314700295412⤵PID:2776
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CV 27489260854699119402⤵PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CA 21433662132184276492⤵PID:2580
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CO 239443020316124247322⤵PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /CSK 10943422324374199312⤵PID:2880
-
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3\AMIDEWINx64.EXEAMIDEWINx64.EXE /SK 8570307541204329112⤵PID:2856
-
-
C:\Windows\system32\net.exenet stop winmgmt /y2⤵PID:1092
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop winmgmt /y3⤵PID:2744
-
-
-
C:\Windows\system32\net.exenet start winmgmt /y2⤵PID:2012
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start winmgmt /y3⤵PID:1976
-
-
-
C:\Windows\system32\sc.exesc stop winmgmt2⤵
- Launches sc.exe
PID:2096
-
-
C:\Windows\system32\sc.exesc start winmgmt2⤵
- Launches sc.exe
PID:1036
-
-
C:\Windows\system32\ipconfig.exeipconfig /flushdns2⤵
- Gathers network information
PID:2168
-