Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
1006038ed735...40.exe
windows10-ltsc 2021-x64
80673936fc0...9b.exe
windows10-ltsc 2021-x64
07b3c7c475...83.exe
windows10-ltsc 2021-x64
3097910dc61...d0.exe
windows10-ltsc 2021-x64
100bb3e9c660...40.exe
windows10-ltsc 2021-x64
100c80a0ef43...97.exe
windows10-ltsc 2021-x64
100cae214424...81.exe
windows10-ltsc 2021-x64
10b76a68b1da...15f.gz
windows10-ltsc 2021-x64
1bb7ad76bef...830.xz
windows10-ltsc 2021-x64
3cdb1365059...fbc.gz
windows10-ltsc 2021-x64
1General
-
Target
infected.7z
-
Size
80.4MB
-
Sample
250312-rmbgjstr18
-
MD5
cf25242af21ffb257ec3b670fe3bff9c
-
SHA1
a96400547e93790a9b16450ae0fff715efd6fc21
-
SHA256
d36e8aa297749e5909316230b55c07fa185761d2f58699e6caefdf3a8141168e
-
SHA512
f2ed8221f1bb3140115d3c170495a24cc6adc28b3a87b51f2c0ae583c4b4710fba9217e66d0df859db5c250ea47ba07eae174e146b13bd791b9d65983e4c9567
-
SSDEEP
1572864:9c2eO+OHpOV3D8iOjaVPBHd4uiehiH1W9e7uKweDrnI3ZW6yFwdAf67u2CZo9h:m2eO+OJE3IYd6VH1W9e7/prnI3ZWDWAk
Static task
static1
Behavioral task
behavioral1
Sample
06038ed7357e8d00e0fcef11800dfb40.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral2
Sample
0673936fc0472890d129258bc6ce1f9b.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral3
Sample
07b3c7c475a0204f34408d806a4d0883.exe
Resource
win10ltsc2021-20250218-en
Behavioral task
behavioral4
Sample
097910dc615bd581069c0ec67fa513d0.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral5
Sample
0bb3e9c660f99967ca4c8e21bc46e940.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral6
Sample
0c80a0ef434aaecd6b1c888567935b97.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral7
Sample
0cae2144249cca11917ce26657fc0281.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral8
Sample
b76a68b1da993f63c3363dc43739315f.gz
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral9
Sample
bb7ad76bef5c5a974ccd0c1b94835830.xz
Resource
win10ltsc2021-20250218-en
Behavioral task
behavioral10
Sample
cdb1365059c0e4973843dc0d0955bfbc.gz
Resource
win10ltsc2021-20250217-en
Malware Config
Extracted
mirai
MIRAI
botnet.goelites.cc
Extracted
gafgyt
209.126.73.248:839
45.144.29.99:42516
104.206.252.100:42516
217.61.7.114:72
107.172.137.175:7777
85.204.116.33:717
192.223.29.160:42516
Extracted
mirai
MIRAI
botnet.goelites.cc
Extracted
mirai
MIRAI
Extracted
xorddos
http://aa.hostasa.org/game.rar
ns3.hostasa.org:3306
ns4.hostasa.org:3306
ns1.hostasa.org:3306
ns2.hostasa.org:3306
ns3.hostasa.org:3310
ns4.hostasa.org:3310
ns1.hostasa.org:3310
ns2.hostasa.org:3310
http://info1.3000uc.com/b/u.php
gh.dsaj2a1.org:2822
www.wangzongfacai.com:2822
174.139.217.145:2822
ns3.hostasa.org:3308
ns4.hostasa.org:3308
ns1.hostasa.org:3308
ns2.hostasa.org:3308
ns3.hostasa.org:3307
ns4.hostasa.org:3307
ns1.hostasa.org:3307
ns2.hostasa.org:3307
ns3.hostasa.org:3309
ns4.hostasa.org:3309
ns1.hostasa.org:3309
ns2.hostasa.org:3309
-
crc_polynomial
EDB88320
Extracted
redosdru
http://42.51.154.54:88/NetSyst81.dll
Extracted
agenttesla
Protocol: smtp- Host:
webmail.ombakparadise.com - Port:
587 - Username:
[email protected] - Password:
ce$%^mirah
Extracted
nanocore
1.2.2.0
192.168.1.1:54984
127.0.0.1:54984
4e3184db-fd2f-47b2-8daf-030abc4baf4c
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2021-09-12T00:43:48.877032236Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
54984
-
default_group
HelloWorld
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
4e3184db-fd2f-47b2-8daf-030abc4baf4c
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
192.168.1.1
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Extracted
mirai
MIRAI
Extracted
njrat
0.7d
MyBot
8.tcp.ngrok.io:13962
aaffeb7a5f54025070b8e182b1fa7d98
-
reg_key
aaffeb7a5f54025070b8e182b1fa7d98
-
splitter
Y262SUCZ4UJJ
Extracted
cobaltstrike
1359593325
http://173.234.155.223:80/boxes.css
-
access_type
512
-
host
173.234.155.223,/boxes.css
-
http_header1
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
-
http_header2
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
-
http_method1
GET
-
http_method2
POST
-
jitter
11008
-
polling_time
61757
-
port_number
80
-
sc_process32
%windir%\syswow64\WUAUCLT.exe
-
sc_process64
%windir%\sysnative\WUAUCLT.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDJvC2CQYaIouT41kXKVNrM5lLvclGJRE+i3ves+vC0AADUWTPs64Dn/B4eKlQKPpbC/8IgJjadD/B9pZiY8XUlk4dvaagLdjBCq7uSxS+KhVVsX46LBSBgIxaE4AeoZvwBD2n0wdeeI2sbkMvDhhv5s6Nmz12sAtOVGdr8cX3s5QIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
2.708806656e+09
-
unknown2
AAAABAAAAAIAAAPVAAAAAwAAAAMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/ce
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246
-
watermark
1359593325
Targets
-
-
Target
06038ed7357e8d00e0fcef11800dfb40.vir
-
Size
1.8MB
-
MD5
06038ed7357e8d00e0fcef11800dfb40
-
SHA1
4b885a0e2fa5b59338622ef7f2859c232d7ab7c6
-
SHA256
d85c8bbec339bdefe5e4c4409816554173974ffccd31272d5fcf138d022122d2
-
SHA512
6200aa51102d71eca42ecebd04253ce915244ef86a8409d6a3e86c9402e7081f3b4bebdfa9718543df3d332b17e6ec758d9556c533493d945905656108c72cbc
-
SSDEEP
49152:QIRg5x6slKZZPCPXNYJLfUWoU/OoGbnQ/7WUT9DMQloU/8:He5x6slKZTolo1loN
Score8/10-
Drops file in Drivers directory
-
Adds Run key to start application
-
Sets desktop wallpaper using registry
-
-
-
Target
0673936fc0472890d129258bc6ce1f9b.vir
-
Size
180KB
-
MD5
0673936fc0472890d129258bc6ce1f9b
-
SHA1
8a7f09e6afa2761a55b6432616b747c07c93982a
-
SHA256
9f0678e4ac2b46a2bc79ba5ed83cb678d8e266655bc4102cedbbe2a8a13959c3
-
SHA512
8b5972f0f1be5fb5d07b877952ae587ec1c61d63c429b88d1c50dfb3238508fe396c22935c0eea6aa83048b2f52ec4cf611823db3dba93a9a40be1ca39affef5
-
SSDEEP
3072:CHRJs3d6kEWoh9LkttV+zz3SDYe7hYHYmOZkqzdmwCr4:kJTwI9LkPYuDYeuH837
Score1/10 -
-
-
Target
07b3c7c475a0204f34408d806a4d0883.vir
-
Size
60KB
-
MD5
07b3c7c475a0204f34408d806a4d0883
-
SHA1
72da95ef18d46b5ff6f75c90da29d294e8e755cf
-
SHA256
457bf2d5752e50d343a655993e9f308a616f4123c5fbebbc369f12c49bd502b6
-
SHA512
4c57ce6ee744227219cdfdea5e67efe605c62d7ae99233a9b886bdf0144c70f0317be3ba5dd01c097284c3c86e7005165b9d74ef43fcf28d8d5fd34717c0f1c2
-
SSDEEP
768:5blRLS2f/IbhNGgkqUpbj3Pl4SSbUtkokv9N:bBSI/UGg6P326tkokf
Score3/10 -
-
-
Target
097910dc615bd581069c0ec67fa513d0.vir
-
Size
193KB
-
MD5
097910dc615bd581069c0ec67fa513d0
-
SHA1
00597735a09afbe12ad29ea00ede40733c67801c
-
SHA256
25b2ae77c2dc71ca729c153cce1615b77a396ff4ba598928c788eec57f1777fe
-
SHA512
cdf2464377db2fc6c2b2c665ac903e74cfde99a3e6cc6acd7d0d2ad6d417d442b27760b79d14693e3ba27d0a1b8a3d0355f48521d9847ab30c38e8541de92752
-
SSDEEP
3072:/8QYOkCol9wKhIDDVX1oWPBy4UAhZErjmZPwmlrNChgC:/8QtAwKhK1oWPf6mx56
Score10/10-
Smokeloader family
-
Suspicious use of SetThreadContext
-
-
-
Target
0bb3e9c660f99967ca4c8e21bc46e940.vir
-
Size
196KB
-
MD5
0bb3e9c660f99967ca4c8e21bc46e940
-
SHA1
4f4683250a24c1c752fc774d4c9b3c032f4e59ba
-
SHA256
c74fe9b5ed555b14d9b73d9fe53b4e3722f837ded57ae475d540d8b070410b97
-
SHA512
84aa508e7612098da66e689a1cc10880a62c9a498706b6a0cd3371f7144ce6a1006974987bcf6d39456a6b9b319cc77a6559ed0a5260639d12566ed2b3f93c38
-
SSDEEP
3072:OybtB0tQ9nLHbB9WJvA7DejJuKvEhfmHZ7:R4QxL7B9WSvejJuB+B
Score10/10-
Modifies visiblity of hidden/system files in Explorer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
0c80a0ef434aaecd6b1c888567935b97.vir
-
Size
410KB
-
MD5
0c80a0ef434aaecd6b1c888567935b97
-
SHA1
ad6730df896f7bb0e4379b8ac543c704f70f8292
-
SHA256
bb7850028720aace62daf55e8ba0bcf0b1040ebe20f3035873e9fd7130ced767
-
SHA512
7a8b601b6d027c0f017a620aa117c7183c05170aa6f90c4a2a177ad82b938f00b181007d69eea128b4ee738b2397a2448e2a33801daa102bfdf2b39f1917e6de
-
SSDEEP
6144:4ta0cy+o0ecIJw2qDukfgpFyuItrcF7Faf3DROwunbNvTr:eXP0yJvqDlQFyuItgZiTROwuxvTr
Score10/10-
Modifies firewall policy service
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
0cae2144249cca11917ce26657fc0281.vir
-
Size
176KB
-
MD5
0cae2144249cca11917ce26657fc0281
-
SHA1
e7ffc36c62c26e987c6954e4739a306a95d119e1
-
SHA256
5fa749158a4dd5dd030bb97a5ca74a542ae4661b2a76ec69b29d41c3a32e8767
-
SHA512
50c5ea18407b74fc5d741d602c87a28c0bfebb348a8ff1710026951937b1e9077a353ee0b9bf2eb648b83a60e34a5e934d8b95c1b7e1202933aea875e6975027
-
SSDEEP
3072:MBFDC2a8kkalMLmNTMeN1vT72dPxIhf+5HS5LTbl2NBX9ZdebJR3u:M/inHlN1vTyTIBEHkTbl2zn0bJR
Score10/10-
Gh0st RAT payload
-
Gh0strat family
-
Modifies firewall policy service
-
Executes dropped EXE
-
Drops file in System32 directory
-
-
-
Target
b76a68b1da993f63c3363dc43739315f.vir
-
Size
3.0MB
-
MD5
b76a68b1da993f63c3363dc43739315f
-
SHA1
270887116fcdad471d5b1fdd825a9551d22f1cb1
-
SHA256
41066b7b1cea83c60086ce5758c4ce395e1f7433670791780b875e29a02c4b89
-
SHA512
eadf09990081c51fa5be8f4f85ce8b150d21cb847b59a872bc4b6ea12684a41822d3c550ca2ddf7ecd91f20b2553b1349092e39b4aad5e6e59f464d1bde296cb
-
SSDEEP
49152:hOZEQTQW+E7Lj+TTbUn/7oxHQKpyGQJ3EGbKpIbamHwTCjFhtbyh3lMk+rhiCpDw:hcEQSE6TTQ7o9QhGmEMKaWmwCjdWh3+A
Score1/10 -
-
-
Target
bb7ad76bef5c5a974ccd0c1b94835830.vir
-
Size
260KB
-
MD5
bb7ad76bef5c5a974ccd0c1b94835830
-
SHA1
0afe421bf897c4f7ada01a9c021938ef09ef8790
-
SHA256
098347223227886f16bb1ee42cb1ae51e0ced90e7c3aca1c24f15376711349b9
-
SHA512
6144727b2dbf3816c4b5e6fd1da1577f9e79970bc777884c35ed1982cfcb2ae52ea727c9c924627629606d3a83f6ce26d992d4507c50a749a433c4812254f87f
-
SSDEEP
6144:VekDDl4fjNw3EOrnBZAtNbWqxwPEO2J3by9fPvZMo+VGkT1py/z:Vek14g3UtNyWwaqnRMo+ckDyr
Score3/10 -
-
-
Target
cdb1365059c0e4973843dc0d0955bfbc.vir
-
Size
3.0MB
-
MD5
cdb1365059c0e4973843dc0d0955bfbc
-
SHA1
eaa991e3a9c57302f31ac5faba09d7f00f65c8b6
-
SHA256
1a880b81f53f4c162e7c90d098c185da9cc936988f0ea4fdb278c661d68f9996
-
SHA512
17d136b87efde90b50daccb84bd85dd09706af14ee5a2a963655ec2df06aa3173915ccb479010098061dbf079c716197d6a311eff3b0c722daf46c00295af4eb
-
SSDEEP
49152:hOZEQTQW+E7Lj+TTbUn/7oxHQKpyGQJ3EGbKpIbamHwTCjFhtbyh3lMk+rhiCpD6:hcEQSE6TTQ7o9QhGmEMKaWmwCjdWh3+K
Score1/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
4