Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

07/02/2025, 22:09

250207-12y1ts1qem 10

17/01/2025, 14:58

250117-scb6rstjhj 10

04/01/2025, 01:09

250104-bhsx2avqhp 10

Analysis

  • max time kernel
    92s
  • max time network
    96s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250207-en
  • resource tags

    arch:x64arch:x86image:win11-20250207-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    07/02/2025, 22:09

General

  • Target

    32de704ba040689746da0da9c8117b0529c5ebec617be63b401ade9c17d9fa07

  • Size

    19.7MB

  • MD5

    ce82eb90ba675fafe474625727787b07

  • SHA1

    2417c11c54c5cfc9cab83e24613bd2934bfc0142

  • SHA256

    32de704ba040689746da0da9c8117b0529c5ebec617be63b401ade9c17d9fa07

  • SHA512

    e600f011872ca9b45dff2fcc14400b099a23c5e490060ab5a95715ce56d0c03dcda3fe41458e0c77dd8838f360ea1f1811d089309aabd173a4c55bbbf3619af0

  • SSDEEP

    196608:oBVcSNYEv4IGO3ogwCPfAtUD0WhxBCdMNSJ1tfSjYHSww:qt

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 60 IoCs
  • Suspicious use of SendNotifyMessage 60 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\32de704ba040689746da0da9c8117b0529c5ebec617be63b401ade9c17d9fa07
    1⤵
      PID:5064
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
      1⤵
        PID:3280
      • C:\Windows\System32\oobe\UserOOBEBroker.exe
        C:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding
        1⤵
        • Drops file in Windows directory
        PID:2576
      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
        C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding
        1⤵
        • System Location Discovery: System Language Discovery
        PID:3548
      • C:\Windows\system32\BackgroundTransferHost.exe
        "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
        1⤵
        • Modifies registry class
        PID:1272
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /0
        1⤵
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3504
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler
        1⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:748

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\3e51fdc7-c7cf-47bf-9294-18d5f796d9ea.down_data

        Filesize

        555KB

        MD5

        5683c0028832cae4ef93ca39c8ac5029

        SHA1

        248755e4e1db552e0b6f8651b04ca6d1b31a86fb

        SHA256

        855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e

        SHA512

        aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3

      • memory/3504-11-0x0000029F58680000-0x0000029F58681000-memory.dmp

        Filesize

        4KB

      • memory/3504-10-0x0000029F58680000-0x0000029F58681000-memory.dmp

        Filesize

        4KB

      • memory/3504-9-0x0000029F58680000-0x0000029F58681000-memory.dmp

        Filesize

        4KB

      • memory/3504-15-0x0000029F58680000-0x0000029F58681000-memory.dmp

        Filesize

        4KB

      • memory/3504-21-0x0000029F58680000-0x0000029F58681000-memory.dmp

        Filesize

        4KB

      • memory/3504-20-0x0000029F58680000-0x0000029F58681000-memory.dmp

        Filesize

        4KB

      • memory/3504-19-0x0000029F58680000-0x0000029F58681000-memory.dmp

        Filesize

        4KB

      • memory/3504-18-0x0000029F58680000-0x0000029F58681000-memory.dmp

        Filesize

        4KB

      • memory/3504-17-0x0000029F58680000-0x0000029F58681000-memory.dmp

        Filesize

        4KB

      • memory/3504-16-0x0000029F58680000-0x0000029F58681000-memory.dmp

        Filesize

        4KB