Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    52s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18/09/2022, 17:37

General

  • Target

    f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe

  • Size

    906KB

  • MD5

    c9a5b6880ad1e367d7c91633f8065728

  • SHA1

    0cd344dec5a3b32b835a097c2001a8980820346a

  • SHA256

    f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666

  • SHA512

    1953188c4837d08ec8b23c0f0c1ec7df23be0af26a17dadfd8dd7aa4daad1037062b6e6d2f0d8b11e758ca64966a47f6c48a177bb1ef49b219e6d74958d21329

  • SSDEEP

    768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 9 IoCs
  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe
    "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4240
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"
        3⤵
        • Creates scheduled task(s)
        PID:5036
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4368
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"
        3⤵
        • Creates scheduled task(s)
        PID:5028
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1268
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"
        3⤵
        • Creates scheduled task(s)
        PID:5100
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"
      2⤵
        PID:1916
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"
        2⤵
          PID:2892
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"
          2⤵
            PID:4260
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4980
            • C:\Windows\SysWOW64\schtasks.exe
              SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"
              3⤵
              • Creates scheduled task(s)
              PID:1500
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk4473" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"
            2⤵
              PID:708
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk3281" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:3148
              • C:\Windows\SysWOW64\schtasks.exe
                SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk3281" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"
                3⤵
                • Creates scheduled task(s)
                PID:4796
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk9271" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"
              2⤵
                PID:4524
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk4276" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"
                2⤵
                  PID:4264
                • C:\Windows\SysWOW64\cmd.exe
                  "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3568
                  • C:\Windows\SysWOW64\schtasks.exe
                    SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\f03ecc6ce9961a57f31408e513e4cb9f7013611aa8247ae854a141a701dde666.exe"
                    3⤵
                    • Creates scheduled task(s)
                    PID:4272
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 1316
                  2⤵
                  • Program crash
                  PID:4844

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/1268-183-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/1268-187-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/1268-192-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/1916-189-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-162-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-172-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-130-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-131-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-132-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-133-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-168-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-135-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-136-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-137-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-138-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-139-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-140-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-141-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-166-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-143-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-144-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-145-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-146-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-147-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-148-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-149-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-150-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-151-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-152-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-153-0x0000000000700000-0x00000000007B0000-memory.dmp

                Filesize

                704KB

              • memory/2692-154-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-155-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-156-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-157-0x0000000005480000-0x000000000597E000-memory.dmp

                Filesize

                5.0MB

              • memory/2692-158-0x0000000005020000-0x00000000050B2000-memory.dmp

                Filesize

                584KB

              • memory/2692-159-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-160-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-161-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-120-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-163-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-164-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-165-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-142-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-128-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-134-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-169-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-170-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-171-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-167-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-173-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-174-0x0000000004FE0000-0x0000000004FEA000-memory.dmp

                Filesize

                40KB

              • memory/2692-121-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-122-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-123-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-124-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-125-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-126-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-129-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2692-127-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/2892-193-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/4240-184-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/4240-188-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/4240-177-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/4240-180-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/4368-191-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/4368-182-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/4368-186-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB

              • memory/4368-178-0x0000000077890000-0x0000000077A1E000-memory.dmp

                Filesize

                1.6MB