Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3quarantine...a5.exe
windows7-x64
10quarantine...a5.exe
windows10-2004-x64
10quarantine...Uv.exe
windows7-x64
8quarantine...Uv.exe
windows10-2004-x64
8quarantine...cc.exe
windows7-x64
10quarantine...cc.exe
windows10-2004-x64
10quarantine...Ja.exe
windows7-x64
10quarantine...Ja.exe
windows10-2004-x64
10quarantine...8e.exe
windows7-x64
3quarantine...8e.exe
windows10-2004-x64
3quarantine...zx.exe
windows7-x64
7quarantine...zx.exe
windows10-2004-x64
7quarantine...FJ.exe
windows7-x64
9quarantine...FJ.exe
windows10-2004-x64
9quarantine...on.exe
windows7-x64
10quarantine...on.exe
windows10-2004-x64
10quarantine/random.exe
windows7-x64
quarantine/random.exe
windows10-2004-x64
3quarantine..._2.exe
windows7-x64
10quarantine..._2.exe
windows10-2004-x64
10quarantine..._3.exe
windows7-x64
10quarantine..._3.exe
windows10-2004-x64
10quarantine..._4.exe
windows7-x64
10quarantine..._4.exe
windows10-2004-x64
10quarantine..._5.exe
windows7-x64
10quarantine..._5.exe
windows10-2004-x64
10quarantine...me.exe
windows7-x64
10quarantine...me.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
17/02/2025, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
quarantine/30adb2328b17bd15cdeb5059c621bd6e9bf0b7e03dd2cdfbadfc837737d424a5.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
quarantine/30adb2328b17bd15cdeb5059c621bd6e9bf0b7e03dd2cdfbadfc837737d424a5.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
quarantine/FKza3Uv.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
quarantine/FKza3Uv.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
quarantine/af8fa1c9ee24035cb342fee0773983a2aa4af97b630ccc6b38aef13b0f8602cc.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
quarantine/af8fa1c9ee24035cb342fee0773983a2aa4af97b630ccc6b38aef13b0f8602cc.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
quarantine/d2YQIJa.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
quarantine/d2YQIJa.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
quarantine/f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
quarantine/f2b4b0d3be4e4be0527e1a2a4255df1ce093829e31212afdbd34f0dadc6b398e.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
quarantine/jROrnzx.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
quarantine/jROrnzx.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
quarantine/kgI01FJ.exe
Resource
win7-20250207-en
Behavioral task
behavioral14
Sample
quarantine/kgI01FJ.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
quarantine/monthdragon.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
quarantine/monthdragon.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
quarantine/random.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
quarantine/random.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
quarantine/random_2.exe
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
quarantine/random_2.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
quarantine/random_3.exe
Resource
win7-20250207-en
Behavioral task
behavioral22
Sample
quarantine/random_3.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
quarantine/random_4.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
quarantine/random_4.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
quarantine/random_5.exe
Resource
win7-20241023-en
Behavioral task
behavioral26
Sample
quarantine/random_5.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
quarantine/sHN20me.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
quarantine/sHN20me.exe
Resource
win10v2004-20250217-en
General
-
Target
quarantine/af8fa1c9ee24035cb342fee0773983a2aa4af97b630ccc6b38aef13b0f8602cc.exe
-
Size
3.6MB
-
MD5
4d00204c805a047237431defbb66eac2
-
SHA1
0348a3e6aa4c353aedbfb32280c24113edb142e0
-
SHA256
af8fa1c9ee24035cb342fee0773983a2aa4af97b630ccc6b38aef13b0f8602cc
-
SHA512
bb1471e1b1d1da7d1f57b9028184f68e266ebe9923e5f56015fdfc9bee29b5ac66cfeeb4667b023f656a7569df2291af243376e8567293bb2be4d8a10608739e
-
SSDEEP
98304:3c16jhPDcUCQcIMq2DMm0kXp6DzAqiVrfzhcn:AUhbcRHMmlSzAqiVtcn
Malware Config
Signatures
-
Detect Socks5Systemz Payload 1 IoCs
resource yara_rule behavioral6/memory/3864-74-0x0000000000930000-0x00000000009D0000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Socks5systemz family
-
Executes dropped EXE 2 IoCs
pid Process 1436 af8fa1c9ee24035cb342fee0773983a2aa4af97b630ccc6b38aef13b0f8602cc.tmp 3864 crystalbenchmarks214.exe -
Loads dropped DLL 2 IoCs
pid Process 1436 af8fa1c9ee24035cb342fee0773983a2aa4af97b630ccc6b38aef13b0f8602cc.tmp 3864 crystalbenchmarks214.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crystalbenchmarks214.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language af8fa1c9ee24035cb342fee0773983a2aa4af97b630ccc6b38aef13b0f8602cc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language af8fa1c9ee24035cb342fee0773983a2aa4af97b630ccc6b38aef13b0f8602cc.tmp -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1436 af8fa1c9ee24035cb342fee0773983a2aa4af97b630ccc6b38aef13b0f8602cc.tmp 1436 af8fa1c9ee24035cb342fee0773983a2aa4af97b630ccc6b38aef13b0f8602cc.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1436 af8fa1c9ee24035cb342fee0773983a2aa4af97b630ccc6b38aef13b0f8602cc.tmp -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3324 wrote to memory of 1436 3324 af8fa1c9ee24035cb342fee0773983a2aa4af97b630ccc6b38aef13b0f8602cc.exe 80 PID 3324 wrote to memory of 1436 3324 af8fa1c9ee24035cb342fee0773983a2aa4af97b630ccc6b38aef13b0f8602cc.exe 80 PID 3324 wrote to memory of 1436 3324 af8fa1c9ee24035cb342fee0773983a2aa4af97b630ccc6b38aef13b0f8602cc.exe 80 PID 1436 wrote to memory of 3864 1436 af8fa1c9ee24035cb342fee0773983a2aa4af97b630ccc6b38aef13b0f8602cc.tmp 81 PID 1436 wrote to memory of 3864 1436 af8fa1c9ee24035cb342fee0773983a2aa4af97b630ccc6b38aef13b0f8602cc.tmp 81 PID 1436 wrote to memory of 3864 1436 af8fa1c9ee24035cb342fee0773983a2aa4af97b630ccc6b38aef13b0f8602cc.tmp 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\quarantine\af8fa1c9ee24035cb342fee0773983a2aa4af97b630ccc6b38aef13b0f8602cc.exe"C:\Users\Admin\AppData\Local\Temp\quarantine\af8fa1c9ee24035cb342fee0773983a2aa4af97b630ccc6b38aef13b0f8602cc.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\is-0LTVL.tmp\af8fa1c9ee24035cb342fee0773983a2aa4af97b630ccc6b38aef13b0f8602cc.tmp"C:\Users\Admin\AppData\Local\Temp\is-0LTVL.tmp\af8fa1c9ee24035cb342fee0773983a2aa4af97b630ccc6b38aef13b0f8602cc.tmp" /SL5="$B0280,3539577,56832,C:\Users\Admin\AppData\Local\Temp\quarantine\af8fa1c9ee24035cb342fee0773983a2aa4af97b630ccc6b38aef13b0f8602cc.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Crystal Bench Marks 2.1.4\crystalbenchmarks214.exe"C:\Users\Admin\AppData\Local\Crystal Bench Marks 2.1.4\crystalbenchmarks214.exe" -i3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3864
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD57913ad66f709e5e40f3c2c2a63c68852
SHA15cbbe8d26c0058c998e4d6fb0b3b1327a3bfd4ee
SHA2564ce286ea058d30786495578b2089d3ed2db10653fad2ff0c09352f49b004ed44
SHA512a726ff276fab58bc6b5fc0a52c13ab479b9ad3ab435e664a19f5abe186aa1e522495d69e60c9b786767899ff1d59484f793369eb09137b1342aa6f414d98e884
-
Filesize
630KB
MD5e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
C:\Users\Admin\AppData\Local\Temp\is-0LTVL.tmp\af8fa1c9ee24035cb342fee0773983a2aa4af97b630ccc6b38aef13b0f8602cc.tmp
Filesize694KB
MD5d3239f7e300381cb33da3c6effcec6fa
SHA1245d51c44b9f312254d6b24f37cc0f4e053c4bb4
SHA2568fa5c095628ebbf7a244a84e15a3a700c7aa9cdc87a66e5687ce24148a5da763
SHA5128a7525b21072c0e4e69fd94e446b7ef73928a41590b83b29fe94216ce9341947226f4142a6e320eb89f0513561f474f59d754069924f67ab139655ae17a589d8
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63