Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10f5ae5532f1...b5.exe
windows7-x64
10f5ae5532f1...b5.exe
windows10-2004-x64
10f5cb51ffdb...c0.exe
windows7-x64
10f5cb51ffdb...c0.exe
windows10-2004-x64
10f5ed127464...bc.exe
windows7-x64
10f5ed127464...bc.exe
windows10-2004-x64
10f62837f3bc...7a.exe
windows7-x64
10f62837f3bc...7a.exe
windows10-2004-x64
10f628fa20e8...3b.exe
windows7-x64
10f628fa20e8...3b.exe
windows10-2004-x64
10f640f01e80...c5.exe
windows7-x64
7f640f01e80...c5.exe
windows10-2004-x64
7f66fa3036e...07.exe
windows7-x64
7f66fa3036e...07.exe
windows10-2004-x64
7f68f044685...50.exe
windows7-x64
8f68f044685...50.exe
windows10-2004-x64
10f6ac1ea5c1...25.exe
windows7-x64
8f6ac1ea5c1...25.exe
windows10-2004-x64
8f6b7978847...1a.exe
windows7-x64
7f6b7978847...1a.exe
windows10-2004-x64
7f6e2978004...35.exe
windows7-x64
7f6e2978004...35.exe
windows10-2004-x64
10f721adec82...71.exe
windows7-x64
10f721adec82...71.exe
windows10-2004-x64
10f736c152b3...c8.exe
windows7-x64
10f736c152b3...c8.exe
windows10-2004-x64
10f780377dd9...c9.exe
windows7-x64
7f780377dd9...c9.exe
windows10-2004-x64
7f7a96bf083...c8.exe
windows7-x64
1f7a96bf083...c8.exe
windows10-2004-x64
1f812ad48d0...9b.exe
windows7-x64
10f812ad48d0...9b.exe
windows10-2004-x64
10Analysis
-
max time kernel
104s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 06:18
Static task
static1
Behavioral task
behavioral1
Sample
f5ae5532f18462594d061ae3bdf732b5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5ae5532f18462594d061ae3bdf732b5.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
f5cb51ffdb87e6d78da4a60b2a83a2c0.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
f5cb51ffdb87e6d78da4a60b2a83a2c0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
f5ed1274646abc95fd8b87f43adcadbc.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
f5ed1274646abc95fd8b87f43adcadbc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
f62837f3bc66012b94d74cc471f3d97a.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
f62837f3bc66012b94d74cc471f3d97a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
f628fa20e85aaf1cc562cfd512392d3d12da2ef70adc31068f1e3d7f2b0a4f3b.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
f628fa20e85aaf1cc562cfd512392d3d12da2ef70adc31068f1e3d7f2b0a4f3b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
f640f01e808f31a32d455a827fd646d5faf2a452b47833597990ffe9a6597ac5.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
f640f01e808f31a32d455a827fd646d5faf2a452b47833597990ffe9a6597ac5.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral13
Sample
f66fa3036e662d8f7ccce8795fb8b907.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
f66fa3036e662d8f7ccce8795fb8b907.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
f6ac1ea5c19284854998f25244a12f25.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
f6ac1ea5c19284854998f25244a12f25.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
f6b79788476c3806befcdd2dead8231a.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
f6b79788476c3806befcdd2dead8231a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
f6e297800457d823c0597e833d555135.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
f6e297800457d823c0597e833d555135.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
f721adec82fb8994517719b69e8aa337d4619879e64cbd2fd80fc4e190e22c71.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
f721adec82fb8994517719b69e8aa337d4619879e64cbd2fd80fc4e190e22c71.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
f736c152b3d1812f1142ed0da99e0ac8.exe
Resource
win7-20250207-en
Behavioral task
behavioral26
Sample
f736c152b3d1812f1142ed0da99e0ac8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
f780377dd90d33c8280734d882fc2ac9.exe
Resource
win7-20241023-en
Behavioral task
behavioral28
Sample
f780377dd90d33c8280734d882fc2ac9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
f7a96bf0830c5f7513d65086e0f7eb6679565b6ffdc6d1e325ee21303b38fec8.exe
Resource
win7-20250207-en
Behavioral task
behavioral30
Sample
f7a96bf0830c5f7513d65086e0f7eb6679565b6ffdc6d1e325ee21303b38fec8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
f812ad48d0a6d53611389e30fd8ae9f80a245fe3360b52dc833f6bf7b7b7859b.exe
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
f812ad48d0a6d53611389e30fd8ae9f80a245fe3360b52dc833f6bf7b7b7859b.exe
Resource
win10v2004-20250314-en
General
-
Target
f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe
-
Size
3.0MB
-
MD5
4d16429b31b10c20f707cd5289b2466c
-
SHA1
2d81797a275a1e4810e8c9d3c32ffca17adffc76
-
SHA256
f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950
-
SHA512
e69fa3608df519e26d5878f95c29132992e4c1a6744905d2256912d7c40aab11fe903575734a8952791d5898570c634e969b26a62b21bf978acac5878d9615d9
-
SSDEEP
49152:NMHHrIxRWPc3wDlRo4LZpsqDXUDBvFHOxoYj80VmXvqvIGg:N4H2RWPc3QlRzLTFDX6VFHOxjj89XvCy
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1088 created 3428 1088 f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe 56 -
Downloads MZ/PE file 1 IoCs
flow pid Process 21 1088 f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1088 set thread context of 4804 1088 f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1088 f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1088 f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe Token: SeDebugPrivilege 1088 f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1088 wrote to memory of 4804 1088 f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe 89 PID 1088 wrote to memory of 4804 1088 f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe 89 PID 1088 wrote to memory of 4804 1088 f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe 89 PID 1088 wrote to memory of 4804 1088 f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe 89 PID 1088 wrote to memory of 4804 1088 f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe 89 PID 1088 wrote to memory of 4804 1088 f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe 89 PID 1088 wrote to memory of 4804 1088 f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe 89 PID 1088 wrote to memory of 4804 1088 f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe 89 PID 1088 wrote to memory of 4804 1088 f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe 89 PID 1088 wrote to memory of 4804 1088 f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe 89
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe"C:\Users\Admin\AppData\Local\Temp\f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Downloads MZ/PE file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1088
-
-
C:\Users\Admin\AppData\Local\Temp\f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe"C:\Users\Admin\AppData\Local\Temp\f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4804
-