Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
100033f75804...e5.exe
windows7-x64
10033f75804...e5.exe
windows10-2004-x64
100ecd8a50b...ab.exe
windows7-x64
1000ecd8a50b...ab.exe
windows10-2004-x64
1007f66695f4...21.exe
windows7-x64
807f66695f4...21.exe
windows10-2004-x64
809e259cbe7...ee.exe
windows7-x64
1009e259cbe7...ee.exe
windows10-2004-x64
100c41a305e8...cd.exe
windows7-x64
80c41a305e8...cd.exe
windows10-2004-x64
80ca149e59a...32.exe
windows7-x64
70ca149e59a...32.exe
windows10-2004-x64
1010ebd229b7...09.exe
windows7-x64
710ebd229b7...09.exe
windows10-2004-x64
7170b3d1749...5a.exe
windows7-x64
8170b3d1749...5a.exe
windows10-2004-x64
81b812937c3...1a.exe
windows7-x64
101b812937c3...1a.exe
windows10-2004-x64
101c7facff8b...44.exe
windows7-x64
101c7facff8b...44.exe
windows10-2004-x64
101d5d209fb6...fc.exe
windows7-x64
71d5d209fb6...fc.exe
windows10-2004-x64
1020b9ae8a5a...ad.exe
windows7-x64
820b9ae8a5a...ad.exe
windows10-2004-x64
821aaf28e05...f4.exe
windows7-x64
1021aaf28e05...f4.exe
windows10-2004-x64
1022ea24b9b0...6c.exe
windows7-x64
322ea24b9b0...6c.exe
windows10-2004-x64
32646ec6c76...0a.exe
windows7-x64
102646ec6c76...0a.exe
windows10-2004-x64
82963197f54...71.exe
windows7-x64
102963197f54...71.exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2025, 07:56
Static task
static1
Behavioral task
behavioral1
Sample
0033f75804f1bdff0d0bd5153a6114c3757da40fa823dd18a5742373a905a3e5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0033f75804f1bdff0d0bd5153a6114c3757da40fa823dd18a5742373a905a3e5.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
00ecd8a50bb6f18b13df817d36962dd625cc98b05a90ef9f539c8506226790ab.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
00ecd8a50bb6f18b13df817d36962dd625cc98b05a90ef9f539c8506226790ab.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
07f66695f4dde786aabfdcb965764f4cc785308308a7d5b3d871373557b4e121.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
07f66695f4dde786aabfdcb965764f4cc785308308a7d5b3d871373557b4e121.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
09e259cbe7adb2947fdbf6b556ab82948a320042b2d4738988ac756d5539bfee.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
09e259cbe7adb2947fdbf6b556ab82948a320042b2d4738988ac756d5539bfee.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
0c41a305e80960e4c7c2c890fd707429091d3bb87d5726ed7c13373d626e85cd.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
0c41a305e80960e4c7c2c890fd707429091d3bb87d5726ed7c13373d626e85cd.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
0ca149e59a526c1811fcac3c14943acdbc43a3261af653670bc9e71436b1fc32.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
0ca149e59a526c1811fcac3c14943acdbc43a3261af653670bc9e71436b1fc32.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
1c7facff8b5db7f2186d2574b32b72d5f00467e85f56189d461cec22b9b3b144.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
1c7facff8b5db7f2186d2574b32b72d5f00467e85f56189d461cec22b9b3b144.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
1d5d209fb69f3a9b4cb8799fb7be62b22df0fecee3a7ddd45d4504d5c2d311fc.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
1d5d209fb69f3a9b4cb8799fb7be62b22df0fecee3a7ddd45d4504d5c2d311fc.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
20b9ae8a5ac2fee80a07e504d2a6be09d2be39055b349baf7c38813e26d13fad.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
20b9ae8a5ac2fee80a07e504d2a6be09d2be39055b349baf7c38813e26d13fad.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
21aaf28e05a6224b2a5b338a738ff9321a56ebc2babe6b194709f9a00fb97af4.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
21aaf28e05a6224b2a5b338a738ff9321a56ebc2babe6b194709f9a00fb97af4.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
22ea24b9b0535d9687352b4a6208e299c4a64f79290c939f553b1eb9ec60706c.exe
Resource
win7-20250207-en
Behavioral task
behavioral28
Sample
22ea24b9b0535d9687352b4a6208e299c4a64f79290c939f553b1eb9ec60706c.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
2646ec6c76057d721a872ba333ac65cd7d962fa27338923b8a2d18099ba0f00a.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
2646ec6c76057d721a872ba333ac65cd7d962fa27338923b8a2d18099ba0f00a.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
2963197f5419c180c099f042b013a53a3ebe97928717a199872f73667f488471.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
2963197f5419c180c099f042b013a53a3ebe97928717a199872f73667f488471.exe
Resource
win10v2004-20250217-en
General
-
Target
10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe
-
Size
21.8MB
-
MD5
53d77e893eadb542ec6ed0205edb0426
-
SHA1
9f64ea0034fb697f2e79bbc765744dc94d56f363
-
SHA256
10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409
-
SHA512
25e6c899034b2cb7c2e58025c88136e1f13e336dd6083031664687666bb64489c0309c26e1e0ebd86f1ffa3202d81ad3fb134be07074752bb05640201ca34cdc
-
SSDEEP
393216:8YGbY6iHonlQCe88BYdY3SHFPJXFODKSbT3DIfpTwmZf0of12Wmv2ZyX+vVAAc:87Y2CCe4dAmFOmSPMhpfTf15mv2ZyURc
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe -
Executes dropped EXE 1 IoCs
pid Process 5116 AActtive.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KMSAuto-AActtive-API = "C:\\ProgramData\\KMSAuto\\AActtive.exe" 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 784 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3604 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe Token: SeDebugPrivilege 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe Token: SeDebugPrivilege 5116 AActtive.exe Token: SeDebugPrivilege 5116 AActtive.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 632 wrote to memory of 3604 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 94 PID 632 wrote to memory of 3604 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 94 PID 632 wrote to memory of 5116 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 96 PID 632 wrote to memory of 5116 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 96 PID 632 wrote to memory of 4504 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 97 PID 632 wrote to memory of 4504 632 10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe 97 PID 4504 wrote to memory of 784 4504 cmd.exe 99 PID 4504 wrote to memory of 784 4504 cmd.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe"C:\Users\Admin\AppData\Local\Temp\10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /create /tn KMSAuto-AActtive-API /tr "C:\ProgramData\KMSAuto\AActtive.exe" /st 08:04 /du 23:59 /sc daily /ri 1 /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:3604
-
-
C:\ProgramData\KMSAuto\AActtive.exe"C:\ProgramData\KMSAuto\AActtive.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp1E8F.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\system32\timeout.exetimeout 63⤵
- Delays execution with timeout.exe
PID:784
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22.4MB
MD5d8b828be837168fa09f60ef13219ad77
SHA1e06f14be275aa6780d576bc025064bd41a3e8a3d
SHA256e7654cbc4dd68619dd316d6e0a5dc1e6c7e925ebe23553d7fcec961b58ebf81c
SHA5127ebf3ff4009001b4023f20959bef660d1f5da31f2a97381628158f2db9544275f0bb643d202a97e574d50a116a5cf5480f466f3b2e45fc1c797615e6ab511165
-
Filesize
216B
MD5d9a5387907e86c7a2af2b12f32ce7be8
SHA1847e5e7e992e979c5736bdbe7b395aa3db217fd6
SHA2560da071fbb68753fb59c301f7a45249856632bb1762bb96f565a9d30fc4afdc85
SHA5121ab2fc1f08cf7bb4f099535b2da70c3937bd719a86c3b24b81db59d58e4569b502c04558a1483f535f915a7fe826c97dedf8b5bb70a92d28594eaeecbd999b22