Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
04/03/2025, 23:01
Static task
static1
General
-
Target
W6ySCZP.exe
-
Size
1.8MB
-
MD5
aeed9bddf6bf08f0470321855460101c
-
SHA1
063cbd99b27c5989c1558845f47819e4a7d5ce93
-
SHA256
2ed7054a259f7efd4a6cd8d7930f019ca29c00ac02c0c29515376c57d77fc944
-
SHA512
915d99269817968bb9e90ac1198d1c0bfc0c2afd860d39933a8714381deb3562eb74ee05aab9ad54a5d4774190fead338d9dcdcae03b0e630dc612e8ac00a70a
-
SSDEEP
49152:pbGi9UZtjE+mbKe83yQMKUPGfyxu6o57N512SX:A1EZKe8MKK46o9N5
Malware Config
Extracted
amadey
5.21
a4d2cd
http://cobolrationumelawrtewarms.com
http://�������� jlgenfekjlfnvtgpegkwr.xyz
-
install_dir
a58456755d
-
install_file
Gxtuum.exe
-
strings_key
00fadbeacf092dfd58b48ef4ac68f826
-
url_paths
/3ofn3jf3e2ljk/index.php
Extracted
systembc
towerbingobongoboom.com
62.60.226.86
Signatures
-
Amadey family
-
Systembc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ W6ySCZP.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Gxtuum.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ coredrive.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Gxtuum.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ieorfc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Gxtuum.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 3 1400 Gxtuum.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion W6ySCZP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion W6ySCZP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion coredrive.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ieorfc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion coredrive.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ieorfc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Gxtuum.exe -
Executes dropped EXE 5 IoCs
pid Process 1400 Gxtuum.exe 3988 coredrive.exe 1452 Gxtuum.exe 3292 ieorfc.exe 1508 Gxtuum.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1408376509-1621642251-2666462513-1000\Software\Wine ieorfc.exe Key opened \REGISTRY\USER\S-1-5-21-1408376509-1621642251-2666462513-1000\Software\Wine Gxtuum.exe Key opened \REGISTRY\USER\S-1-5-21-1408376509-1621642251-2666462513-1000\Software\Wine W6ySCZP.exe Key opened \REGISTRY\USER\S-1-5-21-1408376509-1621642251-2666462513-1000\Software\Wine Gxtuum.exe Key opened \REGISTRY\USER\S-1-5-21-1408376509-1621642251-2666462513-1000\Software\Wine coredrive.exe Key opened \REGISTRY\USER\S-1-5-21-1408376509-1621642251-2666462513-1000\Software\Wine Gxtuum.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 224 W6ySCZP.exe 1400 Gxtuum.exe 3988 coredrive.exe 1452 Gxtuum.exe 3292 ieorfc.exe 1508 Gxtuum.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\Gxtuum.job W6ySCZP.exe File created C:\Windows\Tasks\Test Task17.job coredrive.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coredrive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ieorfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language W6ySCZP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 224 W6ySCZP.exe 224 W6ySCZP.exe 1400 Gxtuum.exe 1400 Gxtuum.exe 3988 coredrive.exe 3988 coredrive.exe 1452 Gxtuum.exe 1452 Gxtuum.exe 3292 ieorfc.exe 3292 ieorfc.exe 1508 Gxtuum.exe 1508 Gxtuum.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 224 W6ySCZP.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 224 wrote to memory of 1400 224 W6ySCZP.exe 78 PID 224 wrote to memory of 1400 224 W6ySCZP.exe 78 PID 224 wrote to memory of 1400 224 W6ySCZP.exe 78 PID 1400 wrote to memory of 3988 1400 Gxtuum.exe 79 PID 1400 wrote to memory of 3988 1400 Gxtuum.exe 79 PID 1400 wrote to memory of 3988 1400 Gxtuum.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\W6ySCZP.exe"C:\Users\Admin\AppData\Local\Temp\W6ySCZP.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Roaming\10000640100\coredrive.exe"C:\Users\Admin\AppData\Roaming\10000640100\coredrive.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3988
-
-
-
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1452
-
C:\ProgramData\wfkp\ieorfc.exeC:\ProgramData\wfkp\ieorfc.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3292
-
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5aeed9bddf6bf08f0470321855460101c
SHA1063cbd99b27c5989c1558845f47819e4a7d5ce93
SHA2562ed7054a259f7efd4a6cd8d7930f019ca29c00ac02c0c29515376c57d77fc944
SHA512915d99269817968bb9e90ac1198d1c0bfc0c2afd860d39933a8714381deb3562eb74ee05aab9ad54a5d4774190fead338d9dcdcae03b0e630dc612e8ac00a70a
-
Filesize
1.6MB
MD5c6a399eb155322a8cbf1390c118553cb
SHA1c59b0aa34638e8991358520e29625bb7fb4e3b6b
SHA256a7c8390922ecfe4e4be4c9ffff567e91298a8bbf96dc96318305f45ec59f5221
SHA5126437b6ea8990130f8e69b113f6ec8310e8831a80a2cf7ef1d8d16b323729a89c4a00a8900030e77f5671a7a40971e519731ec22519d98d7af29577dcb5dfe44e
-
Filesize
234B
MD5718cf1e84787c6cb2851a8af730282a9
SHA1b928b8771c6857d2aa4b8af7f9bbde08f6040235
SHA2564f6366d6b82f2a1e42308d2034d5f730197aa38da1a2814132b300679664104f
SHA5121dd7134b702dc136067296fa60a2987975cff2717e8f95e55b62ef7acec9b5cec6127679245e5e2545dc255efc0bb0d41088bd999d0e8660f09b2871c8a9e874