Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    47s
  • max time network
    57s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/10/2022, 19:08

General

  • Target

    Cleaner.exe

  • Size

    716KB

  • MD5

    e0c2bf1961a451ce4668800d460e4d99

  • SHA1

    f7b310c9c887cc19bda72224fbe634e7b41e560b

  • SHA256

    ce6ff5a8f86ff4ddd08cfcdf94653f9d649d5508724b8abcb7ef84067ec3535c

  • SHA512

    d253927ecbd81bf8113cb97cf5d992ba576fdf96a093abb318b88dcd6ed5e6e2081c19104b2b6b064e77062abb43779383f3efcff4ddf1017fe9267d0545c3cb

  • SSDEEP

    12288:jNUm1sUCrLN8qJfgai+V+VCp641oHu2/hSMXlnphqYt:hEU0LGGPihCpb1b2/hSMXlph

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Stops running service(s) 3 TTPs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • Kills process with taskkill 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Cleaner.exe
    "C:\Users\Admin\AppData\Local\Temp\Cleaner.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2612
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /f /im steam.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:220
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im steam.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:320
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /f /im steamservice.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4468
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im steamservice.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3740
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /f /im steamwebhelper.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3808
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im steamwebhelper.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4708
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /f /im geegee.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4716
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im geegee.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1872
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /f /im RUST.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3936
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im RUST.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4260
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /f /im discord.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:612
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /f /im Origin.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3664
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im Origin.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:808
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /f /im EasyAntiCheat.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2148
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im EasyAntiCheat.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2124
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /f /im Origin.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3612
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im Origin.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4436
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /f /im igoproxy64.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4240
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im igoproxy64.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4964
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /f /im igoproxy.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5016
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im igoproxy.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:376
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /f /im OriginCrashReporter.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1236
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im OriginCrashReporter.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4584
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /f /im OriginWebHelper.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1936
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im OriginWebHelper.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1484
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /f /im Origin.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4380
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im Origin.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4764
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c sc stop EasyAntiCheat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:984
      • C:\Windows\system32\sc.exe
        sc stop EasyAntiCheat
        3⤵
        • Launches sc.exe
        PID:5012
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /f /im EpicGamesLauncher.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2232
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im EpicGamesLauncher.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1472
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /f /im FortniteClient-Win64-Shipping.exe
      2⤵
        PID:1572
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im FortniteClient-Win64-Shipping.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4612
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /f /im OneDrive.exe
        2⤵
          PID:5008
          • C:\Windows\system32\taskkill.exe
            taskkill /f /im OneDrive.exe
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4440
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c netsh winsock reset
          2⤵
            PID:5020
            • C:\Windows\system32\netsh.exe
              netsh winsock reset
              3⤵
                PID:1812
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c netsh winsock reset catalog
              2⤵
                PID:1128
                • C:\Windows\system32\netsh.exe
                  netsh winsock reset catalog
                  3⤵
                    PID:1724
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c netsh int ip reset
                  2⤵
                    PID:4256
                    • C:\Windows\system32\netsh.exe
                      netsh int ip reset
                      3⤵
                        PID:1308
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c netsh advfirewall reset
                      2⤵
                        PID:4992
                        • C:\Windows\system32\netsh.exe
                          netsh advfirewall reset
                          3⤵
                          • Modifies Windows Firewall
                          PID:4940
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c netsh int reset all
                        2⤵
                          PID:2316
                          • C:\Windows\system32\netsh.exe
                            netsh int reset all
                            3⤵
                              PID:4760
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c netsh int ipv4 reset
                            2⤵
                              PID:1712
                              • C:\Windows\system32\netsh.exe
                                netsh int ipv4 reset
                                3⤵
                                  PID:3456
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c netsh int ipv6 reset
                                2⤵
                                  PID:2336
                                  • C:\Windows\system32\netsh.exe
                                    netsh int ipv6 reset
                                    3⤵
                                      PID:2996
                                  • C:\Windows\system32\WerFault.exe
                                    C:\Windows\system32\WerFault.exe -u -p 2612 -s 236
                                    2⤵
                                    • Program crash
                                    PID:740
                                • C:\Windows\system32\taskkill.exe
                                  taskkill /f /im discord.exe
                                  1⤵
                                  • Kills process with taskkill
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2496
                                • C:\Windows\system32\WerFault.exe
                                  C:\Windows\system32\WerFault.exe -pss -s 432 -p 2612 -ip 2612
                                  1⤵
                                    PID:3140

                                  Network

                                  MITRE ATT&CK Enterprise v6

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads