Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15/02/2025, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe
Resource
win10v2004-20250211-en
General
-
Target
95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe
-
Size
3.8MB
-
MD5
3db1c66a1e51f7c1e258b1c12205a435
-
SHA1
98e24a9ea6e7c38a95543c89a037c7f3f7b1591c
-
SHA256
95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2
-
SHA512
7bec8f484f8f047d84d6f703853a56cbffa061ab22813e9449fa78382a88d9f42a27eb1f999e1e7ab30597afb49e2ff5c23f65654c4584fc75d1c2835607a407
-
SSDEEP
98304:ZsFwe8EuILKpQN0d7aePKtGBz/smtrm+2f/VSnGIm+LR4ZzK:FEoO01aFGBz/sYK+2fIGImy
Malware Config
Extracted
cryptbot
http://home.elvnjj1sr.top/pekvtmslVrBVfMWtJqVA17
Signatures
-
Cryptbot family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF VC_redist.x86.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 5004 powershell.exe 3992 powershell.exe -
Executes dropped EXE 4 IoCs
pid Process 2860 VC_redist.x64.exe 2220 VC_redist.x86.exe 2416 Token.exe 3352 dotNetFx45_Full_setup.exe -
Loads dropped DLL 10 IoCs
pid Process 2904 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe 2904 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe 2904 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe 2904 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe 2904 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe 2424 taskeng.exe 2904 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe 2904 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe 2904 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe 2904 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral1/files/0x0008000000018b05-2813.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VC_redist.x86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dotNetFx45_Full_setup.exe -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 5004 powershell.exe 2220 VC_redist.x86.exe 2220 VC_redist.x86.exe 2220 VC_redist.x86.exe 2220 VC_redist.x86.exe 2220 VC_redist.x86.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 2416 Token.exe 3992 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2860 VC_redist.x64.exe Token: SeDebugPrivilege 5004 powershell.exe Token: SeDebugPrivilege 2416 Token.exe Token: SeDebugPrivilege 3352 dotNetFx45_Full_setup.exe Token: SeDebugPrivilege 3992 powershell.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2860 2904 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe 30 PID 2904 wrote to memory of 2860 2904 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe 30 PID 2904 wrote to memory of 2860 2904 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe 30 PID 2904 wrote to memory of 2860 2904 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe 30 PID 4960 wrote to memory of 5004 4960 taskeng.exe 34 PID 4960 wrote to memory of 5004 4960 taskeng.exe 34 PID 4960 wrote to memory of 5004 4960 taskeng.exe 34 PID 2904 wrote to memory of 2220 2904 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe 36 PID 2904 wrote to memory of 2220 2904 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe 36 PID 2904 wrote to memory of 2220 2904 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe 36 PID 2904 wrote to memory of 2220 2904 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe 36 PID 2424 wrote to memory of 2416 2424 taskeng.exe 38 PID 2424 wrote to memory of 2416 2424 taskeng.exe 38 PID 2424 wrote to memory of 2416 2424 taskeng.exe 38 PID 2416 wrote to memory of 3528 2416 Token.exe 39 PID 2416 wrote to memory of 3528 2416 Token.exe 39 PID 2416 wrote to memory of 3528 2416 Token.exe 39 PID 2416 wrote to memory of 1688 2416 Token.exe 40 PID 2416 wrote to memory of 1688 2416 Token.exe 40 PID 2416 wrote to memory of 1688 2416 Token.exe 40 PID 2416 wrote to memory of 588 2416 Token.exe 41 PID 2416 wrote to memory of 588 2416 Token.exe 41 PID 2416 wrote to memory of 588 2416 Token.exe 41 PID 2416 wrote to memory of 3276 2416 Token.exe 42 PID 2416 wrote to memory of 3276 2416 Token.exe 42 PID 2416 wrote to memory of 3276 2416 Token.exe 42 PID 2416 wrote to memory of 4652 2416 Token.exe 43 PID 2416 wrote to memory of 4652 2416 Token.exe 43 PID 2416 wrote to memory of 4652 2416 Token.exe 43 PID 2416 wrote to memory of 3900 2416 Token.exe 44 PID 2416 wrote to memory of 3900 2416 Token.exe 44 PID 2416 wrote to memory of 3900 2416 Token.exe 44 PID 2416 wrote to memory of 3596 2416 Token.exe 45 PID 2416 wrote to memory of 3596 2416 Token.exe 45 PID 2416 wrote to memory of 3596 2416 Token.exe 45 PID 2416 wrote to memory of 2384 2416 Token.exe 46 PID 2416 wrote to memory of 2384 2416 Token.exe 46 PID 2416 wrote to memory of 2384 2416 Token.exe 46 PID 2416 wrote to memory of 2348 2416 Token.exe 47 PID 2416 wrote to memory of 2348 2416 Token.exe 47 PID 2416 wrote to memory of 2348 2416 Token.exe 47 PID 2416 wrote to memory of 4680 2416 Token.exe 48 PID 2416 wrote to memory of 4680 2416 Token.exe 48 PID 2416 wrote to memory of 4680 2416 Token.exe 48 PID 2904 wrote to memory of 3352 2904 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe 49 PID 2904 wrote to memory of 3352 2904 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe 49 PID 2904 wrote to memory of 3352 2904 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe 49 PID 2904 wrote to memory of 3352 2904 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe 49 PID 2904 wrote to memory of 3352 2904 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe 49 PID 2904 wrote to memory of 3352 2904 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe 49 PID 2904 wrote to memory of 3352 2904 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe 49 PID 4960 wrote to memory of 3992 4960 taskeng.exe 51 PID 4960 wrote to memory of 3992 4960 taskeng.exe 51 PID 4960 wrote to memory of 3992 4960 taskeng.exe 51 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe"C:\Users\Admin\AppData\Local\Temp\95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x64.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x64.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exe"2⤵
- Enumerates VirtualBox registry keys
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\dotNetFx45_Full_setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\dotNetFx45_Full_setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3352
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {CA6043E6-500B-4DAD-8586-CE0128B43AFC} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:S4U:1⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5004
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAASQBkAC4AZQB4AGUAOwA=2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3992
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {BE33A36F-BF9E-4940-A2CC-AB69437B381B} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Roaming\IsSpecialName\Token.exeC:\Users\Admin\AppData\Roaming\IsSpecialName\Token.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe3⤵PID:3528
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe3⤵PID:1688
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe3⤵PID:588
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe3⤵PID:3276
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe3⤵PID:4652
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe3⤵PID:3900
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe3⤵PID:3596
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe3⤵PID:2384
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe3⤵PID:2348
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe3⤵PID:4680
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD57e7434bed2fab70fd12a994601ffdf28
SHA102ba50de9e6e56f75baed3f24bffd972851df971
SHA2563591ccaa87aae93391574b9ff12e66764810900ede2089090967fc0aedd960c4
SHA51200258f31d089a0f70dc410807f2a9e8ec112a13be8c63da570b9f4a3cf2828464db0eeca13e9aa8882cb5ea9f33c4202576ebbf0116eb26fc8282878e9390574
-
Filesize
653KB
MD54f6e118ff053bda4f358922e704e6e2d
SHA1b09ee9ecb9b16910e7d5b0b151095655eac86666
SHA256c4d8a65844301bbe75699e5de0d2a576f1fa07e0cf259810bdc68b045cb14225
SHA512a78fb7027e39f29cb768cd0f6ed11ab4e56179b04b782f0f293fe0743fc88e418da8ea9698d78ff462cb650694fc4a14003537f4decb0db6313061a1afa25b4c
-
Filesize
8.2MB
MD595a8e03433879dc9bbe059a6f8ba3f5c
SHA19b15abecbc64573f9709847e22c2006a2bfec327
SHA256c09055cde3e0d6c5ebad2cf79f3e735c3ce5f5ded864130098fe2c4165b99fa1
SHA5123d1d9c0e77085258bfb834ca5d65e6aaad3a3a3a426cda50f2a6b99ad03c65b83f25a853a3a8c900aa01fe17e0a741b73bf20364006d1a16a5c21356095c49c5
-
Filesize
544KB
MD51336375cf1aaa4efdad95d0b64ea1aac
SHA19be80a505aa2dfcc4db73c8e5264ed5867533e66
SHA25604d68438f75065f5c2997e80a317b1c6fad78d723af585a64d39138861055ec6
SHA51212d91fefeb431b60b2501f7868e25dfa04eb42f94bd630b21fef4f3cd6ae5962b6764215da77824e06c53ae8d5d446b322936406396aaa178c71edf24b765f48