Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3AlphaBlendTextBox.dll
windows10-1703-x64
1Bunifu_UI_v1.5.3.dll
windows10-1703-x64
1HWID.exe
windows10-1703-x64
10RC7/AlphaB...ox.dll
windows10-1703-x64
1RC7/Bunifu....3.dll
windows10-1703-x64
1RC7/Monaco.html
windows10-1703-x64
1RC7/MonacoEditor.html
windows10-1703-x64
1RC7/RC7.exe
windows10-1703-x64
10RC7/RC7_UI.exe
windows10-1703-x64
1RC7/injector.dll
windows10-1703-x64
1RC7/sxlib.dll
windows10-1703-x64
1RC7/vs/bas...ain.js
windows10-1703-x64
1RC7/vs/bas...bat.js
windows10-1703-x64
1RC7/vs/bas...fee.js
windows10-1703-x64
1RC7/vs/bas...cpp.js
windows10-1703-x64
1RC7/vs/bas...arp.js
windows10-1703-x64
1RC7/vs/bas...csp.js
windows10-1703-x64
1RC7/vs/bas...css.js
windows10-1703-x64
1RC7/vs/bas...ile.js
windows10-1703-x64
1RC7/vs/bas...arp.js
windows10-1703-x64
1RC7/vs/bas.../go.js
windows10-1703-x64
1RC7/vs/bas...ars.js
windows10-1703-x64
1RC7/vs/bas...tml.js
windows10-1703-x64
1RC7/vs/bas...ini.js
windows10-1703-x64
1RC7/vs/bas...ava.js
windows10-1703-x64
1RC7/vs/bas...ess.js
windows10-1703-x64
1RC7/vs/bas...lua.js
windows10-1703-x64
1RC7/vs/bas...own.js
windows10-1703-x64
1RC7/vs/bas...dax.js
windows10-1703-x64
1RC7/vs/bas...sql.js
windows10-1703-x64
1RC7/vs/bas...e-c.js
windows10-1703-x64
1RC7/vs/bas...sql.js
windows10-1703-x64
1Analysis
-
max time kernel
126s -
max time network
139s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
07/12/2023, 03:22
Static task
static1
Behavioral task
behavioral1
Sample
AlphaBlendTextBox.dll
Resource
win10-20231129-en
Behavioral task
behavioral2
Sample
Bunifu_UI_v1.5.3.dll
Resource
win10-20231129-en
Behavioral task
behavioral3
Sample
HWID.exe
Resource
win10-20231129-en
Behavioral task
behavioral4
Sample
RC7/AlphaBlendTextBox.dll
Resource
win10-20231129-en
Behavioral task
behavioral5
Sample
RC7/Bunifu_UI_v1.5.3.dll
Resource
win10-20231023-en
Behavioral task
behavioral6
Sample
RC7/Monaco.html
Resource
win10-20231020-en
Behavioral task
behavioral7
Sample
RC7/MonacoEditor.html
Resource
win10-20231023-en
Behavioral task
behavioral8
Sample
RC7/RC7.exe
Resource
win10-20231020-en
Behavioral task
behavioral9
Sample
RC7/RC7_UI.exe
Resource
win10-20231020-en
Behavioral task
behavioral10
Sample
RC7/injector.dll
Resource
win10-20231025-en
Behavioral task
behavioral11
Sample
RC7/sxlib.dll
Resource
win10-20231020-en
Behavioral task
behavioral12
Sample
RC7/vs/base/worker/workerMain.js
Resource
win10-20231129-en
Behavioral task
behavioral13
Sample
RC7/vs/basic-languages/bat/bat.js
Resource
win10-20231129-en
Behavioral task
behavioral14
Sample
RC7/vs/basic-languages/coffee/coffee.js
Resource
win10-20231129-en
Behavioral task
behavioral15
Sample
RC7/vs/basic-languages/cpp/cpp.js
Resource
win10-20231129-en
Behavioral task
behavioral16
Sample
RC7/vs/basic-languages/csharp/csharp.js
Resource
win10-20231129-en
Behavioral task
behavioral17
Sample
RC7/vs/basic-languages/csp/csp.js
Resource
win10-20231129-en
Behavioral task
behavioral18
Sample
RC7/vs/basic-languages/css/css.js
Resource
win10-20231023-en
Behavioral task
behavioral19
Sample
RC7/vs/basic-languages/dockerfile/dockerfile.js
Resource
win10-20231025-en
Behavioral task
behavioral20
Sample
RC7/vs/basic-languages/fsharp/fsharp.js
Resource
win10-20231020-en
Behavioral task
behavioral21
Sample
RC7/vs/basic-languages/go/go.js
Resource
win10-20231020-en
Behavioral task
behavioral22
Sample
RC7/vs/basic-languages/handlebars/handlebars.js
Resource
win10-20231020-en
Behavioral task
behavioral23
Sample
RC7/vs/basic-languages/html/html.js
Resource
win10-20231129-en
Behavioral task
behavioral24
Sample
RC7/vs/basic-languages/ini/ini.js
Resource
win10-20231129-en
Behavioral task
behavioral25
Sample
RC7/vs/basic-languages/java/java.js
Resource
win10-20231023-en
Behavioral task
behavioral26
Sample
RC7/vs/basic-languages/less/less.js
Resource
win10-20231020-en
Behavioral task
behavioral27
Sample
RC7/vs/basic-languages/lua/lua.js
Resource
win10-20231129-en
Behavioral task
behavioral28
Sample
RC7/vs/basic-languages/markdown/markdown.js
Resource
win10-20231129-en
Behavioral task
behavioral29
Sample
RC7/vs/basic-languages/msdax/msdax.js
Resource
win10-20231129-en
Behavioral task
behavioral30
Sample
RC7/vs/basic-languages/mysql/mysql.js
Resource
win10-20231129-en
Behavioral task
behavioral31
Sample
RC7/vs/basic-languages/objective-c/objective-c.js
Resource
win10-20231023-en
Behavioral task
behavioral32
Sample
RC7/vs/basic-languages/pgsql/pgsql.js
Resource
win10-20231129-en
General
-
Target
RC7/RC7.exe
-
Size
160KB
-
MD5
40e89aaf41d4ebda079572167d4665e7
-
SHA1
c14a019a862aa3f595da7d15cc993f4f894d10a5
-
SHA256
95388dfe045e7e976186c3ab0286ed8aa77bdb299c867f8c3e46f23ff7624a4d
-
SHA512
035996ef789c0dc972265ec04652d01e1a530e61d4dfdd3fadc6e502a46b054e2b88fd5347d63deba491924b67c466996208f33f9a5019eb60923445551ce554
-
SSDEEP
3072:Vjt4sK0uoEz8jh6oKyIPw+lV59i/XvGO0EFA0K+ymEN4NI:VjysKJ8cNP779Wvwc19yx
Malware Config
Extracted
xworm
owner-cc.gl.at.ply.gg:32281
-
install_file
USB.exe
Extracted
umbral
https://discord.com/api/webhooks/1179573880306806895/9PPafRuKqunRXMBgRp7lwh-lO7PV6gpu6bih39np__mk8ZAghkJ95dBDKUvofe3l-iRe
Signatures
-
Detect Umbral payload 3 IoCs
resource yara_rule behavioral8/files/0x000800000001ab8b-12.dat family_umbral behavioral8/memory/3112-14-0x00000166B6240000-0x00000166B6280000-memory.dmp family_umbral behavioral8/files/0x000800000001ab8b-11.dat family_umbral -
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral8/files/0x000800000001ab12-8.dat family_xworm behavioral8/files/0x000800000001ab12-9.dat family_xworm behavioral8/memory/3300-15-0x0000000000340000-0x0000000000356000-memory.dmp family_xworm -
Executes dropped EXE 2 IoCs
pid Process 3300 XClient.exe 3112 Umbral1.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 3112 Umbral1.exe Token: SeIncreaseQuotaPrivilege 3552 wmic.exe Token: SeSecurityPrivilege 3552 wmic.exe Token: SeTakeOwnershipPrivilege 3552 wmic.exe Token: SeLoadDriverPrivilege 3552 wmic.exe Token: SeSystemProfilePrivilege 3552 wmic.exe Token: SeSystemtimePrivilege 3552 wmic.exe Token: SeProfSingleProcessPrivilege 3552 wmic.exe Token: SeIncBasePriorityPrivilege 3552 wmic.exe Token: SeCreatePagefilePrivilege 3552 wmic.exe Token: SeBackupPrivilege 3552 wmic.exe Token: SeRestorePrivilege 3552 wmic.exe Token: SeShutdownPrivilege 3552 wmic.exe Token: SeDebugPrivilege 3552 wmic.exe Token: SeSystemEnvironmentPrivilege 3552 wmic.exe Token: SeRemoteShutdownPrivilege 3552 wmic.exe Token: SeUndockPrivilege 3552 wmic.exe Token: SeManageVolumePrivilege 3552 wmic.exe Token: 33 3552 wmic.exe Token: 34 3552 wmic.exe Token: 35 3552 wmic.exe Token: 36 3552 wmic.exe Token: SeIncreaseQuotaPrivilege 3552 wmic.exe Token: SeSecurityPrivilege 3552 wmic.exe Token: SeTakeOwnershipPrivilege 3552 wmic.exe Token: SeLoadDriverPrivilege 3552 wmic.exe Token: SeSystemProfilePrivilege 3552 wmic.exe Token: SeSystemtimePrivilege 3552 wmic.exe Token: SeProfSingleProcessPrivilege 3552 wmic.exe Token: SeIncBasePriorityPrivilege 3552 wmic.exe Token: SeCreatePagefilePrivilege 3552 wmic.exe Token: SeBackupPrivilege 3552 wmic.exe Token: SeRestorePrivilege 3552 wmic.exe Token: SeShutdownPrivilege 3552 wmic.exe Token: SeDebugPrivilege 3552 wmic.exe Token: SeSystemEnvironmentPrivilege 3552 wmic.exe Token: SeRemoteShutdownPrivilege 3552 wmic.exe Token: SeUndockPrivilege 3552 wmic.exe Token: SeManageVolumePrivilege 3552 wmic.exe Token: 33 3552 wmic.exe Token: 34 3552 wmic.exe Token: 35 3552 wmic.exe Token: 36 3552 wmic.exe Token: SeDebugPrivilege 3300 XClient.exe Token: SeDebugPrivilege 3300 XClient.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3484 wrote to memory of 3300 3484 RC7.exe 70 PID 3484 wrote to memory of 3300 3484 RC7.exe 70 PID 3484 wrote to memory of 3112 3484 RC7.exe 71 PID 3484 wrote to memory of 3112 3484 RC7.exe 71 PID 3112 wrote to memory of 3552 3112 Umbral1.exe 72 PID 3112 wrote to memory of 3552 3112 Umbral1.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\RC7\RC7.exe"C:\Users\Admin\AppData\Local\Temp\RC7\RC7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3300
-
-
C:\Users\Admin\AppData\Local\Temp\Umbral1.exe"C:\Users\Admin\AppData\Local\Temp\Umbral1.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD55c04d1b604c881ae86da044c2d16b8b2
SHA1c9f98d064e8284a51d43d72c15211fdd6edee1c8
SHA2565b0ae3b59dcfbdf94878f652d328c12b61b0783082046815bc6d01fecd8fd769
SHA512d156d5cab74668e2899aaced344d6d4e8e89eaaa6936c8378f89126747543f063066dd6c91e39203cbad0dfc9027aef5853775cef47751b669de6336d97223d6
-
Filesize
231KB
MD55c04d1b604c881ae86da044c2d16b8b2
SHA1c9f98d064e8284a51d43d72c15211fdd6edee1c8
SHA2565b0ae3b59dcfbdf94878f652d328c12b61b0783082046815bc6d01fecd8fd769
SHA512d156d5cab74668e2899aaced344d6d4e8e89eaaa6936c8378f89126747543f063066dd6c91e39203cbad0dfc9027aef5853775cef47751b669de6336d97223d6
-
Filesize
60KB
MD5fd41a98611978677f1adc60f86383ea0
SHA1200cfd48d7f7d28cff9c177cdd804e6fd578c015
SHA256ffc549f9e84b6ecaa96e1cb49c18a8bdd89d536e0556962c88995967009cdc3d
SHA51287a0d544d9b1dd2b53d40cd54d2c6955927dc287d2cf557eb50f408c3e6002efdac3ecbe908b49bf153bb9276d23e3e459bbaa502167cc52a63ae08a40251270
-
Filesize
60KB
MD5fd41a98611978677f1adc60f86383ea0
SHA1200cfd48d7f7d28cff9c177cdd804e6fd578c015
SHA256ffc549f9e84b6ecaa96e1cb49c18a8bdd89d536e0556962c88995967009cdc3d
SHA51287a0d544d9b1dd2b53d40cd54d2c6955927dc287d2cf557eb50f408c3e6002efdac3ecbe908b49bf153bb9276d23e3e459bbaa502167cc52a63ae08a40251270