Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
105066d63f68...41.exe
windows7-x64
105066d63f68...41.exe
windows10-2004-x64
10508fd9ddd0...0e.exe
windows7-x64
10508fd9ddd0...0e.exe
windows10-2004-x64
1050a0e27c44...1b.exe
windows7-x64
1050a0e27c44...1b.exe
windows10-2004-x64
1050ca83ea97...a1.exe
windows7-x64
750ca83ea97...a1.exe
windows10-2004-x64
75131f70fe8...c9.exe
windows7-x64
105131f70fe8...c9.exe
windows10-2004-x64
1051a043361b...63.exe
windows7-x64
1051a043361b...63.exe
windows10-2004-x64
751ae5a5c12...16.exe
windows7-x64
751ae5a5c12...16.exe
windows10-2004-x64
1051bce03659...62.exe
windows7-x64
1051bce03659...62.exe
windows10-2004-x64
10521cf0805a...97.exe
windows7-x64
10521cf0805a...97.exe
windows10-2004-x64
75250379192...f1.exe
windows7-x64
105250379192...f1.exe
windows10-2004-x64
105271d48de9...2e.exe
windows7-x64
75271d48de9...2e.exe
windows10-2004-x64
752af658910...b8.exe
windows7-x64
152af658910...b8.exe
windows10-2004-x64
152ef63d721...1f.exe
windows7-x64
1052ef63d721...1f.exe
windows10-2004-x64
1053008e68ab...9e.exe
windows7-x64
1053008e68ab...9e.exe
windows10-2004-x64
10535aeca70c...a0.exe
windows7-x64
6535aeca70c...a0.exe
windows10-2004-x64
65370f14c68...3e.exe
windows7-x64
105370f14c68...3e.exe
windows10-2004-x64
4Analysis
-
max time kernel
97s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 06:10
Behavioral task
behavioral1
Sample
5066d63f683553725c60860d021a0d41.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5066d63f683553725c60860d021a0d41.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
508fd9ddd025101fca7bd23c589d0a6d1e68a3f15e669df43bc930c30d35980e.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
508fd9ddd025101fca7bd23c589d0a6d1e68a3f15e669df43bc930c30d35980e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
50a0e27c44685967486053465ad72a11a9a431ddf9c9e8a5c6f47c87a76d101b.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
50a0e27c44685967486053465ad72a11a9a431ddf9c9e8a5c6f47c87a76d101b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
50ca83ea97b149fc0cddcfe79e9ecb2a0d230da4d26f0549f5792060be18aaa1.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
50ca83ea97b149fc0cddcfe79e9ecb2a0d230da4d26f0549f5792060be18aaa1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
5131f70fe8e529308014ee35b2ff10c9.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
5131f70fe8e529308014ee35b2ff10c9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
51a043361bd59e21a64fdb95fb472f63.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
51a043361bd59e21a64fdb95fb472f63.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
51ae5a5c1253ce8fbc9483a1e412a144a27ec6d1dc0b6c8832a36475b8912616.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
51ae5a5c1253ce8fbc9483a1e412a144a27ec6d1dc0b6c8832a36475b8912616.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
51bce03659ae9fd8336540fcecb2bb401b5967b00829fe23554c29dc96ff9462.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
51bce03659ae9fd8336540fcecb2bb401b5967b00829fe23554c29dc96ff9462.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral17
Sample
521cf0805a2515e0ccfc307f4b045897.exe
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
521cf0805a2515e0ccfc307f4b045897.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
5250379192c5ba7c3145ad8bdf7939f44ab827de4db56a950a964fee01ea72f1.exe
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
5250379192c5ba7c3145ad8bdf7939f44ab827de4db56a950a964fee01ea72f1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
5271d48de9aafb06b6371ef7035e993215063cc57fa7253ff06ef6a277da772e.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
5271d48de9aafb06b6371ef7035e993215063cc57fa7253ff06ef6a277da772e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
52af6589107938cd3e3225f3a91e05b8.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
52af6589107938cd3e3225f3a91e05b8.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral25
Sample
52ef63d7213d2cdef68a755faf5b44bd93e1eb92fb0701b37704d243c6d4861f.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
52ef63d7213d2cdef68a755faf5b44bd93e1eb92fb0701b37704d243c6d4861f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
53008e68ab00657702ebd582ff8dd1164b9809330083711a0409ed9dbdc50a9e.exe
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
53008e68ab00657702ebd582ff8dd1164b9809330083711a0409ed9dbdc50a9e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
535aeca70c4f3e3aedbcef76f5870ddd86af9459a907dd3012e3f4e9c8c6dba0.exe
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
535aeca70c4f3e3aedbcef76f5870ddd86af9459a907dd3012e3f4e9c8c6dba0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe
Resource
win10v2004-20250314-en
General
-
Target
5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe
-
Size
131KB
-
MD5
844a5fcb3644af223a45da950e14801b
-
SHA1
928d3c7afa140e9b9e96d4f03ea1d82b4ad37634
-
SHA256
5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e
-
SHA512
7aac0f58ff1bf21cd540ef2acecc5866a0d7056496b932e04593d4c256f498079d810b326695e36c62442545a6793b566c50474c9784bb8436905ce4da70e8c4
-
SSDEEP
3072:4+RlQoN36tGQviFCnMBnMfWl9zmaF9bhYvMY:4jM9zCvMY
Malware Config
Signatures
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Star Client 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe -
Kills process with taskkill 2 IoCs
pid Process 4716 TASKKILL.exe 4064 TASKKILL.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000_Classes\Local Settings 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe Token: SeDebugPrivilege 4064 TASKKILL.exe Token: SeDebugPrivilege 4716 TASKKILL.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3264 OpenWith.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4020 wrote to memory of 4716 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 87 PID 4020 wrote to memory of 4716 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 87 PID 4020 wrote to memory of 4716 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 87 PID 4020 wrote to memory of 4064 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 88 PID 4020 wrote to memory of 4064 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 88 PID 4020 wrote to memory of 4064 4020 5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe"C:\Users\Admin\AppData\Local\Temp\5370f14c685c1c1c6c9a206afc4657f2e57ca67a68580cf6291797f143e6963e.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM wscript.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4716
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM cmd.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4064
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3264