Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20250207-en -
resource tags
arch:x64arch:x86image:win11-20250207-enlocale:en-usos:windows11-21h2-x64system -
submitted
09/02/2025, 18:21
Static task
static1
Behavioral task
behavioral1
Sample
Dynpvoy.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Dynpvoy.exe
Resource
win10ltsc2021-20250207-en
General
-
Target
Dynpvoy.exe
-
Size
1.1MB
-
MD5
c5ad2e085a9ff5c605572215c40029e1
-
SHA1
252fe2d36d552bcf8752be2bdd62eb7711d3b2ab
-
SHA256
47c8723d2034a43fb63f89e2bcd731c99c1c316b238957720c761a0301202e05
-
SHA512
8878a0f2678908136158f3a6d88393e6831dfe1e64aa82adbb17c26b223381d5ac166dc241bedd554c8dd4e687e9bee624a91fbe3d2976ddfea1d811bf26f6d4
-
SSDEEP
24576:ointVUQ6nNORVNIW6/HPGs6h3RPey7PlLUPe3Oj3IyuFtx:oinvU5nNO3NIW1fNAyrlLyeO30tx
Malware Config
Extracted
amadey
5.04
b44aeb
-
install_dir
7725ce688f
-
install_file
Gxtuum.exe
-
strings_key
8bf9b3f72bb53c678e0173edf42df1ae
-
url_paths
/3ofn3jf3e2ljk/index.php
Signatures
-
Amadey family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
description pid Process procid_target PID 4572 created 3300 4572 Dynpvoy.exe 52 PID 4696 created 3300 4696 Gxtuum.exe 52 PID 2676 created 3300 2676 Gxtuum.exe 52 PID 2312 created 3300 2312 Gxtuum.exe 52 -
Downloads MZ/PE file 1 IoCs
flow pid Process 31 3592 Process not Found -
Executes dropped EXE 6 IoCs
pid Process 4696 Gxtuum.exe 4892 Gxtuum.exe 2676 Gxtuum.exe 4308 Gxtuum.exe 2312 Gxtuum.exe 5860 Gxtuum.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4572 set thread context of 1368 4572 Dynpvoy.exe 85 PID 4696 set thread context of 4892 4696 Gxtuum.exe 88 PID 2676 set thread context of 4308 2676 Gxtuum.exe 95 PID 2312 set thread context of 5860 2312 Gxtuum.exe 98 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Gxtuum.job Dynpvoy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dynpvoy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dynpvoy.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2192 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4572 Dynpvoy.exe 4696 Gxtuum.exe 2676 Gxtuum.exe 2312 Gxtuum.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4572 Dynpvoy.exe Token: SeDebugPrivilege 4572 Dynpvoy.exe Token: SeDebugPrivilege 4696 Gxtuum.exe Token: SeDebugPrivilege 4696 Gxtuum.exe Token: SeDebugPrivilege 2676 Gxtuum.exe Token: SeDebugPrivilege 2676 Gxtuum.exe Token: SeDebugPrivilege 2312 Gxtuum.exe Token: SeDebugPrivilege 2312 Gxtuum.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1368 Dynpvoy.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 4572 wrote to memory of 1368 4572 Dynpvoy.exe 85 PID 4572 wrote to memory of 1368 4572 Dynpvoy.exe 85 PID 4572 wrote to memory of 1368 4572 Dynpvoy.exe 85 PID 4572 wrote to memory of 1368 4572 Dynpvoy.exe 85 PID 4572 wrote to memory of 1368 4572 Dynpvoy.exe 85 PID 4572 wrote to memory of 1368 4572 Dynpvoy.exe 85 PID 4572 wrote to memory of 1368 4572 Dynpvoy.exe 85 PID 4572 wrote to memory of 1368 4572 Dynpvoy.exe 85 PID 4572 wrote to memory of 1368 4572 Dynpvoy.exe 85 PID 4572 wrote to memory of 1368 4572 Dynpvoy.exe 85 PID 1368 wrote to memory of 4696 1368 Dynpvoy.exe 86 PID 1368 wrote to memory of 4696 1368 Dynpvoy.exe 86 PID 1368 wrote to memory of 4696 1368 Dynpvoy.exe 86 PID 4696 wrote to memory of 4892 4696 Gxtuum.exe 88 PID 4696 wrote to memory of 4892 4696 Gxtuum.exe 88 PID 4696 wrote to memory of 4892 4696 Gxtuum.exe 88 PID 4696 wrote to memory of 4892 4696 Gxtuum.exe 88 PID 4696 wrote to memory of 4892 4696 Gxtuum.exe 88 PID 4696 wrote to memory of 4892 4696 Gxtuum.exe 88 PID 4696 wrote to memory of 4892 4696 Gxtuum.exe 88 PID 4696 wrote to memory of 4892 4696 Gxtuum.exe 88 PID 4696 wrote to memory of 4892 4696 Gxtuum.exe 88 PID 4696 wrote to memory of 4892 4696 Gxtuum.exe 88 PID 2676 wrote to memory of 4308 2676 Gxtuum.exe 95 PID 2676 wrote to memory of 4308 2676 Gxtuum.exe 95 PID 2676 wrote to memory of 4308 2676 Gxtuum.exe 95 PID 2676 wrote to memory of 4308 2676 Gxtuum.exe 95 PID 2676 wrote to memory of 4308 2676 Gxtuum.exe 95 PID 2676 wrote to memory of 4308 2676 Gxtuum.exe 95 PID 2676 wrote to memory of 4308 2676 Gxtuum.exe 95 PID 2676 wrote to memory of 4308 2676 Gxtuum.exe 95 PID 2676 wrote to memory of 4308 2676 Gxtuum.exe 95 PID 2676 wrote to memory of 4308 2676 Gxtuum.exe 95 PID 2312 wrote to memory of 5860 2312 Gxtuum.exe 98 PID 2312 wrote to memory of 5860 2312 Gxtuum.exe 98 PID 2312 wrote to memory of 5860 2312 Gxtuum.exe 98 PID 2312 wrote to memory of 5860 2312 Gxtuum.exe 98 PID 2312 wrote to memory of 5860 2312 Gxtuum.exe 98 PID 2312 wrote to memory of 5860 2312 Gxtuum.exe 98 PID 2312 wrote to memory of 5860 2312 Gxtuum.exe 98 PID 2312 wrote to memory of 5860 2312 Gxtuum.exe 98 PID 2312 wrote to memory of 5860 2312 Gxtuum.exe 98 PID 2312 wrote to memory of 5860 2312 Gxtuum.exe 98
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\Dynpvoy.exe"C:\Users\Admin\AppData\Local\Temp\Dynpvoy.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4572
-
-
C:\Users\Admin\AppData\Local\Temp\Dynpvoy.exe"C:\Users\Admin\AppData\Local\Temp\Dynpvoy.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4696
-
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"2⤵
- Executes dropped EXE
PID:4308
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"2⤵
- Executes dropped EXE
PID:5860
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7RSt4YkF6Nlk2c1UxMjg5YlM2cWw0VlJMYmtqZkJVR1RNSnNqckhyNDRpST0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIG5leHR2ZXJzaW9uPSIiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjIiIGluc3RhbGxkYXRldGltZT0iMTczODk1MTk2MCIgb29iZV9pbnN0YWxsX3RpbWU9IjEzMzgzNDI0NTQ1NjU5MDAwMCI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjIxNzk4NjIiIHN5c3RlbV91cHRpbWVfdGlja3M9IjUzMTE5ODk1NTgiLz48L2FwcD48L3JlcXVlc3Q-1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2192
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2676
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5c5ad2e085a9ff5c605572215c40029e1
SHA1252fe2d36d552bcf8752be2bdd62eb7711d3b2ab
SHA25647c8723d2034a43fb63f89e2bcd731c99c1c316b238957720c761a0301202e05
SHA5128878a0f2678908136158f3a6d88393e6831dfe1e64aa82adbb17c26b223381d5ac166dc241bedd554c8dd4e687e9bee624a91fbe3d2976ddfea1d811bf26f6d4