Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
1Xvirus-Too...rus.py
windows7-x64
3Xvirus-Too...rus.py
windows10-2004-x64
3Xvirus-Too...up.bat
windows7-x64
1Xvirus-Too...up.bat
windows10-2004-x64
1Xvirus-Too...rt.bat
windows7-x64
1Xvirus-Too...rt.bat
windows10-2004-x64
1Xvirus-Too...t__.py
windows7-x64
1Xvirus-Too...t__.py
windows10-2004-x64
3Xvirus-Too...les.py
windows7-x64
3Xvirus-Too...les.py
windows10-2004-x64
3Xvirus-Too...mer.py
windows7-x64
3Xvirus-Too...mer.py
windows10-2004-x64
3Xvirus-Too...ger.py
windows7-x64
3Xvirus-Too...ger.py
windows10-2004-x64
3Xvirus-Too...ort.py
windows7-x64
3Xvirus-Too...ort.py
windows10-2004-x64
3Xvirus-Too...mer.py
windows7-x64
3Xvirus-Too...mer.py
windows10-2004-x64
3Xvirus-Too...ger.py
windows7-x64
3Xvirus-Too...ger.py
windows10-2004-x64
3Xvirus-Too...ker.py
windows7-x64
3Xvirus-Too...ker.py
windows10-2004-x64
3Xvirus-Too...ker.py
windows7-x64
3Xvirus-Too...ker.py
windows10-2004-x64
3Xvirus-Too...ner.py
windows7-x64
3Xvirus-Too...ner.py
windows10-2004-x64
3Xvirus-Too...ver.py
windows7-x64
3Xvirus-Too...ver.py
windows10-2004-x64
3Xvirus-Too...ger.py
windows7-x64
3Xvirus-Too...ger.py
windows10-2004-x64
3Xvirus-Too...ver.py
windows7-x64
3Xvirus-Too...ver.py
windows10-2004-x64
3Analysis
-
max time kernel
139s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/02/2024, 11:12 UTC
Static task
static1
Behavioral task
behavioral1
Sample
Xvirus-Tools-1.7.1/Xvirus.py
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Xvirus-Tools-1.7.1/Xvirus.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
Xvirus-Tools-1.7.1/setup.bat
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Xvirus-Tools-1.7.1/setup.bat
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
Xvirus-Tools-1.7.1/start.bat
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Xvirus-Tools-1.7.1/start.bat
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
Xvirus-Tools-1.7.1/util/__init__.py
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Xvirus-Tools-1.7.1/util/__init__.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
Xvirus-Tools-1.7.1/util/options/bypass_rules.py
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Xvirus-Tools-1.7.1/util/options/bypass_rules.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
Xvirus-Tools-1.7.1/util/options/channel_spammer.py
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
Xvirus-Tools-1.7.1/util/options/channel_spammer.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral13
Sample
Xvirus-Tools-1.7.1/util/options/hypesquad_changer.py
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Xvirus-Tools-1.7.1/util/options/hypesquad_changer.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral15
Sample
Xvirus-Tools-1.7.1/util/options/mass_report.py
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Xvirus-Tools-1.7.1/util/options/mass_report.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral17
Sample
Xvirus-Tools-1.7.1/util/options/soundboard_spammer.py
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Xvirus-Tools-1.7.1/util/options/soundboard_spammer.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral19
Sample
Xvirus-Tools-1.7.1/util/options/token_bio_changer.py
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Xvirus-Tools-1.7.1/util/options/token_bio_changer.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral21
Sample
Xvirus-Tools-1.7.1/util/options/token_checker.py
Resource
win7-20240215-en
Behavioral task
behavioral22
Sample
Xvirus-Tools-1.7.1/util/options/token_checker.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral23
Sample
Xvirus-Tools-1.7.1/util/options/token_global_nicker.py
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Xvirus-Tools-1.7.1/util/options/token_global_nicker.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral25
Sample
Xvirus-Tools-1.7.1/util/options/token_joiner.py
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
Xvirus-Tools-1.7.1/util/options/token_joiner.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral27
Sample
Xvirus-Tools-1.7.1/util/options/token_leaver.py
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
Xvirus-Tools-1.7.1/util/options/token_leaver.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral29
Sample
Xvirus-Tools-1.7.1/util/options/token_pron_changer.py
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
Xvirus-Tools-1.7.1/util/options/token_pron_changer.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral31
Sample
Xvirus-Tools-1.7.1/util/options/token_saver.py
Resource
win7-20240220-en
Behavioral task
behavioral32
Sample
Xvirus-Tools-1.7.1/util/options/token_saver.py
Resource
win10v2004-20240221-en
General
-
Target
Xvirus-Tools-1.7.1/util/options/soundboard_spammer.py
-
Size
1KB
-
MD5
aeed67f5c6d83f7c9a262e5a60751d20
-
SHA1
77405701061c7a1208fd38dd313e198df46829c4
-
SHA256
a6cc0b409a54ac21d0662b156c029694b4fdbced30db2307ba83443502ae2f0d
-
SHA512
d770142aedbadf384462eadb3cb40e2155d30345a668da2673df9c20127c85d6c3cc905f9c2a1e42e15f21f7c6070aa6997c5a87bbb90158f2b1a8c2769f2212
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3500 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Xvirus-Tools-1.7.1\util\options\soundboard_spammer.py1⤵
- Modifies registry class
PID:4496
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3500
Network
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTRResponse41.110.16.96.in-addr.arpaIN PTRa96-16-110-41deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.a-0001.a-msedge.netg-bing-com.a-0001.a-msedge.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=4a25c7d10d6245d9bc294d79f5bb68d5&localId=w:E314FD8B-EFD3-6710-D2FD-4A5236C803A9&deviceId=6966557285300211&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=4a25c7d10d6245d9bc294d79f5bb68d5&localId=w:E314FD8B-EFD3-6710-D2FD-4A5236C803A9&deviceId=6966557285300211&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=1080B9E52EDB64CD35AAADC82F3B6517; domain=.bing.com; expires=Tue, 18-Mar-2025 11:12:39 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 82BD6AE0D7E14F7FB66515F7C47F1CE3 Ref B: LON04EDGE1112 Ref C: 2024-02-22T11:12:39Z
date: Thu, 22 Feb 2024 11:12:38 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=4a25c7d10d6245d9bc294d79f5bb68d5&localId=w:E314FD8B-EFD3-6710-D2FD-4A5236C803A9&deviceId=6966557285300211&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=4a25c7d10d6245d9bc294d79f5bb68d5&localId=w:E314FD8B-EFD3-6710-D2FD-4A5236C803A9&deviceId=6966557285300211&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=1080B9E52EDB64CD35AAADC82F3B6517
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MSPTC=f2OJOtQvokunpJGGmeQv_jYvx1XgOjlIZbyOi1cCKtc; domain=.bing.com; expires=Tue, 18-Mar-2025 11:12:39 GMT; path=/; Partitioned; secure; SameSite=None
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 82F16186E61846ED8E06F3876D6933FE Ref B: LON04EDGE1112 Ref C: 2024-02-22T11:12:39Z
date: Thu, 22 Feb 2024 11:12:38 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=4a25c7d10d6245d9bc294d79f5bb68d5&localId=w:E314FD8B-EFD3-6710-D2FD-4A5236C803A9&deviceId=6966557285300211&anid=Remote address:204.79.197.200:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=4a25c7d10d6245d9bc294d79f5bb68d5&localId=w:E314FD8B-EFD3-6710-D2FD-4A5236C803A9&deviceId=6966557285300211&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=1080B9E52EDB64CD35AAADC82F3B6517; MSPTC=f2OJOtQvokunpJGGmeQv_jYvx1XgOjlIZbyOi1cCKtc
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 608F50FFE3BB42B1822F40D054C6845A Ref B: LON04EDGE1112 Ref C: 2024-02-22T11:12:39Z
date: Thu, 22 Feb 2024 11:12:39 GMT
-
Remote address:8.8.8.8:53Request194.178.17.96.in-addr.arpaIN PTRResponse194.178.17.96.in-addr.arpaIN PTRa96-17-178-194deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request22.177.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request200.197.79.204.in-addr.arpaIN PTRResponse200.197.79.204.in-addr.arpaIN PTRa-0001a-msedgenet
-
Remote address:8.8.8.8:53Request9.228.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.165.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request56.126.166.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.134.221.88.in-addr.arpaIN PTRResponse18.134.221.88.in-addr.arpaIN PTRa88-221-134-18deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request173.178.17.96.in-addr.arpaIN PTRResponse173.178.17.96.in-addr.arpaIN PTRa96-17-178-173deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request43.229.111.52.in-addr.arpaIN PTRResponse
-
204.79.197.200:443https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=4a25c7d10d6245d9bc294d79f5bb68d5&localId=w:E314FD8B-EFD3-6710-D2FD-4A5236C803A9&deviceId=6966557285300211&anid=tls, http22.0kB 9.2kB 21 18
HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=4a25c7d10d6245d9bc294d79f5bb68d5&localId=w:E314FD8B-EFD3-6710-D2FD-4A5236C803A9&deviceId=6966557285300211&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=4a25c7d10d6245d9bc294d79f5bb68d5&localId=w:E314FD8B-EFD3-6710-D2FD-4A5236C803A9&deviceId=6966557285300211&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=4a25c7d10d6245d9bc294d79f5bb68d5&localId=w:E314FD8B-EFD3-6710-D2FD-4A5236C803A9&deviceId=6966557285300211&anid=HTTP Response
204
-
71 B 135 B 1 1
DNS Request
41.110.16.96.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
56 B 158 B 1 1
DNS Request
g.bing.com
DNS Response
204.79.197.20013.107.21.200
-
72 B 158 B 1 1
DNS Request
22.177.190.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
194.178.17.96.in-addr.arpa
-
73 B 106 B 1 1
DNS Request
200.197.79.204.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
9.228.82.20.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
26.165.165.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
56.126.166.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
18.134.221.88.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
173.178.17.96.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
43.229.111.52.in-addr.arpa