Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
106b5428dd82...c1.exe
windows7-x64
106b5428dd82...c1.exe
windows10-2004-x64
106b6755ca1b...7b.exe
windows7-x64
106b6755ca1b...7b.exe
windows10-2004-x64
106b96951c0d...e8.exe
windows7-x64
106b96951c0d...e8.exe
windows10-2004-x64
106b990bdc11...15.exe
windows7-x64
36b990bdc11...15.exe
windows10-2004-x64
36bcf962809...67.exe
windows7-x64
106bcf962809...67.exe
windows10-2004-x64
106bf4d95191...d6.exe
windows7-x64
106bf4d95191...d6.exe
windows10-2004-x64
106c17f80a5a...33.exe
windows7-x64
106c17f80a5a...33.exe
windows10-2004-x64
76c25a9ad3a...ff.exe
windows7-x64
106c25a9ad3a...ff.exe
windows10-2004-x64
106c46d70788...18.exe
windows7-x64
106c46d70788...18.exe
windows10-2004-x64
106c5038f87e...dc.exe
windows7-x64
106c5038f87e...dc.exe
windows10-2004-x64
106c53fda3cb...65.exe
windows7-x64
106c53fda3cb...65.exe
windows10-2004-x64
106c79c2f450...b4.exe
windows7-x64
106c79c2f450...b4.exe
windows10-2004-x64
106ca3cb8c05...9a.exe
windows7-x64
106ca3cb8c05...9a.exe
windows10-2004-x64
106cb59f599a...bf.exe
windows7-x64
106cb59f599a...bf.exe
windows10-2004-x64
106ccb172e66...df.exe
windows7-x64
106ccb172e66...df.exe
windows10-2004-x64
106cdf89e8d2...1d.exe
windows7-x64
106cdf89e8d2...1d.exe
windows10-2004-x64
10Analysis
-
max time kernel
107s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 06:12
Behavioral task
behavioral1
Sample
6b5428dd828c35d7783578dcbf39f9c1.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6b5428dd828c35d7783578dcbf39f9c1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
6b6755ca1bb4486fb7501572a580e96343181ff957605ea150f7d94beabef27b.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
6b6755ca1bb4486fb7501572a580e96343181ff957605ea150f7d94beabef27b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
6b96951c0d2a6e97c54c030298a7eee8.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
6b96951c0d2a6e97c54c030298a7eee8.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
6b990bdc11976a009c1a3ccda05849bebff003ab1a3c6096c0603249d7374c15.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
6b990bdc11976a009c1a3ccda05849bebff003ab1a3c6096c0603249d7374c15.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
6bcf96280909b8139cf7fb517241d0b12c45f7fa2f1681cb7bc9caac33ef5867.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
6bcf96280909b8139cf7fb517241d0b12c45f7fa2f1681cb7bc9caac33ef5867.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral11
Sample
6bf4d95191becc3a5f28dc233d702cd6.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
6bf4d95191becc3a5f28dc233d702cd6.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
6c17f80a5a74741689d6145a1e7dca2a7ba13e52fab6e37e2c3240bb47ac7133.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
6c17f80a5a74741689d6145a1e7dca2a7ba13e52fab6e37e2c3240bb47ac7133.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
6c25a9ad3a7149deae7bb50429c9fefe20b60a59914bd7b63174796b640adfff.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
6c25a9ad3a7149deae7bb50429c9fefe20b60a59914bd7b63174796b640adfff.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
6c46d70788b60ff0ba7ea4c5f0549f18.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
6c46d70788b60ff0ba7ea4c5f0549f18.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
6c5038f87e96a5799d1221ec35527d35fb454d450bff95dc0bf5b0b813183edc.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
6c5038f87e96a5799d1221ec35527d35fb454d450bff95dc0bf5b0b813183edc.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral21
Sample
6c53fda3cb5c0cb93d53eff2fa6433a8679aedcdccf5b8487f4294e897bd2365.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
6c53fda3cb5c0cb93d53eff2fa6433a8679aedcdccf5b8487f4294e897bd2365.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
6c79c2f450da5e97631c33ddce170bb4.exe
Resource
win7-20250207-en
Behavioral task
behavioral24
Sample
6c79c2f450da5e97631c33ddce170bb4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
6ca3cb8c056b4e81c7a8a885e150b7efb068a36f38a023cb6e07f5640a62ad9a.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
6ca3cb8c056b4e81c7a8a885e150b7efb068a36f38a023cb6e07f5640a62ad9a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
6cb59f599a4d87e0a3e34f264f3d87e410ab436afadcd02e1fe516ac8e4534bf.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
6cb59f599a4d87e0a3e34f264f3d87e410ab436afadcd02e1fe516ac8e4534bf.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
6ccb172e6696a44a0b3a581df57d89df.exe
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
6ccb172e6696a44a0b3a581df57d89df.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
6cdf89e8d2c2fb9a5db53881f501181d.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
6cdf89e8d2c2fb9a5db53881f501181d.exe
Resource
win10v2004-20250314-en
General
-
Target
6bcf96280909b8139cf7fb517241d0b12c45f7fa2f1681cb7bc9caac33ef5867.exe
-
Size
229KB
-
MD5
c43fa6e8e418363f5b9bd2bac94e03ac
-
SHA1
4e557326d845f150c37e71d23f2e816942f6f53c
-
SHA256
6bcf96280909b8139cf7fb517241d0b12c45f7fa2f1681cb7bc9caac33ef5867
-
SHA512
1535626a7d98e33546f04623c7a405ded146a273422934d47c15f6862dc988212776b27270cf25434704dbf31a22dea5049e0b735b1861645e54510aa1f103ac
-
SSDEEP
6144:lloZM+rIkd8g+EtXHkv/iD4qCslEKtFucr20VJgqAb8e1mND8i:noZtL+EP8qCslEKtFucr20VJgDYx
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral10/memory/3460-1-0x0000020D3E9E0000-0x0000020D3EA20000-memory.dmp family_umbral -
Umbral family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ip-api.com -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 3460 6bcf96280909b8139cf7fb517241d0b12c45f7fa2f1681cb7bc9caac33ef5867.exe Token: SeIncreaseQuotaPrivilege 4064 wmic.exe Token: SeSecurityPrivilege 4064 wmic.exe Token: SeTakeOwnershipPrivilege 4064 wmic.exe Token: SeLoadDriverPrivilege 4064 wmic.exe Token: SeSystemProfilePrivilege 4064 wmic.exe Token: SeSystemtimePrivilege 4064 wmic.exe Token: SeProfSingleProcessPrivilege 4064 wmic.exe Token: SeIncBasePriorityPrivilege 4064 wmic.exe Token: SeCreatePagefilePrivilege 4064 wmic.exe Token: SeBackupPrivilege 4064 wmic.exe Token: SeRestorePrivilege 4064 wmic.exe Token: SeShutdownPrivilege 4064 wmic.exe Token: SeDebugPrivilege 4064 wmic.exe Token: SeSystemEnvironmentPrivilege 4064 wmic.exe Token: SeRemoteShutdownPrivilege 4064 wmic.exe Token: SeUndockPrivilege 4064 wmic.exe Token: SeManageVolumePrivilege 4064 wmic.exe Token: 33 4064 wmic.exe Token: 34 4064 wmic.exe Token: 35 4064 wmic.exe Token: 36 4064 wmic.exe Token: SeIncreaseQuotaPrivilege 4064 wmic.exe Token: SeSecurityPrivilege 4064 wmic.exe Token: SeTakeOwnershipPrivilege 4064 wmic.exe Token: SeLoadDriverPrivilege 4064 wmic.exe Token: SeSystemProfilePrivilege 4064 wmic.exe Token: SeSystemtimePrivilege 4064 wmic.exe Token: SeProfSingleProcessPrivilege 4064 wmic.exe Token: SeIncBasePriorityPrivilege 4064 wmic.exe Token: SeCreatePagefilePrivilege 4064 wmic.exe Token: SeBackupPrivilege 4064 wmic.exe Token: SeRestorePrivilege 4064 wmic.exe Token: SeShutdownPrivilege 4064 wmic.exe Token: SeDebugPrivilege 4064 wmic.exe Token: SeSystemEnvironmentPrivilege 4064 wmic.exe Token: SeRemoteShutdownPrivilege 4064 wmic.exe Token: SeUndockPrivilege 4064 wmic.exe Token: SeManageVolumePrivilege 4064 wmic.exe Token: 33 4064 wmic.exe Token: 34 4064 wmic.exe Token: 35 4064 wmic.exe Token: 36 4064 wmic.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3460 wrote to memory of 4064 3460 6bcf96280909b8139cf7fb517241d0b12c45f7fa2f1681cb7bc9caac33ef5867.exe 88 PID 3460 wrote to memory of 4064 3460 6bcf96280909b8139cf7fb517241d0b12c45f7fa2f1681cb7bc9caac33ef5867.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bcf96280909b8139cf7fb517241d0b12c45f7fa2f1681cb7bc9caac33ef5867.exe"C:\Users\Admin\AppData\Local\Temp\6bcf96280909b8139cf7fb517241d0b12c45f7fa2f1681cb7bc9caac33ef5867.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4064
-