Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
61s -
max time network
76s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
22/03/2025, 13:57
Behavioral task
behavioral1
Sample
Proton.exe
Resource
win7-20241010-en
Errors
General
-
Target
Proton.exe
-
Size
831KB
-
MD5
34e8bec2eff81b0451a68e3fc7562fb8
-
SHA1
91b8aa5907020bad02fcaed731f53e9e433e0f4d
-
SHA256
dd31e310c502f14a8ca479ee8723dcb8ded8ce9caf6fbeaa435fc966bd1458a4
-
SHA512
0a6d23997a9d29f40907097c28afa62162cc03369b8a8c4c84e124d131706a8dc19b62c0cc9efb2b6deccbcd72d4e034d9b893d538e5060d0cf7b43556bf4b05
-
SSDEEP
24576:uZsS44StKHIPbcNK0KKfaOwI55l2SLaB4/:uZsSIKEgKKHwCBe
Malware Config
Extracted
quasar
1.5.0
Office04
fall-alberta.gl.at.ply.gg:48316
f3374a4e-4175-4db9-a8d8-303de2184767
-
encryption_key
669A421372DEF816BCFAA19491270BD72DCE71F1
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Proton VPN
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/memory/2584-1-0x00000213CF420000-0x00000213CF4F6000-memory.dmp family_quasar behavioral2/memory/2584-2-0x00000213CF8B0000-0x00000213CF8CA000-memory.dmp family_quasar -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1208 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2584 Proton.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2584 Proton.exe Token: SeDebugPrivilege 5308 taskmgr.exe Token: SeSystemProfilePrivilege 5308 taskmgr.exe Token: SeCreateGlobalPrivilege 5308 taskmgr.exe Token: 33 5308 taskmgr.exe Token: SeIncBasePriorityPrivilege 5308 taskmgr.exe Token: SeShutdownPrivilege 2584 Proton.exe -
Suspicious use of FindShellTrayWindow 47 IoCs
pid Process 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe -
Suspicious use of SendNotifyMessage 47 IoCs
pid Process 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe 5308 taskmgr.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2584 wrote to memory of 1208 2584 Proton.exe 87 PID 2584 wrote to memory of 1208 2584 Proton.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Proton.exe"C:\Users\Admin\AppData\Local\Temp\Proton.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Proton VPN" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:1208
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5308