Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
16/02/2025, 11:18
Behavioral task
behavioral1
Sample
open-need-this-320.exe
Resource
win10ltsc2021-20250211-en
General
-
Target
open-need-this-320.exe
-
Size
8.3MB
-
MD5
2761863597a1e22c894a88265eb6fdbb
-
SHA1
3814875979acf7329d70957a208659528a4c83c6
-
SHA256
cd5fd68c44426d71df9bbd25c62b425932f9c2e1d5fe020e70ee1b73e3af5292
-
SHA512
2fccf5a720f70a9091ccd31fb1c1f5a5f7d52cf89d0e7fe79028f18c56285d4465cd674f85266dbdceb1ec561dadbc831a2da37fa9a0c3cf3bf7f677d3ebca4b
-
SSDEEP
98304:pn8Yxk5fQ4RtDc7lIwd9ISwOnSKXyz8Xa:9S5Y0tK6MnnS8G8Xa
Malware Config
Extracted
cryptbot
http://home.thrtjj13sr.top/eqlJMJRyIxwLXPguLiyp16
Signatures
-
Cryptbot family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF open-need-this-320.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 16 3456 Process not Found -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language open-need-this-320.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4084 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2028 open-need-this-320.exe 2028 open-need-this-320.exe 2028 open-need-this-320.exe 2028 open-need-this-320.exe 2028 open-need-this-320.exe 2028 open-need-this-320.exe 2028 open-need-this-320.exe 2028 open-need-this-320.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\open-need-this-320.exe"C:\Users\Admin\AppData\Local\Temp\open-need-this-320.exe"1⤵
- Enumerates VirtualBox registry keys
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2028
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4084