Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10cfd5d9a4e6...f0.exe
windows10-ltsc_2021-x64
cfd5d9a4e6...f0.exe
windows7-x64
cfd5d9a4e6...f0.exe
windows10-2004-x64
cfd5d9a4e6...f0.exe
windows10-ltsc_2021-x64
cfd5d9a4e6...f0.exe
windows11-21h2-x64
da6f543313...2e.exe
windows11-21h2-x64
6da6f543313...2e.exe
windows7-x64
6da6f543313...2e.exe
windows10-2004-x64
6da6f543313...2e.exe
windows10-ltsc_2021-x64
6da6f543313...2e.exe
windows11-21h2-x64
6e05323d9ca...62.exe
windows11-21h2-x64
3e05323d9ca...62.exe
windows7-x64
1e05323d9ca...62.exe
windows10-2004-x64
3e05323d9ca...62.exe
windows10-ltsc_2021-x64
3e05323d9ca...62.exe
windows11-21h2-x64
3e48bd2f16b...14.exe
windows11-21h2-x64
10e48bd2f16b...14.exe
windows7-x64
10e48bd2f16b...14.exe
windows10-2004-x64
10e48bd2f16b...14.exe
windows10-ltsc_2021-x64
10e48bd2f16b...14.exe
windows11-21h2-x64
10ecfb5c95d0...9d.exe
windows11-21h2-x64
10ecfb5c95d0...9d.exe
windows7-x64
10ecfb5c95d0...9d.exe
windows10-2004-x64
10ecfb5c95d0...9d.exe
windows10-ltsc_2021-x64
10ecfb5c95d0...9d.exe
windows11-21h2-x64
10f08c1c26d3...3f.exe
windows11-21h2-x64
6f08c1c26d3...3f.exe
windows7-x64
6f08c1c26d3...3f.exe
windows10-2004-x64
6f08c1c26d3...3f.exe
windows10-ltsc_2021-x64
6f08c1c26d3...3f.exe
windows11-21h2-x64
6Resubmissions
25/03/2025, 13:12
250325-qfl42aznw9 1025/03/2025, 13:09
250325-qdtq4aznv6 1025/03/2025, 13:05
250325-qbtcjszns3 1025/03/2025, 13:01
250325-p9k86awxat 1025/03/2025, 12:55
250325-p58tnawwe1 1025/03/2025, 12:51
250325-p3txqazmt6 1005/02/2025, 11:16
250205-ndjvsavrdm 1016/07/2024, 08:54
240716-kt64gavakp 10General
-
Target
533.7z
-
Size
2.7MB
-
Sample
250325-qdtq4aznv6
-
MD5
7aded2388d27c5dc782dca435f160857
-
SHA1
744f53fe1f4c7a43a82e1a942eb71f4175da8935
-
SHA256
3730e9cba4a93bc985ef7cd2368ccbf5eccd4724f514b38b20e320e5553dd08d
-
SHA512
518957e9248e65c5231e10c3977d01f7d3b4aa43f08b00c668be8501a88e06d1eaa2a5aaf976ab9caa1d2eacbc7a2029731d5a7054df230aaf93a79294d9083b
-
SSDEEP
49152:BdRLSYLgm9h2iT/1Xd6STMtS07Cqjgfzj8flramouva2dd1ALRNyndSBSJQIQV:BdNtJPDJXd62MY50R+a5X1my8BSJQzV
Static task
static1
Behavioral task
behavioral1
Sample
cfd5d9a4e67799f2428c6071dcc13fcf726f49ec3e706f0302b4592a3a0a08f0.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral2
Sample
cfd5d9a4e67799f2428c6071dcc13fcf726f49ec3e706f0302b4592a3a0a08f0.exe
Resource
win7-20241010-en
Behavioral task
behavioral3
Sample
cfd5d9a4e67799f2428c6071dcc13fcf726f49ec3e706f0302b4592a3a0a08f0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral4
Sample
cfd5d9a4e67799f2428c6071dcc13fcf726f49ec3e706f0302b4592a3a0a08f0.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral5
Sample
cfd5d9a4e67799f2428c6071dcc13fcf726f49ec3e706f0302b4592a3a0a08f0.exe
Resource
win11-20250314-en
Behavioral task
behavioral6
Sample
da6f543313480695aab95a5e685741a8d185fba0600363f74063eb1cda0f672e.exe
Resource
win11-20250314-en
Behavioral task
behavioral7
Sample
da6f543313480695aab95a5e685741a8d185fba0600363f74063eb1cda0f672e.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
da6f543313480695aab95a5e685741a8d185fba0600363f74063eb1cda0f672e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
da6f543313480695aab95a5e685741a8d185fba0600363f74063eb1cda0f672e.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral10
Sample
da6f543313480695aab95a5e685741a8d185fba0600363f74063eb1cda0f672e.exe
Resource
win11-20250314-en
Behavioral task
behavioral11
Sample
e05323d9ca6df47d9add5b2f757ea2490ebd11dfe1b56b82a9e93ba9d814e162.exe
Resource
win11-20250314-en
Behavioral task
behavioral12
Sample
e05323d9ca6df47d9add5b2f757ea2490ebd11dfe1b56b82a9e93ba9d814e162.exe
Resource
win7-20240729-en
Behavioral task
behavioral13
Sample
e05323d9ca6df47d9add5b2f757ea2490ebd11dfe1b56b82a9e93ba9d814e162.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral14
Sample
e05323d9ca6df47d9add5b2f757ea2490ebd11dfe1b56b82a9e93ba9d814e162.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral15
Sample
e05323d9ca6df47d9add5b2f757ea2490ebd11dfe1b56b82a9e93ba9d814e162.exe
Resource
win11-20250314-en
Behavioral task
behavioral16
Sample
e48bd2f16b53a3630f3fca69d0d236d15bc23b08754d980bd29b15841b0fdf14.exe
Resource
win11-20250314-en
Behavioral task
behavioral17
Sample
e48bd2f16b53a3630f3fca69d0d236d15bc23b08754d980bd29b15841b0fdf14.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
e48bd2f16b53a3630f3fca69d0d236d15bc23b08754d980bd29b15841b0fdf14.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
e48bd2f16b53a3630f3fca69d0d236d15bc23b08754d980bd29b15841b0fdf14.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral20
Sample
e48bd2f16b53a3630f3fca69d0d236d15bc23b08754d980bd29b15841b0fdf14.exe
Resource
win11-20250314-en
Behavioral task
behavioral21
Sample
ecfb5c95d0f3d112650ef4047936e8fa5244c21c921f6c7a6963e92abab4949d.exe
Resource
win11-20250313-en
Behavioral task
behavioral22
Sample
ecfb5c95d0f3d112650ef4047936e8fa5244c21c921f6c7a6963e92abab4949d.exe
Resource
win7-20241023-en
Behavioral task
behavioral23
Sample
ecfb5c95d0f3d112650ef4047936e8fa5244c21c921f6c7a6963e92abab4949d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral24
Sample
ecfb5c95d0f3d112650ef4047936e8fa5244c21c921f6c7a6963e92abab4949d.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral25
Sample
ecfb5c95d0f3d112650ef4047936e8fa5244c21c921f6c7a6963e92abab4949d.exe
Resource
win11-20250314-en
Behavioral task
behavioral26
Sample
f08c1c26d375f6881990756e39208017b02af75fca0ebddb72f5e5c14e20363f.exe
Resource
win11-20250313-en
Behavioral task
behavioral27
Sample
f08c1c26d375f6881990756e39208017b02af75fca0ebddb72f5e5c14e20363f.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
f08c1c26d375f6881990756e39208017b02af75fca0ebddb72f5e5c14e20363f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
f08c1c26d375f6881990756e39208017b02af75fca0ebddb72f5e5c14e20363f.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral30
Sample
f08c1c26d375f6881990756e39208017b02af75fca0ebddb72f5e5c14e20363f.exe
Resource
win11-20250313-en
Malware Config
Extracted
blackmatter
1.2
512478c08dada2af19e49808fbda5b0b
- Username:
[email protected] - Password:
120Heisler
- Username:
[email protected] - Password:
Tesla2019
- Username:
[email protected] - Password:
iteam8**
https://paymenthacks.com
http://paymenthacks.com
https://mojobiden.com
http://mojobiden.com
-
attempt_auth
true
-
create_mutex
true
-
encrypt_network_shares
true
-
exfiltrate
true
-
mount_volumes
true
Extracted
C:\Users\Admin\Documents\andrianov.txt
3QpLGGaeFwxtV61p1bBUpTBzPcKdtPQpNA
Extracted
C:\Program Files\README_5442903.txt
http://t5vj34iny72dpdu4.onion
https://content.screencast.com/users/tywlgpwg/folders/Default/media/3c1aeb4c-5386-41df-8eee-346487877522/decryption.avi
Extracted
C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\README_6296936.txt
http://t5vj34iny72dpdu4.onion
https://content.screencast.com/users/tywlgpwg/folders/Default/media/3c1aeb4c-5386-41df-8eee-346487877522/decryption.avi
Extracted
C:\Program Files\README_9993492.txt
http://t5vj34iny72dpdu4.onion
https://content.screencast.com/users/tywlgpwg/folders/Default/media/3c1aeb4c-5386-41df-8eee-346487877522/decryption.avi
Extracted
C:\Program Files\README_2081251.txt
http://t5vj34iny72dpdu4.onion
https://content.screencast.com/users/tywlgpwg/folders/Default/media/3c1aeb4c-5386-41df-8eee-346487877522/decryption.avi
Extracted
C:\Program Files\README_3499930.txt
http://t5vj34iny72dpdu4.onion
https://content.screencast.com/users/tywlgpwg/folders/Default/media/3c1aeb4c-5386-41df-8eee-346487877522/decryption.avi
Targets
-
-
Target
cfd5d9a4e67799f2428c6071dcc13fcf726f49ec3e706f0302b4592a3a0a08f0.exe
-
Size
68KB
-
MD5
5de719d56f38039bb9c915d689a5a4da
-
SHA1
f46d4ed9851b0980d5a9139defd456a58c6aaaaa
-
SHA256
cfd5d9a4e67799f2428c6071dcc13fcf726f49ec3e706f0302b4592a3a0a08f0
-
SHA512
48756ac79f23cb26620ff135fe93a87768cf9a02b941ade68e3e27981adc8431f76d58aa057525de88742c7ec900b4ea02c52abb3889cd176a3ae14e956dc678
-
SSDEEP
768:oY53/zkfCQxmGgV5YlpJ6RIDWeRdppvO/9rjca9nsUKhK:B/z5Qxd6m3WIw9MhK
Score1/10 -
-
-
Target
da6f543313480695aab95a5e685741a8d185fba0600363f74063eb1cda0f672e.exe
-
Size
117KB
-
MD5
bca754bd6e7b4c7b23e17d0244e425d0
-
SHA1
257cef8651509e1e33d95b07d5a7b07fcf1f6f4f
-
SHA256
da6f543313480695aab95a5e685741a8d185fba0600363f74063eb1cda0f672e
-
SHA512
02cab68478ad9b3c14336d2178a642d27b7ca3af6beb9ecfbddd8f6c5641164d0728df9821e5c59385831cb63178e7837670f779b81a66e079ada5cb66eac7d4
-
SSDEEP
3072:xd5BJOoMqqDL2/OvvdHv3uqz3++OAYWgO:xdJODqqDL6gvdHveqi+GWgO
Score6/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
e05323d9ca6df47d9add5b2f757ea2490ebd11dfe1b56b82a9e93ba9d814e162.exe
-
Size
195KB
-
MD5
ed9150c61fd66757f5dc1357c1384617
-
SHA1
220466f711e96f202c107d4ed05ffe837c1099a3
-
SHA256
e05323d9ca6df47d9add5b2f757ea2490ebd11dfe1b56b82a9e93ba9d814e162
-
SHA512
4690335470be0512010db4b4ffde42043602fdff9587ecc930fbbcec694bf934e7c140ccdec4e8c7aa3d1aff97940ee4c75ba27a71ee29a3c3fc5cf873154fd4
-
SSDEEP
3072:Jquj3THroBGHnTKslI0rjxHTgLcbE/6i6e1eXC/T9CJg29LV4q9/:B3THkBGHTKLMtHTd4/UbXUT9X2rP9
Score3/10 -
-
-
Target
e48bd2f16b53a3630f3fca69d0d236d15bc23b08754d980bd29b15841b0fdf14.exe
-
Size
137KB
-
MD5
9b02b542834573f9502ca83719a73a01
-
SHA1
f3bc7cf16eec977772455f3fce87fed505fb18e3
-
SHA256
e48bd2f16b53a3630f3fca69d0d236d15bc23b08754d980bd29b15841b0fdf14
-
SHA512
290c7a5bfc921817d1803ddbe8dd07210301082498945bcabdb597368f92c6fc1050cefec514e6d250571cb4afd6427d8e4ab7cd15d7a46a44cb088cd4d1b031
-
SSDEEP
3072:Eoy7AHYqr9ACDYVbu4sijUtSWnFA22WnVaxs2gzx+IjBz2:0mr9AHVycjUgWnFAGms2gzoch
-
Chaos Ransomware
-
Chaos family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (199) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-
-
-
Target
ecfb5c95d0f3d112650ef4047936e8fa5244c21c921f6c7a6963e92abab4949d.exe
-
Size
52KB
-
MD5
ba9210de03de945901f02792f7994871
-
SHA1
20c4569cbb6f2650b02f6a5257faa8a8dfb298bd
-
SHA256
ecfb5c95d0f3d112650ef4047936e8fa5244c21c921f6c7a6963e92abab4949d
-
SHA512
277d26eea627b3da26664aaa4f72a7b79cd50311e45c59333563b4f58b76e6562cbaa1d55127c69d0830864721efa890fa824e1be381cca5e84bddc98f2b44d0
-
SSDEEP
1536:EJJRZQJes5b0k5bbyu6hXOKJrkH6sNNW:oJRa4kLmNVOKJIasNE
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
-
-
Target
f08c1c26d375f6881990756e39208017b02af75fca0ebddb72f5e5c14e20363f.exe
-
Size
70KB
-
MD5
4784fae86332064057d0ab8b73a1b67e
-
SHA1
f38b61a64119b8b1c2562ca8a6416a2b0c7528b8
-
SHA256
f08c1c26d375f6881990756e39208017b02af75fca0ebddb72f5e5c14e20363f
-
SHA512
62312d637d0feda0f565841274ecff5f07cfada08d7a899d68deb314f52d9d5e64733ba6a8fae7b979625b0302e9f270419cf1801239cf597c5af19b47aaf686
-
SSDEEP
1536:1ZZZZZZZZZZZZpXzzzzzzzzzzzzADypczUk+lkZJngWMqqU+2bbbAV2/S2OvvdZl:kd5BJHMqqDL2/Ovvdr
Score6/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1