Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10f5ae5532f1...b5.exe
windows7-x64
10f5ae5532f1...b5.exe
windows10-2004-x64
10f5cb51ffdb...c0.exe
windows7-x64
10f5cb51ffdb...c0.exe
windows10-2004-x64
10f5ed127464...bc.exe
windows7-x64
10f5ed127464...bc.exe
windows10-2004-x64
10f62837f3bc...7a.exe
windows7-x64
10f62837f3bc...7a.exe
windows10-2004-x64
10f628fa20e8...3b.exe
windows7-x64
10f628fa20e8...3b.exe
windows10-2004-x64
10f640f01e80...c5.exe
windows7-x64
7f640f01e80...c5.exe
windows10-2004-x64
7f66fa3036e...07.exe
windows7-x64
7f66fa3036e...07.exe
windows10-2004-x64
7f68f044685...50.exe
windows7-x64
8f68f044685...50.exe
windows10-2004-x64
10f6ac1ea5c1...25.exe
windows7-x64
8f6ac1ea5c1...25.exe
windows10-2004-x64
8f6b7978847...1a.exe
windows7-x64
7f6b7978847...1a.exe
windows10-2004-x64
7f6e2978004...35.exe
windows7-x64
7f6e2978004...35.exe
windows10-2004-x64
10f721adec82...71.exe
windows7-x64
10f721adec82...71.exe
windows10-2004-x64
10f736c152b3...c8.exe
windows7-x64
10f736c152b3...c8.exe
windows10-2004-x64
10f780377dd9...c9.exe
windows7-x64
7f780377dd9...c9.exe
windows10-2004-x64
7f7a96bf083...c8.exe
windows7-x64
1f7a96bf083...c8.exe
windows10-2004-x64
1f812ad48d0...9b.exe
windows7-x64
10f812ad48d0...9b.exe
windows10-2004-x64
10Analysis
-
max time kernel
103s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 06:18
Static task
static1
Behavioral task
behavioral1
Sample
f5ae5532f18462594d061ae3bdf732b5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5ae5532f18462594d061ae3bdf732b5.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
f5cb51ffdb87e6d78da4a60b2a83a2c0.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
f5cb51ffdb87e6d78da4a60b2a83a2c0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
f5ed1274646abc95fd8b87f43adcadbc.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
f5ed1274646abc95fd8b87f43adcadbc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
f62837f3bc66012b94d74cc471f3d97a.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
f62837f3bc66012b94d74cc471f3d97a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
f628fa20e85aaf1cc562cfd512392d3d12da2ef70adc31068f1e3d7f2b0a4f3b.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
f628fa20e85aaf1cc562cfd512392d3d12da2ef70adc31068f1e3d7f2b0a4f3b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
f640f01e808f31a32d455a827fd646d5faf2a452b47833597990ffe9a6597ac5.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
f640f01e808f31a32d455a827fd646d5faf2a452b47833597990ffe9a6597ac5.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral13
Sample
f66fa3036e662d8f7ccce8795fb8b907.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
f66fa3036e662d8f7ccce8795fb8b907.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
f68f044685639be03fd992bcb711c098d22b6d0f0043638768c726bf96049950.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
f6ac1ea5c19284854998f25244a12f25.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
f6ac1ea5c19284854998f25244a12f25.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
f6b79788476c3806befcdd2dead8231a.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
f6b79788476c3806befcdd2dead8231a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
f6e297800457d823c0597e833d555135.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
f6e297800457d823c0597e833d555135.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
f721adec82fb8994517719b69e8aa337d4619879e64cbd2fd80fc4e190e22c71.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
f721adec82fb8994517719b69e8aa337d4619879e64cbd2fd80fc4e190e22c71.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
f736c152b3d1812f1142ed0da99e0ac8.exe
Resource
win7-20250207-en
Behavioral task
behavioral26
Sample
f736c152b3d1812f1142ed0da99e0ac8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
f780377dd90d33c8280734d882fc2ac9.exe
Resource
win7-20241023-en
Behavioral task
behavioral28
Sample
f780377dd90d33c8280734d882fc2ac9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
f7a96bf0830c5f7513d65086e0f7eb6679565b6ffdc6d1e325ee21303b38fec8.exe
Resource
win7-20250207-en
Behavioral task
behavioral30
Sample
f7a96bf0830c5f7513d65086e0f7eb6679565b6ffdc6d1e325ee21303b38fec8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
f812ad48d0a6d53611389e30fd8ae9f80a245fe3360b52dc833f6bf7b7b7859b.exe
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
f812ad48d0a6d53611389e30fd8ae9f80a245fe3360b52dc833f6bf7b7b7859b.exe
Resource
win10v2004-20250314-en
General
-
Target
f780377dd90d33c8280734d882fc2ac9.exe
-
Size
12KB
-
MD5
f780377dd90d33c8280734d882fc2ac9
-
SHA1
2ca8e1e97f1d9893389ea6f7505fe7c24924b387
-
SHA256
d44c91defb81890cb0045d3a612485a4db65c1f4e52ce405efa453b8a07229e7
-
SHA512
ffa397cbe485bef45d52cbe19527bd7e16d5fe3847e80844dbb45fe96effefb8f0c3cfdcfa9d164786a063d6bc74a38c99ec2bab132b3841caaefb72b26be643
-
SSDEEP
384:SL7li/2zcq2DcEQvdfcJKLTp/NK9xa4f:MYMZQ9c4f
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation f780377dd90d33c8280734d882fc2ac9.exe -
Deletes itself 1 IoCs
pid Process 4656 tmp5E6D.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 4656 tmp5E6D.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp5E6D.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f780377dd90d33c8280734d882fc2ac9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1048 f780377dd90d33c8280734d882fc2ac9.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1048 wrote to memory of 4608 1048 f780377dd90d33c8280734d882fc2ac9.exe 89 PID 1048 wrote to memory of 4608 1048 f780377dd90d33c8280734d882fc2ac9.exe 89 PID 1048 wrote to memory of 4608 1048 f780377dd90d33c8280734d882fc2ac9.exe 89 PID 4608 wrote to memory of 4700 4608 vbc.exe 91 PID 4608 wrote to memory of 4700 4608 vbc.exe 91 PID 4608 wrote to memory of 4700 4608 vbc.exe 91 PID 1048 wrote to memory of 4656 1048 f780377dd90d33c8280734d882fc2ac9.exe 92 PID 1048 wrote to memory of 4656 1048 f780377dd90d33c8280734d882fc2ac9.exe 92 PID 1048 wrote to memory of 4656 1048 f780377dd90d33c8280734d882fc2ac9.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\f780377dd90d33c8280734d882fc2ac9.exe"C:\Users\Admin\AppData\Local\Temp\f780377dd90d33c8280734d882fc2ac9.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\cfg0nykm\cfg0nykm.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5F37.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc7B9A2C7AF49F4528B47678A2CD7B6A27.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:4700
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp5E6D.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp5E6D.tmp.exe" C:\Users\Admin\AppData\Local\Temp\f780377dd90d33c8280734d882fc2ac9.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD56ea4ffc9fe40b7fedd371a15b1763d9a
SHA1760b93056e4ab3da2b0aff418f4fd337d614a30a
SHA2561ca94f18a1bfe87b627d7b152c6976ba4bcac855661e8fb84b2a9e3a7924355e
SHA5121e643e852abbf4f1fa5c41ceec1e998d449974213c9777a50a855c2f071ee8627dad0c94fefe8ab64b00bd8ec849ff1b2b3b3002026b5dea1014e74d62e41ae8
-
Filesize
1KB
MD550a26931eb2cf5552136f9fb0bc80ba3
SHA12fb1172a2e198f3121f61040354620302c828dcb
SHA2567eed24dfe8c3c7f0cb3ac15e184f9bc01c41244e21ca6ca5553f970e18dbc2ab
SHA512f872d9f1653f99703b5c7c54378c678f3c8bacbe1115cf27bf76a97567327f455515c0b5f05bee1f0bfe14aeaa11f2a96e9b8de9922c5c8f589c4d488d533361
-
Filesize
2KB
MD596d85ba62108788298fcfbfc728e057f
SHA104b8419644a37635904aa173ca519b1e186bf30c
SHA256fe5a73148c28ddb0e5fa812df006dc2c940463855c7680672d95c1db4c5a068e
SHA512decdedad91986f966885651f7d4443a72e800c0b0a17fb7fbf938adf807274ef6687c6c68cf3d90c375c8172ecff6621803cfaadbfe87d144ec1ee2f3d5d6e23
-
Filesize
273B
MD56a1cc91d32ac3f4daf01adb8d8ba1c8b
SHA1fba4da3f15ba8eaf96f7b004cbcd640267e8bbd1
SHA256812cb862aba65b2cb954a22ec2bee1362977071229077bbbb0aaf531f76fc1ec
SHA512e5ddaa8aed2191d63c49fcb4258299a8de555b41d4bdbe39a377be7871bb18fa94bd972ce8b5e20bf207cad9c15ba52d311c36a5ff1b18d36d560b2de1d318e6
-
Filesize
12KB
MD52fb632b92785c4d1570ebde34d49fb90
SHA16cf3e7526214c2650d582690625e2e59556a393a
SHA25637f065dc09e575bab63cc6385b83e3dadd2ed48744775e6f884d5f9a832bba60
SHA5128763f33b108d2c7892ec8836d02d21838c250afaec42a9c2b06a5623caf6d3d3d2c2503675a616d129523b887eb5ceef76747711f5fad015227c5120e74a7f40
-
Filesize
1KB
MD5ae5f265285e68694ee708dfb9e3781d5
SHA192ca73b9456e0e813806ade0d614430c106aee3d
SHA256390f71b1e760db7a4760c44ebed3624b79935cf7f84b7d9adf1c1988e19f56f4
SHA51250c39885a485a8c80c48be43405cc53bba9037bfdd5345bee1769112a9b4acca4477e9d5c163528fa5e297a3b2311ed8294c833d1347bbd4595d671bb330f4d2