Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
100033f75804...e5.exe
windows7-x64
10033f75804...e5.exe
windows10-2004-x64
100ecd8a50b...ab.exe
windows7-x64
1000ecd8a50b...ab.exe
windows10-2004-x64
1007f66695f4...21.exe
windows7-x64
807f66695f4...21.exe
windows10-2004-x64
809e259cbe7...ee.exe
windows7-x64
1009e259cbe7...ee.exe
windows10-2004-x64
100c41a305e8...cd.exe
windows7-x64
80c41a305e8...cd.exe
windows10-2004-x64
80ca149e59a...32.exe
windows7-x64
70ca149e59a...32.exe
windows10-2004-x64
1010ebd229b7...09.exe
windows7-x64
710ebd229b7...09.exe
windows10-2004-x64
7170b3d1749...5a.exe
windows7-x64
8170b3d1749...5a.exe
windows10-2004-x64
81b812937c3...1a.exe
windows7-x64
101b812937c3...1a.exe
windows10-2004-x64
101c7facff8b...44.exe
windows7-x64
101c7facff8b...44.exe
windows10-2004-x64
101d5d209fb6...fc.exe
windows7-x64
71d5d209fb6...fc.exe
windows10-2004-x64
1020b9ae8a5a...ad.exe
windows7-x64
820b9ae8a5a...ad.exe
windows10-2004-x64
821aaf28e05...f4.exe
windows7-x64
1021aaf28e05...f4.exe
windows10-2004-x64
1022ea24b9b0...6c.exe
windows7-x64
322ea24b9b0...6c.exe
windows10-2004-x64
32646ec6c76...0a.exe
windows7-x64
102646ec6c76...0a.exe
windows10-2004-x64
82963197f54...71.exe
windows7-x64
102963197f54...71.exe
windows10-2004-x64
10Analysis
-
max time kernel
86s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2025, 07:56
Static task
static1
Behavioral task
behavioral1
Sample
0033f75804f1bdff0d0bd5153a6114c3757da40fa823dd18a5742373a905a3e5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0033f75804f1bdff0d0bd5153a6114c3757da40fa823dd18a5742373a905a3e5.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
00ecd8a50bb6f18b13df817d36962dd625cc98b05a90ef9f539c8506226790ab.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
00ecd8a50bb6f18b13df817d36962dd625cc98b05a90ef9f539c8506226790ab.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
07f66695f4dde786aabfdcb965764f4cc785308308a7d5b3d871373557b4e121.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
07f66695f4dde786aabfdcb965764f4cc785308308a7d5b3d871373557b4e121.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
09e259cbe7adb2947fdbf6b556ab82948a320042b2d4738988ac756d5539bfee.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
09e259cbe7adb2947fdbf6b556ab82948a320042b2d4738988ac756d5539bfee.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
0c41a305e80960e4c7c2c890fd707429091d3bb87d5726ed7c13373d626e85cd.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
0c41a305e80960e4c7c2c890fd707429091d3bb87d5726ed7c13373d626e85cd.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
0ca149e59a526c1811fcac3c14943acdbc43a3261af653670bc9e71436b1fc32.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
0ca149e59a526c1811fcac3c14943acdbc43a3261af653670bc9e71436b1fc32.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
1c7facff8b5db7f2186d2574b32b72d5f00467e85f56189d461cec22b9b3b144.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
1c7facff8b5db7f2186d2574b32b72d5f00467e85f56189d461cec22b9b3b144.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
1d5d209fb69f3a9b4cb8799fb7be62b22df0fecee3a7ddd45d4504d5c2d311fc.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
1d5d209fb69f3a9b4cb8799fb7be62b22df0fecee3a7ddd45d4504d5c2d311fc.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
20b9ae8a5ac2fee80a07e504d2a6be09d2be39055b349baf7c38813e26d13fad.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
20b9ae8a5ac2fee80a07e504d2a6be09d2be39055b349baf7c38813e26d13fad.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
21aaf28e05a6224b2a5b338a738ff9321a56ebc2babe6b194709f9a00fb97af4.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
21aaf28e05a6224b2a5b338a738ff9321a56ebc2babe6b194709f9a00fb97af4.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
22ea24b9b0535d9687352b4a6208e299c4a64f79290c939f553b1eb9ec60706c.exe
Resource
win7-20250207-en
Behavioral task
behavioral28
Sample
22ea24b9b0535d9687352b4a6208e299c4a64f79290c939f553b1eb9ec60706c.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
2646ec6c76057d721a872ba333ac65cd7d962fa27338923b8a2d18099ba0f00a.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
2646ec6c76057d721a872ba333ac65cd7d962fa27338923b8a2d18099ba0f00a.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
2963197f5419c180c099f042b013a53a3ebe97928717a199872f73667f488471.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
2963197f5419c180c099f042b013a53a3ebe97928717a199872f73667f488471.exe
Resource
win10v2004-20250217-en
General
-
Target
170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe
-
Size
822KB
-
MD5
deb100f4fae0ac07a714e0a53f0a7b87
-
SHA1
946118fdd1037608d14e8c024a1bc0c808344134
-
SHA256
170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a
-
SHA512
7229f572665114b552aa54f59347e651f9f7f6a6b255111159cbc33bd6c2faba2e957e471ceb5ac1b05929dc625de05ba5a1728abca21a13e4ceda40b86259cb
-
SSDEEP
12288:kbNZuc154p9YU2a32rDINzek4/I5Zjq4EXxK/Cgc+aJBjisrIkEyAZsoqkR:0NZubxcIhR1dEXxACe4Bji/kE
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4576 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation 170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2776 set thread context of 1332 2776 170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2776 170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe 2776 170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe 4576 powershell.exe 4576 powershell.exe 1332 RegSvcs.exe 1332 RegSvcs.exe 1332 RegSvcs.exe 1332 RegSvcs.exe 1332 RegSvcs.exe 1332 RegSvcs.exe 1332 RegSvcs.exe 1332 RegSvcs.exe 1332 RegSvcs.exe 1332 RegSvcs.exe 1332 RegSvcs.exe 1332 RegSvcs.exe 1332 RegSvcs.exe 1332 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2776 170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe Token: SeDebugPrivilege 4576 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2776 wrote to memory of 4576 2776 170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe 93 PID 2776 wrote to memory of 4576 2776 170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe 93 PID 2776 wrote to memory of 4576 2776 170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe 93 PID 2776 wrote to memory of 4592 2776 170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe 95 PID 2776 wrote to memory of 4592 2776 170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe 95 PID 2776 wrote to memory of 4592 2776 170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe 95 PID 2776 wrote to memory of 1332 2776 170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe 96 PID 2776 wrote to memory of 1332 2776 170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe 96 PID 2776 wrote to memory of 1332 2776 170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe 96 PID 2776 wrote to memory of 1332 2776 170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe 96 PID 2776 wrote to memory of 1332 2776 170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe 96 PID 2776 wrote to memory of 1332 2776 170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe"C:\Users\Admin\AppData\Local\Temp\170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:4592
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82