Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
12/03/2025, 14:23
250312-rqc5jsvjz9 10Analysis
-
max time kernel
33s -
max time network
40s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2025, 14:23
Static task
static1
Behavioral task
behavioral1
Sample
097910dc615bd581069c0ec67fa513d0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
097910dc615bd581069c0ec67fa513d0.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
19771cc7d4a738eb3e879d7a537dc260.exe
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
19771cc7d4a738eb3e879d7a537dc260.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
29c5c99473748778ee6bdd60dc8ef6d7.vir
Resource
debian12-armhf-20240729-en
Behavioral task
behavioral6
Sample
29d9976d73aabf191eafe0f8b045cc85.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
29d9976d73aabf191eafe0f8b045cc85.exe
Resource
win10v2004-20250217-en
General
-
Target
19771cc7d4a738eb3e879d7a537dc260.exe
-
Size
159KB
-
MD5
19771cc7d4a738eb3e879d7a537dc260
-
SHA1
eb8b05f48826a090c3f84d468d3986a121bc0cd5
-
SHA256
cac09c5751194795eb27b2daf641bee4afbcb1638095d7055e89c9c505af038f
-
SHA512
688c47b760c6ba14ede8c1e5bb708e5ade001b0e866c6a87139a452fe9cca0d0bd88967ad4ed80f0129d30e7c7fdb9d839c5e0f051a28bceaec9c776f26df549
-
SSDEEP
3072:fydfi5NYbjCOqGRhEkH8f4n3fIfkBo6Yn3EWejU:fyhi5N+OOLRikH8fEgsLYUO
Malware Config
Signatures
-
Drops desktop.ini file(s) 10 IoCs
description ioc Process File opened for modification C:\Users\Public\Desktop\desktop.ini 19771cc7d4a738eb3e879d7a537dc260.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-250031470-1197856012-2659781506-1000\desktop.ini 19771cc7d4a738eb3e879d7a537dc260.exe File opened for modification C:\Users\Public\desktop.ini 19771cc7d4a738eb3e879d7a537dc260.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 19771cc7d4a738eb3e879d7a537dc260.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 19771cc7d4a738eb3e879d7a537dc260.exe File opened for modification C:\Users\Public\Documents\desktop.ini 19771cc7d4a738eb3e879d7a537dc260.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 19771cc7d4a738eb3e879d7a537dc260.exe File opened for modification C:\Users\Public\Videos\desktop.ini 19771cc7d4a738eb3e879d7a537dc260.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 19771cc7d4a738eb3e879d7a537dc260.exe File opened for modification C:\Users\Public\Music\desktop.ini 19771cc7d4a738eb3e879d7a537dc260.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19771cc7d4a738eb3e879d7a537dc260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 1 IoCs
pid Process 2112 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 620 19771cc7d4a738eb3e879d7a537dc260.exe 620 19771cc7d4a738eb3e879d7a537dc260.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2112 taskkill.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 620 wrote to memory of 2112 620 19771cc7d4a738eb3e879d7a537dc260.exe 92 PID 620 wrote to memory of 2112 620 19771cc7d4a738eb3e879d7a537dc260.exe 92 PID 620 wrote to memory of 2112 620 19771cc7d4a738eb3e879d7a537dc260.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\19771cc7d4a738eb3e879d7a537dc260.exe"C:\Users\Admin\AppData\Local\Temp\19771cc7d4a738eb3e879d7a537dc260.exe"1⤵
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /PID 6202⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5c78d551e9ff28aa7cc77bb3bba3196d9
SHA18ba6384f29bb3da67c59a0b844cb8bd7e2c97d49
SHA25632d22a64af266406d09e8b2061c031b74e07f3d14947835e41cbe14914c8c03d
SHA5120d373d60ae8c9e8111e9060aca0e4c65f28bc26b5a8f56f3716996f8feb8ef816d536155f52dd722225ed0c08500f98a8d5e4a579597335914156fcc028ea259