Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10ChrisTitus...rch.sh
ubuntu-18.04-amd64
8ChrisTitus...rch.sh
debian-9-armhf
8ChrisTitus...rch.sh
debian-9-mips
8ChrisTitus...rch.sh
debian-9-mipsel
8ChrisTitus...deb.sh
ubuntu-18.04-amd64
7ChrisTitus...deb.sh
debian-9-armhf
5ChrisTitus...deb.sh
debian-9-mips
5ChrisTitus...deb.sh
debian-9-mipsel
5ChrisTitus...it.ps1
windows7-x64
1ChrisTitus...it.ps1
windows10-2004-x64
1ChrisTitus...on.ps1
windows7-x64
1ChrisTitus...on.ps1
windows10-2004-x64
1ChrisTitus...ds.ps1
windows7-x64
8ChrisTitus...ds.ps1
windows10-2004-x64
8ChrisTitus...os.ps1
windows7-x64
8ChrisTitus...os.ps1
windows10-2004-x64
8ChrisTitus...py.ps1
windows7-x64
1ChrisTitus...py.ps1
windows10-2004-x64
1ChrisTitus...or.cmd
windows7-x64
1ChrisTitus...or.cmd
windows10-2004-x64
1ChrisTitus...at.ps1
windows7-x64
10ChrisTitus...at.ps1
windows10-2004-x64
1Analysis
-
max time kernel
96s -
max time network
87s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28/12/2022, 14:33
Static task
static1
Behavioral task
behavioral1
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/HyperV Tools/arch.sh
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral2
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/HyperV Tools/arch.sh
Resource
debian9-armhf-20221111-en
Behavioral task
behavioral3
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/HyperV Tools/arch.sh
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral4
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/HyperV Tools/arch.sh
Resource
debian9-mipsel-20221111-en
Behavioral task
behavioral5
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/HyperV Tools/deb.sh
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral6
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/HyperV Tools/deb.sh
Resource
debian9-armhf-20221111-en
Behavioral task
behavioral7
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/HyperV Tools/deb.sh
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral8
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/HyperV Tools/deb.sh
Resource
debian9-mipsel-20221111-en
Behavioral task
behavioral9
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/HyperV Tools/vm-gpusplit.ps1
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/HyperV Tools/vm-gpusplit.ps1
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/HyperV Tools/vm-setresolution.ps1
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/HyperV Tools/vm-setresolution.ps1
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/Individual Scripts/block-ads.ps1
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/Individual Scripts/block-ads.ps1
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/Individual Scripts/block-eos.ps1
Resource
win7-20221111-en
Behavioral task
behavioral16
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/Individual Scripts/block-eos.ps1
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/Individual Scripts/robocopy.ps1
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/Individual Scripts/robocopy.ps1
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/Individual Scripts/spotlightimageextractor.cmd
Resource
win7-20221111-en
Behavioral task
behavioral20
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/Individual Scripts/spotlightimageextractor.cmd
Resource
win10v2004-20221111-en
Behavioral task
behavioral21
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/old-win10debloat.ps1
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/old-win10debloat.ps1
Resource
win10v2004-20220812-en
General
-
Target
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/old-win10debloat.ps1
-
Size
139KB
-
MD5
6aae27b2a94495f2ed0929f3233651bd
-
SHA1
d8aa7f36f87974ddf0b084f83889dbaae411d779
-
SHA256
604fe04679b88145c7472ada92307d1d49630a9b456ef891f2f85edb661e80a2
-
SHA512
4d274188605057035c6ab1f3db3df81ce25b1842978d889cb24be44b99c171861757ea7037db1098b828ab54527e81607f9a1ae09a9b5baa5e5dc2503c587552
-
SSDEEP
1536:QzJ8q2sNbHcKARUvCXZB81M7Gx6puQMu2:g8ovCBpuQMu2
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "0" powershell.exe -
Modifies boot configuration data using bcdedit 1 TTPs 1 IoCs
pid Process 1892 bcdedit.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1664 icacls.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe -
Disables Windows logging functionality 2 TTPs
Changes registry settings to disable Windows Event logging.
-
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1652 powershell.exe 1652 powershell.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 1652 powershell.exe Token: SeBackupPrivilege 1700 vssvc.exe Token: SeRestorePrivilege 1700 vssvc.exe Token: SeAuditPrivilege 1700 vssvc.exe Token: SeRestorePrivilege 1352 DrvInst.exe Token: SeRestorePrivilege 1352 DrvInst.exe Token: SeRestorePrivilege 1352 DrvInst.exe Token: SeRestorePrivilege 1352 DrvInst.exe Token: SeRestorePrivilege 1352 DrvInst.exe Token: SeRestorePrivilege 1352 DrvInst.exe Token: SeRestorePrivilege 1352 DrvInst.exe Token: SeLoadDriverPrivilege 1352 DrvInst.exe Token: SeLoadDriverPrivilege 1352 DrvInst.exe Token: SeLoadDriverPrivilege 1352 DrvInst.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1652 wrote to memory of 1892 1652 powershell.exe 34 PID 1652 wrote to memory of 1892 1652 powershell.exe 34 PID 1652 wrote to memory of 1892 1652 powershell.exe 34 PID 1652 wrote to memory of 1664 1652 powershell.exe 35 PID 1652 wrote to memory of 1664 1652 powershell.exe 35 PID 1652 wrote to memory of 1664 1652 powershell.exe 35
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\ChrisTitusTech_debloatWin10_elQueAnda\cttscript\old-win10debloat.ps11⤵
- Modifies visibility of file extensions in Explorer
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\system32\bcdedit.exe"C:\Windows\system32\bcdedit.exe" /set {current} bootmenupolicy Legacy2⤵
- Modifies boot configuration data using bcdedit
PID:1892
-
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" C:\ProgramData\Microsoft\Diagnosis\ETLLogs\AutoLogger /deny SYSTEM:(OI)(CI)F2⤵
- Modifies file permissions
PID:1664
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000580" "0000000000000060"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1352