Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250207-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250207-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
09/02/2025, 18:21
Static task
static1
Behavioral task
behavioral1
Sample
Dynpvoy.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Dynpvoy.exe
Resource
win10ltsc2021-20250207-en
General
-
Target
Dynpvoy.exe
-
Size
1.1MB
-
MD5
c5ad2e085a9ff5c605572215c40029e1
-
SHA1
252fe2d36d552bcf8752be2bdd62eb7711d3b2ab
-
SHA256
47c8723d2034a43fb63f89e2bcd731c99c1c316b238957720c761a0301202e05
-
SHA512
8878a0f2678908136158f3a6d88393e6831dfe1e64aa82adbb17c26b223381d5ac166dc241bedd554c8dd4e687e9bee624a91fbe3d2976ddfea1d811bf26f6d4
-
SSDEEP
24576:ointVUQ6nNORVNIW6/HPGs6h3RPey7PlLUPe3Oj3IyuFtx:oinvU5nNO3NIW1fNAyrlLyeO30tx
Malware Config
Extracted
amadey
5.04
b44aeb
-
install_dir
7725ce688f
-
install_file
Gxtuum.exe
-
strings_key
8bf9b3f72bb53c678e0173edf42df1ae
-
url_paths
/3ofn3jf3e2ljk/index.php
Signatures
-
Amadey family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
description pid Process procid_target PID 4160 created 3644 4160 Dynpvoy.exe 57 PID 672 created 3644 672 Gxtuum.exe 57 PID 2316 created 3644 2316 Gxtuum.exe 57 -
Downloads MZ/PE file 1 IoCs
flow pid Process 32 3260 Process not Found -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2725887018-3128739702-485120524-1000\Control Panel\International\Geo\Nation Dynpvoy.exe -
Executes dropped EXE 5 IoCs
pid Process 672 Gxtuum.exe 3236 Gxtuum.exe 2316 Gxtuum.exe 4080 Gxtuum.exe 2716 Gxtuum.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4160 set thread context of 1080 4160 Dynpvoy.exe 85 PID 672 set thread context of 3236 672 Gxtuum.exe 91 PID 2316 set thread context of 4080 2316 Gxtuum.exe 94 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Gxtuum.job Dynpvoy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dynpvoy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dynpvoy.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2572 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4160 Dynpvoy.exe 672 Gxtuum.exe 2316 Gxtuum.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4160 Dynpvoy.exe Token: SeDebugPrivilege 4160 Dynpvoy.exe Token: SeDebugPrivilege 672 Gxtuum.exe Token: SeDebugPrivilege 672 Gxtuum.exe Token: SeDebugPrivilege 2316 Gxtuum.exe Token: SeDebugPrivilege 2316 Gxtuum.exe Token: SeDebugPrivilege 2716 Gxtuum.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1080 Dynpvoy.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4160 wrote to memory of 1080 4160 Dynpvoy.exe 85 PID 4160 wrote to memory of 1080 4160 Dynpvoy.exe 85 PID 4160 wrote to memory of 1080 4160 Dynpvoy.exe 85 PID 4160 wrote to memory of 1080 4160 Dynpvoy.exe 85 PID 4160 wrote to memory of 1080 4160 Dynpvoy.exe 85 PID 4160 wrote to memory of 1080 4160 Dynpvoy.exe 85 PID 4160 wrote to memory of 1080 4160 Dynpvoy.exe 85 PID 4160 wrote to memory of 1080 4160 Dynpvoy.exe 85 PID 4160 wrote to memory of 1080 4160 Dynpvoy.exe 85 PID 4160 wrote to memory of 1080 4160 Dynpvoy.exe 85 PID 1080 wrote to memory of 672 1080 Dynpvoy.exe 88 PID 1080 wrote to memory of 672 1080 Dynpvoy.exe 88 PID 1080 wrote to memory of 672 1080 Dynpvoy.exe 88 PID 672 wrote to memory of 3236 672 Gxtuum.exe 91 PID 672 wrote to memory of 3236 672 Gxtuum.exe 91 PID 672 wrote to memory of 3236 672 Gxtuum.exe 91 PID 672 wrote to memory of 3236 672 Gxtuum.exe 91 PID 672 wrote to memory of 3236 672 Gxtuum.exe 91 PID 672 wrote to memory of 3236 672 Gxtuum.exe 91 PID 672 wrote to memory of 3236 672 Gxtuum.exe 91 PID 672 wrote to memory of 3236 672 Gxtuum.exe 91 PID 672 wrote to memory of 3236 672 Gxtuum.exe 91 PID 672 wrote to memory of 3236 672 Gxtuum.exe 91 PID 2316 wrote to memory of 4080 2316 Gxtuum.exe 94 PID 2316 wrote to memory of 4080 2316 Gxtuum.exe 94 PID 2316 wrote to memory of 4080 2316 Gxtuum.exe 94 PID 2316 wrote to memory of 4080 2316 Gxtuum.exe 94 PID 2316 wrote to memory of 4080 2316 Gxtuum.exe 94 PID 2316 wrote to memory of 4080 2316 Gxtuum.exe 94 PID 2316 wrote to memory of 4080 2316 Gxtuum.exe 94 PID 2316 wrote to memory of 4080 2316 Gxtuum.exe 94 PID 2316 wrote to memory of 4080 2316 Gxtuum.exe 94 PID 2316 wrote to memory of 4080 2316 Gxtuum.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3644
-
C:\Users\Admin\AppData\Local\Temp\Dynpvoy.exe"C:\Users\Admin\AppData\Local\Temp\Dynpvoy.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4160
-
-
C:\Users\Admin\AppData\Local\Temp\Dynpvoy.exe"C:\Users\Admin\AppData\Local\Temp\Dynpvoy.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:672
-
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3236
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"2⤵
- Executes dropped EXE
PID:4080
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2572
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5c5ad2e085a9ff5c605572215c40029e1
SHA1252fe2d36d552bcf8752be2bdd62eb7711d3b2ab
SHA25647c8723d2034a43fb63f89e2bcd731c99c1c316b238957720c761a0301202e05
SHA5128878a0f2678908136158f3a6d88393e6831dfe1e64aa82adbb17c26b223381d5ac166dc241bedd554c8dd4e687e9bee624a91fbe3d2976ddfea1d811bf26f6d4