Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
17/04/2024, 12:19
240417-pg5r4afh91 1017/04/2024, 12:18
240417-pg46kaee23 1017/04/2024, 12:18
240417-pg4j2afh9x 1017/04/2024, 12:18
240417-pg3yhaee22 1017/04/2024, 12:18
240417-pg1s5sfh9t 1016/04/2024, 14:07
240416-re2nrsde5s 10Analysis
-
max time kernel
330s -
max time network
250s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 12:18
Static task
static1
Behavioral task
behavioral1
Sample
ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe
Resource
win11-20240412-en
General
-
Target
ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe
-
Size
1.3MB
-
MD5
40755985ba0182b59a34909770557b77
-
SHA1
68752dead25052420fd8e5b94c867233accad1f4
-
SHA256
ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a
-
SHA512
788ec7a6c08ac4fb23e1489489152048c9663a3bcdebe767e3db304b5955f430c6bd06a16550b8c9c6bd5229a7cf2c5d1ca1ce6e40e1cbc0f2104d2630f7c507
-
SSDEEP
12288:hD0Yxtmgcj3DKjs16MKYIjhy+AC5j6vfNqi:hQYxtmiEEYIjhyQj6vfNqi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 648 GetX64BTIT.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 48 api.ipify.org 47 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2800 wrote to memory of 648 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 93 PID 2800 wrote to memory of 648 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 93 PID 2800 wrote to memory of 892 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 73 PID 2800 wrote to memory of 2916 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 74 PID 2800 wrote to memory of 5056 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 75 PID 2800 wrote to memory of 2256 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 76 PID 2800 wrote to memory of 4824 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 77 PID 2800 wrote to memory of 5048 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 78 PID 2800 wrote to memory of 4520 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 79 PID 892 wrote to memory of 116 892 msedge.exe 101 PID 892 wrote to memory of 116 892 msedge.exe 101 PID 2800 wrote to memory of 116 2800 ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe 101
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=123.0.6312.106 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=123.0.2420.81 --initial-client-data=0x238,0x23c,0x240,0x234,0x248,0x7ffd9f944e48,0x7ffd9f944e54,0x7ffd9f944e602⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2224,i,14910875736531803530,4367035887674785793,262144 --variations-seed-version --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1956,i,14910875736531803530,4367035887674785793,262144 --variations-seed-version --mojo-platform-channel-handle=2372 /prefetch:32⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2512,i,14910875736531803530,4367035887674785793,262144 --variations-seed-version --mojo-platform-channel-handle=2532 /prefetch:82⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --field-trial-handle=5408,i,14910875736531803530,4367035887674785793,262144 --variations-seed-version --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=5584,i,14910875736531803530,4367035887674785793,262144 --variations-seed-version --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3208,i,14910875736531803530,4367035887674785793,262144 --variations-seed-version --mojo-platform-channel-handle=4044 /prefetch:32⤵PID:116
-
-
C:\Users\Admin\AppData\Local\Temp\ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe"C:\Users\Admin\AppData\Local\Temp\ed614783ecd08afb919ae4b42625beaa6c9ed4207fa4f9c925c32a16d543ee3a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"2⤵
- Executes dropped EXE
PID:648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD5820cc4a565cf4b5320e34c5c98b7ef66
SHA1f90b747213152cd0fb7d69449e54a143a0285742
SHA2567f3498d1d40dc8aab1d010f2736c0a6254c430f9f2f2b46ca31ca42418c5c331
SHA51270af3bcf87468fa86532e99958e76f4b0cf00d25c090c47b0cdeae71646a3dccda5cd44ce9ea400c86f4016edd2e252f8014cea816e1668b53e76902d789919b
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
Filesize
28B
MD506769236f5c5de6a2e17abfc58b3b629
SHA10c77f9a1561cd694b55aaee66a613408b7414c23
SHA2565a4c4bf8b7e18db23c7493f8a5b03f3f96183022540af6f676be0a347dd297fb
SHA5122185739327c500e5f17698d238f570593d54a2d4e32707c0de5782c56f0b8f404c7792ae21246c35a45143e46f4d49207ca631e2a131a2759045a70244e1dd76