Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10cdnmain/Exela.exe
windows10-ltsc 2021-x64
10cdnmain/Exela.exe
windows11-21h2-x64
10Stub.pyc
windows10-ltsc 2021-x64
3Stub.pyc
windows11-21h2-x64
3cdnmain/chrome.exe
windows10-ltsc 2021-x64
10cdnmain/chrome.exe
windows11-21h2-x64
10cdnmain/cl...st.exe
windows10-ltsc 2021-x64
1cdnmain/cl...st.exe
windows11-21h2-x64
1cdnmain/ef.exe
windows10-ltsc 2021-x64
10cdnmain/ef.exe
windows11-21h2-x64
10cdnmain/libsodium.dll
windows10-ltsc 2021-x64
1cdnmain/libsodium.dll
windows11-21h2-x64
1cdnmain/sqlite3.dll
windows10-ltsc 2021-x64
1cdnmain/sqlite3.dll
windows11-21h2-x64
1cdnmain/vc...40.dll
windows10-ltsc 2021-x64
1cdnmain/vc...40.dll
windows11-21h2-x64
1cdnmain/verif.exe
windows10-ltsc 2021-x64
1cdnmain/verif.exe
windows11-21h2-x64
1Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
10/03/2025, 16:59
Behavioral task
behavioral1
Sample
cdnmain/Exela.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral2
Sample
cdnmain/Exela.exe
Resource
win11-20250217-en
Behavioral task
behavioral3
Sample
Stub.pyc
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral4
Sample
Stub.pyc
Resource
win11-20250217-en
Behavioral task
behavioral5
Sample
cdnmain/chrome.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral6
Sample
cdnmain/chrome.exe
Resource
win11-20250217-en
Behavioral task
behavioral7
Sample
cdnmain/cloudflare_whitelist.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral8
Sample
cdnmain/cloudflare_whitelist.exe
Resource
win11-20250217-en
Behavioral task
behavioral9
Sample
cdnmain/ef.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral10
Sample
cdnmain/ef.exe
Resource
win11-20250217-en
Behavioral task
behavioral11
Sample
cdnmain/libsodium.dll
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral12
Sample
cdnmain/libsodium.dll
Resource
win11-20250217-en
Behavioral task
behavioral13
Sample
cdnmain/sqlite3.dll
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral14
Sample
cdnmain/sqlite3.dll
Resource
win11-20250218-en
Behavioral task
behavioral15
Sample
cdnmain/vcruntime140.dll
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral16
Sample
cdnmain/vcruntime140.dll
Resource
win11-20250217-en
Behavioral task
behavioral17
Sample
cdnmain/verif.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral18
Sample
cdnmain/verif.exe
Resource
win11-20250217-en
General
-
Target
Stub.pyc
-
Size
799KB
-
MD5
5605a3e3ebb0727418f44354843c53b8
-
SHA1
991ab1a7950376f27d0e13be4156cdc921d128ea
-
SHA256
71be841e886152241dcd0752b6e72c4e5d177fe649889905cbd51547c0d9e0e2
-
SHA512
3c8b79529c86c74d398be7704282bdbd1f82b9f65b458f16ca9b02a964f830efe8772189c5b4f30c1a4c209a35522eed658af11b60e2857e45c663d3a64053f8
-
SSDEEP
24576:xdUK0BvxxQlxhqVCiLYzYtVGTCyw4Tr2sKT:EhlvQrViVATKT
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-80166876-2127584002-2233670790-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-80166876-2127584002-2233670790-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-80166876-2127584002-2233670790-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4444 OpenWith.exe -
Suspicious use of SetWindowsHookEx 33 IoCs
pid Process 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 4444 OpenWith.exe 1524 AcroRd32.exe 1524 AcroRd32.exe 1524 AcroRd32.exe 1524 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4444 wrote to memory of 1524 4444 OpenWith.exe 89 PID 4444 wrote to memory of 1524 4444 OpenWith.exe 89 PID 4444 wrote to memory of 1524 4444 OpenWith.exe 89 PID 1524 wrote to memory of 2636 1524 AcroRd32.exe 91 PID 1524 wrote to memory of 2636 1524 AcroRd32.exe 91 PID 1524 wrote to memory of 2636 1524 AcroRd32.exe 91 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 1280 2636 RdrCEF.exe 92 PID 2636 wrote to memory of 4000 2636 RdrCEF.exe 93 PID 2636 wrote to memory of 4000 2636 RdrCEF.exe 93 PID 2636 wrote to memory of 4000 2636 RdrCEF.exe 93 PID 2636 wrote to memory of 4000 2636 RdrCEF.exe 93 PID 2636 wrote to memory of 4000 2636 RdrCEF.exe 93 PID 2636 wrote to memory of 4000 2636 RdrCEF.exe 93 PID 2636 wrote to memory of 4000 2636 RdrCEF.exe 93 PID 2636 wrote to memory of 4000 2636 RdrCEF.exe 93 PID 2636 wrote to memory of 4000 2636 RdrCEF.exe 93 PID 2636 wrote to memory of 4000 2636 RdrCEF.exe 93 PID 2636 wrote to memory of 4000 2636 RdrCEF.exe 93 PID 2636 wrote to memory of 4000 2636 RdrCEF.exe 93 PID 2636 wrote to memory of 4000 2636 RdrCEF.exe 93 PID 2636 wrote to memory of 4000 2636 RdrCEF.exe 93 PID 2636 wrote to memory of 4000 2636 RdrCEF.exe 93 PID 2636 wrote to memory of 4000 2636 RdrCEF.exe 93 PID 2636 wrote to memory of 4000 2636 RdrCEF.exe 93
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Stub.pyc1⤵
- Modifies registry class
PID:4972
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Stub.pyc"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F57D513F3E119CA058FE7FD726FA0C21 --mojo-platform-channel-handle=1764 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:1280
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=AD6545AD96C4EF084A5467026CAA2E2C --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=AD6545AD96C4EF084A5467026CAA2E2C --renderer-client-id=2 --mojo-platform-channel-handle=1768 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:4000
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8263C07556CB61836826B1133745AD95 --mojo-platform-channel-handle=2332 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:2732
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A31CC36433293F6DCF2CB18812CAF286 --mojo-platform-channel-handle=2124 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:548
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3542B1EC9D6BE7CB50665A3F9D744E68 --mojo-platform-channel-handle=2408 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:2916
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2776