Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3Autoruns/Autoruns.exe
windows7-x64
3Autoruns/Autoruns.exe
windows10-2004-x64
3Autoruns/A...64.exe
windows7-x64
3Autoruns/A...64.exe
windows10-2004-x64
3Autoruns/A...4a.exe
windows7-x64
Autoruns/A...4a.exe
windows10-2004-x64
Autoruns/autoruns.chm
windows7-x64
1Autoruns/autoruns.chm
windows10-2004-x64
1Autoruns/a...sc.exe
windows7-x64
3Autoruns/a...sc.exe
windows10-2004-x64
3Autoruns/a...64.exe
windows7-x64
3Autoruns/a...64.exe
windows10-2004-x64
3Autoruns/a...4a.exe
windows7-x64
Autoruns/a...4a.exe
windows10-2004-x64
EXMservice.exe
windows7-x64
7EXMservice.exe
windows10-2004-x64
10FortniteSe...gs.exe
windows7-x64
7FortniteSe...gs.exe
windows10-2004-x64
7NvidiaProf...or.exe
windows7-x64
1NvidiaProf...or.exe
windows10-2004-x64
1WindowsUpd...ub.exe
windows7-x64
10WindowsUpd...ub.exe
windows10-2004-x64
10WindowsUpd...64.exe
windows7-x64
10WindowsUpd...64.exe
windows10-2004-x64
10Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/03/2025, 14:55
Behavioral task
behavioral1
Sample
Autoruns/Autoruns.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Autoruns/Autoruns.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
Autoruns/Autoruns64.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Autoruns/Autoruns64.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
Autoruns/Autoruns64a.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
Autoruns/Autoruns64a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
Autoruns/autoruns.chm
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
Autoruns/autoruns.chm
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
Autoruns/autorunsc.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Autoruns/autorunsc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
Autoruns/autorunsc64.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Autoruns/autorunsc64.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
Autoruns/autorunsc64a.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Autoruns/autorunsc64a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
EXMservice.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
EXMservice.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
FortniteSettings/FortniteSettings.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
FortniteSettings/FortniteSettings.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral19
Sample
NvidiaProfileInspector/nvidiaProfileInspector.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
NvidiaProfileInspector/nvidiaProfileInspector.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
WindowsUpdateBlocker/Wub.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
WindowsUpdateBlocker/Wub.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
WindowsUpdateBlocker/Wub_x64.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
WindowsUpdateBlocker/Wub_x64.exe
Resource
win10v2004-20250314-en
General
-
Target
Autoruns/autorunsc.exe
-
Size
701KB
-
MD5
1d4611e03d8f32ae08cf8ade9a958729
-
SHA1
a8a3504eaf57a7d640bd42b5d59d2b8afa3e5f33
-
SHA256
bfbcf41b4659a4f371d434fc92b0f13bd46cfb82b74910633e900008765bd6da
-
SHA512
b3114eb005aa1f5f855d86d846099d43b61bbc7353d3acec241a79b691f69080474d356d9e414dfb65036c9a36751d9839fef15f8115ea391e906a841eb52ea4
-
SSDEEP
12288:6p7RGU8Fyh5h1nRoKWoS+ajSUwDeFHvOfKf:6p8rqH1nuKWoS+9DUvdf
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autorunsc.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1328 autorunsc.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1328 autorunsc.exe Token: SeImpersonatePrivilege 1328 autorunsc.exe Token: SeSecurityPrivilege 1328 autorunsc.exe Token: SeDebugPrivilege 1328 autorunsc.exe Token: SeBackupPrivilege 1328 autorunsc.exe Token: SeRestorePrivilege 1328 autorunsc.exe