Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
18/04/2024, 08:52
240418-ksvn2sge34 1018/04/2024, 08:51
240418-ksn69sge27 1018/04/2024, 08:51
240418-ksnkqshg71 1018/04/2024, 08:51
240418-ksmy7sge25 1018/04/2024, 08:51
240418-ksmcnsge24 10Analysis
-
max time kernel
601s -
max time network
604s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe
Resource
win10-20240319-en
Behavioral task
behavioral4
Sample
577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe
Resource
win11-20240412-en
General
-
Target
577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe
-
Size
566KB
-
MD5
1082785e3304ebb4bdd4add5623fb35e
-
SHA1
b9c461bae25cc7ce131350d9a5a0b433b5daed27
-
SHA256
577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764
-
SHA512
16436efc6aa97769f3e4290387172a902e08af3eb98272517ff73de4938533af0352a4d1dc034ec43ab7291c0beca968b08023fb2b6d927d496644d6282ee01d
-
SSDEEP
12288:Bz4ubZCXMtdUKat+YH7/yJ2je3rojGvB/WaEYvWj:pjOMtd1a/yl3KOje
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 756 GetX64BTIT.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe" 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 41 api.ipify.org 42 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4860 wrote to memory of 756 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 91 PID 4860 wrote to memory of 756 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 91 PID 4860 wrote to memory of 4236 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 78 PID 4860 wrote to memory of 4132 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 79 PID 4860 wrote to memory of 3192 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 80 PID 4860 wrote to memory of 5096 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 81 PID 4860 wrote to memory of 2060 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 82 PID 4860 wrote to memory of 3364 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 84 PID 4860 wrote to memory of 3676 4860 577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe 85 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100 PID 4236 wrote to memory of 688 4236 msedge.exe 100
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.52 --initial-client-data=0x238,0x23c,0x240,0x234,0x2c0,0x7ffc86262e98,0x7ffc86262ea4,0x7ffc86262eb02⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2672 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:22⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2864 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:32⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=2872 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:82⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --mojo-platform-channel-handle=5364 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:12⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --mojo-platform-channel-handle=5500 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:12⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:82⤵PID:688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2860 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:32⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4228 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:82⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2860 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:32⤵PID:220
-
-
C:\Users\Admin\AppData\Local\Temp\577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe"C:\Users\Admin\AppData\Local\Temp\577357bf7d715950aa9401b25029926f052c742ffd558ddc44853629245eb764.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"2⤵
- Executes dropped EXE
PID:756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
36KB
MD51a8b3baa6188d76c73af136c976af707
SHA17301131238b5c5d8c286fa58c1f561ca944f0868
SHA256f2eaa0f21fcdae5938a19dea6b46a1e80016d870dc892f5e207ea6cd1ecb612f
SHA51293072ece561b348e28e7e6dfe02871384c077787d99b3ff1e980bb2f462369beefeef584e66e2232bb60f626b56116dbdedfe8fc98072aeed9054d784cd1de41
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
Filesize
28B
MD53524b63bd11b4aa71db3ff4e24c0a029
SHA144312936acfaf9a88867c1cdac71cd53557e2608
SHA256e29d513cb339693c9542dde9e039d59673f469fe5446a0bca1033f7b194e10ca
SHA5127eeca0c27da1acc27a265fc19cc0940842c8c3ca2f7e42aa8d6a43c71cc0149361cefaf5306c9d1ff5b5dc276ea23228a838fcf02df2302897d93a55360fc3ed