Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
100033f75804...e5.exe
windows7-x64
10033f75804...e5.exe
windows10-2004-x64
100ecd8a50b...ab.exe
windows7-x64
1000ecd8a50b...ab.exe
windows10-2004-x64
1007f66695f4...21.exe
windows7-x64
807f66695f4...21.exe
windows10-2004-x64
809e259cbe7...ee.exe
windows7-x64
1009e259cbe7...ee.exe
windows10-2004-x64
100c41a305e8...cd.exe
windows7-x64
80c41a305e8...cd.exe
windows10-2004-x64
80ca149e59a...32.exe
windows7-x64
70ca149e59a...32.exe
windows10-2004-x64
1010ebd229b7...09.exe
windows7-x64
710ebd229b7...09.exe
windows10-2004-x64
7170b3d1749...5a.exe
windows7-x64
8170b3d1749...5a.exe
windows10-2004-x64
81b812937c3...1a.exe
windows7-x64
101b812937c3...1a.exe
windows10-2004-x64
101c7facff8b...44.exe
windows7-x64
101c7facff8b...44.exe
windows10-2004-x64
101d5d209fb6...fc.exe
windows7-x64
71d5d209fb6...fc.exe
windows10-2004-x64
1020b9ae8a5a...ad.exe
windows7-x64
820b9ae8a5a...ad.exe
windows10-2004-x64
821aaf28e05...f4.exe
windows7-x64
1021aaf28e05...f4.exe
windows10-2004-x64
1022ea24b9b0...6c.exe
windows7-x64
322ea24b9b0...6c.exe
windows10-2004-x64
32646ec6c76...0a.exe
windows7-x64
102646ec6c76...0a.exe
windows10-2004-x64
82963197f54...71.exe
windows7-x64
102963197f54...71.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/03/2025, 07:56
Static task
static1
Behavioral task
behavioral1
Sample
0033f75804f1bdff0d0bd5153a6114c3757da40fa823dd18a5742373a905a3e5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0033f75804f1bdff0d0bd5153a6114c3757da40fa823dd18a5742373a905a3e5.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
00ecd8a50bb6f18b13df817d36962dd625cc98b05a90ef9f539c8506226790ab.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
00ecd8a50bb6f18b13df817d36962dd625cc98b05a90ef9f539c8506226790ab.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
07f66695f4dde786aabfdcb965764f4cc785308308a7d5b3d871373557b4e121.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
07f66695f4dde786aabfdcb965764f4cc785308308a7d5b3d871373557b4e121.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
09e259cbe7adb2947fdbf6b556ab82948a320042b2d4738988ac756d5539bfee.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
09e259cbe7adb2947fdbf6b556ab82948a320042b2d4738988ac756d5539bfee.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
0c41a305e80960e4c7c2c890fd707429091d3bb87d5726ed7c13373d626e85cd.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
0c41a305e80960e4c7c2c890fd707429091d3bb87d5726ed7c13373d626e85cd.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
0ca149e59a526c1811fcac3c14943acdbc43a3261af653670bc9e71436b1fc32.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
0ca149e59a526c1811fcac3c14943acdbc43a3261af653670bc9e71436b1fc32.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
1c7facff8b5db7f2186d2574b32b72d5f00467e85f56189d461cec22b9b3b144.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
1c7facff8b5db7f2186d2574b32b72d5f00467e85f56189d461cec22b9b3b144.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
1d5d209fb69f3a9b4cb8799fb7be62b22df0fecee3a7ddd45d4504d5c2d311fc.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
1d5d209fb69f3a9b4cb8799fb7be62b22df0fecee3a7ddd45d4504d5c2d311fc.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
20b9ae8a5ac2fee80a07e504d2a6be09d2be39055b349baf7c38813e26d13fad.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
20b9ae8a5ac2fee80a07e504d2a6be09d2be39055b349baf7c38813e26d13fad.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
21aaf28e05a6224b2a5b338a738ff9321a56ebc2babe6b194709f9a00fb97af4.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
21aaf28e05a6224b2a5b338a738ff9321a56ebc2babe6b194709f9a00fb97af4.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
22ea24b9b0535d9687352b4a6208e299c4a64f79290c939f553b1eb9ec60706c.exe
Resource
win7-20250207-en
Behavioral task
behavioral28
Sample
22ea24b9b0535d9687352b4a6208e299c4a64f79290c939f553b1eb9ec60706c.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
2646ec6c76057d721a872ba333ac65cd7d962fa27338923b8a2d18099ba0f00a.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
2646ec6c76057d721a872ba333ac65cd7d962fa27338923b8a2d18099ba0f00a.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
2963197f5419c180c099f042b013a53a3ebe97928717a199872f73667f488471.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
2963197f5419c180c099f042b013a53a3ebe97928717a199872f73667f488471.exe
Resource
win10v2004-20250217-en
General
-
Target
10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe
-
Size
21.8MB
-
MD5
53d77e893eadb542ec6ed0205edb0426
-
SHA1
9f64ea0034fb697f2e79bbc765744dc94d56f363
-
SHA256
10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409
-
SHA512
25e6c899034b2cb7c2e58025c88136e1f13e336dd6083031664687666bb64489c0309c26e1e0ebd86f1ffa3202d81ad3fb134be07074752bb05640201ca34cdc
-
SSDEEP
393216:8YGbY6iHonlQCe88BYdY3SHFPJXFODKSbT3DIfpTwmZf0of12Wmv2ZyX+vVAAc:87Y2CCe4dAmFOmSPMhpfTf15mv2ZyURc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3044 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2756 AActtive.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KMSAuto-AActtive-API = "C:\\ProgramData\\KMSAuto\\AActtive.exe" 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3056 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2616 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe Token: SeDebugPrivilege 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe Token: SeDebugPrivilege 2756 AActtive.exe Token: SeDebugPrivilege 2756 AActtive.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2616 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 30 PID 2316 wrote to memory of 2616 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 30 PID 2316 wrote to memory of 2616 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 30 PID 2316 wrote to memory of 2756 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 32 PID 2316 wrote to memory of 2756 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 32 PID 2316 wrote to memory of 2756 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 32 PID 2316 wrote to memory of 3044 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 33 PID 2316 wrote to memory of 3044 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 33 PID 2316 wrote to memory of 3044 2316 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 33 PID 3044 wrote to memory of 3056 3044 cmd.exe 35 PID 3044 wrote to memory of 3056 3044 cmd.exe 35 PID 3044 wrote to memory of 3056 3044 cmd.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe"C:\Users\Admin\AppData\Local\Temp\10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\system32\schtasks.exe"schtasks.exe" /create /tn KMSAuto-AActtive-API /tr "C:\ProgramData\KMSAuto\AActtive.exe" /st 08:03 /du 23:59 /sc daily /ri 1 /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2616
-
-
C:\ProgramData\KMSAuto\AActtive.exe"C:\ProgramData\KMSAuto\AActtive.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpA554.tmp.bat""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\system32\timeout.exetimeout 63⤵
- Delays execution with timeout.exe
PID:3056
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22.4MB
MD554e72295c488da4d242d4f3e41538e53
SHA1292aa829c57f09b8e74c661a068fb18c11504b38
SHA256b9067932062a86a9efb2f3b48c95f4ed605793a28395558ddff848a20e84a81d
SHA5128ca30795957b35ef37306f9ad886edda9eb3191de61cbf5ece3dc9fb42d88946700c706b394d1a0d351aa8de04677f7db412d7c2e290b33cf7bf71bf8bbcb577
-
Filesize
216B
MD5e24dbd3859499e27f6dff9818d47c1fa
SHA131fee3ea9cd5aaea1cb31c07c6eb1a65929ef41f
SHA256c1a5675b456a64f83434efd014ada5bc675e3b701d23b3e426e46d5f4f9bffc5
SHA512e59198b5096dbb283a356ed13ba824e4fa4ce1b3eda2ab53d4aa906e2edd65f080f8c695c1ab1a201be4c5af431fca7b9f9929ad4d8bb006a85d104aa1bda6ca