Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
11/03/2023, 23:30
Behavioral task
behavioral1
Sample
94b9a662f8f42a25d8546d8e92da803e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
94b9a662f8f42a25d8546d8e92da803e.exe
Resource
win10v2004-20230220-en
General
-
Target
94b9a662f8f42a25d8546d8e92da803e.exe
-
Size
164KB
-
MD5
94b9a662f8f42a25d8546d8e92da803e
-
SHA1
030940062e7def70b69b4c1c93fc4eaa44449f0f
-
SHA256
e02f76cba9aa4e7c1c8de333af719bcf18e2dfb216b7f363b00e64bfde79616b
-
SHA512
185fbc5da3ea6df42e7e26966acbe904d922114e5d32769e237d8d562d7a08ffbe20d794ddc42a4cbf88948d77818eb166641bc7235ecd30775e1c6f8549a65b
-
SSDEEP
3072:FEwE/wam2GFzsw2PTWEc0FIEb9ik5E4I3:FETfLF5FbH3I3
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe Client.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe Client.exe -
Executes dropped EXE 3 IoCs
pid Process 1972 Client.exe 864 Client.exe 892 Client.exe -
Loads dropped DLL 1 IoCs
pid Process 1700 94b9a662f8f42a25d8546d8e92da803e.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Client.exe\" .." Client.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Client.exe\" .." Client.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 520 schtasks.exe 1508 schtasks.exe 788 schtasks.exe 1712 schtasks.exe 1280 schtasks.exe 1260 schtasks.exe 1528 schtasks.exe 1080 schtasks.exe 1036 schtasks.exe 932 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe 1700 94b9a662f8f42a25d8546d8e92da803e.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 1700 94b9a662f8f42a25d8546d8e92da803e.exe Token: SeDebugPrivilege 1752 94b9a662f8f42a25d8546d8e92da803e.exe Token: SeDebugPrivilege 1972 Client.exe Token: 33 1972 Client.exe Token: SeIncBasePriorityPrivilege 1972 Client.exe Token: 33 1972 Client.exe Token: SeIncBasePriorityPrivilege 1972 Client.exe Token: 33 1972 Client.exe Token: SeIncBasePriorityPrivilege 1972 Client.exe Token: 33 1972 Client.exe Token: SeIncBasePriorityPrivilege 1972 Client.exe Token: SeDebugPrivilege 864 Client.exe Token: 33 1972 Client.exe Token: SeIncBasePriorityPrivilege 1972 Client.exe Token: 33 1972 Client.exe Token: SeIncBasePriorityPrivilege 1972 Client.exe Token: 33 1972 Client.exe Token: SeIncBasePriorityPrivilege 1972 Client.exe Token: 33 1972 Client.exe Token: SeIncBasePriorityPrivilege 1972 Client.exe Token: 33 1972 Client.exe Token: SeIncBasePriorityPrivilege 1972 Client.exe Token: SeDebugPrivilege 892 Client.exe Token: 33 1972 Client.exe Token: SeIncBasePriorityPrivilege 1972 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1304 1700 94b9a662f8f42a25d8546d8e92da803e.exe 28 PID 1700 wrote to memory of 1304 1700 94b9a662f8f42a25d8546d8e92da803e.exe 28 PID 1700 wrote to memory of 1304 1700 94b9a662f8f42a25d8546d8e92da803e.exe 28 PID 1700 wrote to memory of 1304 1700 94b9a662f8f42a25d8546d8e92da803e.exe 28 PID 1700 wrote to memory of 1260 1700 94b9a662f8f42a25d8546d8e92da803e.exe 30 PID 1700 wrote to memory of 1260 1700 94b9a662f8f42a25d8546d8e92da803e.exe 30 PID 1700 wrote to memory of 1260 1700 94b9a662f8f42a25d8546d8e92da803e.exe 30 PID 1700 wrote to memory of 1260 1700 94b9a662f8f42a25d8546d8e92da803e.exe 30 PID 1700 wrote to memory of 1708 1700 94b9a662f8f42a25d8546d8e92da803e.exe 31 PID 1700 wrote to memory of 1708 1700 94b9a662f8f42a25d8546d8e92da803e.exe 31 PID 1700 wrote to memory of 1708 1700 94b9a662f8f42a25d8546d8e92da803e.exe 31 PID 1700 wrote to memory of 1708 1700 94b9a662f8f42a25d8546d8e92da803e.exe 31 PID 1700 wrote to memory of 520 1700 94b9a662f8f42a25d8546d8e92da803e.exe 34 PID 1700 wrote to memory of 520 1700 94b9a662f8f42a25d8546d8e92da803e.exe 34 PID 1700 wrote to memory of 520 1700 94b9a662f8f42a25d8546d8e92da803e.exe 34 PID 1700 wrote to memory of 520 1700 94b9a662f8f42a25d8546d8e92da803e.exe 34 PID 676 wrote to memory of 1752 676 taskeng.exe 37 PID 676 wrote to memory of 1752 676 taskeng.exe 37 PID 676 wrote to memory of 1752 676 taskeng.exe 37 PID 676 wrote to memory of 1752 676 taskeng.exe 37 PID 1752 wrote to memory of 1512 1752 94b9a662f8f42a25d8546d8e92da803e.exe 38 PID 1752 wrote to memory of 1512 1752 94b9a662f8f42a25d8546d8e92da803e.exe 38 PID 1752 wrote to memory of 1512 1752 94b9a662f8f42a25d8546d8e92da803e.exe 38 PID 1752 wrote to memory of 1512 1752 94b9a662f8f42a25d8546d8e92da803e.exe 38 PID 1752 wrote to memory of 1508 1752 94b9a662f8f42a25d8546d8e92da803e.exe 40 PID 1752 wrote to memory of 1508 1752 94b9a662f8f42a25d8546d8e92da803e.exe 40 PID 1752 wrote to memory of 1508 1752 94b9a662f8f42a25d8546d8e92da803e.exe 40 PID 1752 wrote to memory of 1508 1752 94b9a662f8f42a25d8546d8e92da803e.exe 40 PID 1752 wrote to memory of 1620 1752 94b9a662f8f42a25d8546d8e92da803e.exe 42 PID 1752 wrote to memory of 1620 1752 94b9a662f8f42a25d8546d8e92da803e.exe 42 PID 1752 wrote to memory of 1620 1752 94b9a662f8f42a25d8546d8e92da803e.exe 42 PID 1752 wrote to memory of 1620 1752 94b9a662f8f42a25d8546d8e92da803e.exe 42 PID 1752 wrote to memory of 1528 1752 94b9a662f8f42a25d8546d8e92da803e.exe 44 PID 1752 wrote to memory of 1528 1752 94b9a662f8f42a25d8546d8e92da803e.exe 44 PID 1752 wrote to memory of 1528 1752 94b9a662f8f42a25d8546d8e92da803e.exe 44 PID 1752 wrote to memory of 1528 1752 94b9a662f8f42a25d8546d8e92da803e.exe 44 PID 1700 wrote to memory of 1972 1700 94b9a662f8f42a25d8546d8e92da803e.exe 46 PID 1700 wrote to memory of 1972 1700 94b9a662f8f42a25d8546d8e92da803e.exe 46 PID 1700 wrote to memory of 1972 1700 94b9a662f8f42a25d8546d8e92da803e.exe 46 PID 1700 wrote to memory of 1972 1700 94b9a662f8f42a25d8546d8e92da803e.exe 46 PID 1972 wrote to memory of 1596 1972 Client.exe 47 PID 1972 wrote to memory of 1596 1972 Client.exe 47 PID 1972 wrote to memory of 1596 1972 Client.exe 47 PID 1972 wrote to memory of 1596 1972 Client.exe 47 PID 1972 wrote to memory of 1080 1972 Client.exe 49 PID 1972 wrote to memory of 1080 1972 Client.exe 49 PID 1972 wrote to memory of 1080 1972 Client.exe 49 PID 1972 wrote to memory of 1080 1972 Client.exe 49 PID 1972 wrote to memory of 1764 1972 Client.exe 51 PID 1972 wrote to memory of 1764 1972 Client.exe 51 PID 1972 wrote to memory of 1764 1972 Client.exe 51 PID 1972 wrote to memory of 1764 1972 Client.exe 51 PID 1972 wrote to memory of 788 1972 Client.exe 53 PID 1972 wrote to memory of 788 1972 Client.exe 53 PID 1972 wrote to memory of 788 1972 Client.exe 53 PID 1972 wrote to memory of 788 1972 Client.exe 53 PID 676 wrote to memory of 864 676 taskeng.exe 56 PID 676 wrote to memory of 864 676 taskeng.exe 56 PID 676 wrote to memory of 864 676 taskeng.exe 56 PID 676 wrote to memory of 864 676 taskeng.exe 56 PID 864 wrote to memory of 752 864 Client.exe 57 PID 864 wrote to memory of 752 864 Client.exe 57 PID 864 wrote to memory of 752 864 Client.exe 57 PID 864 wrote to memory of 752 864 Client.exe 57
Processes
-
C:\Users\Admin\AppData\Local\Temp\94b9a662f8f42a25d8546d8e92da803e.exe"C:\Users\Admin\AppData\Local\Temp\94b9a662f8f42a25d8546d8e92da803e.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYANP /F2⤵PID:1304
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Local\Temp\94b9a662f8f42a25d8546d8e92da803e.exe" /sc minute /mo 52⤵
- Creates scheduled task(s)
PID:1260
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F2⤵PID:1708
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\94b9a662f8f42a25d8546d8e92da803e.exe" /sc minute /mo 12⤵
- Creates scheduled task(s)
PID:520
-
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYANP /F3⤵PID:1596
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 53⤵
- Creates scheduled task(s)
PID:1080
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F3⤵PID:1764
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 13⤵
- Creates scheduled task(s)
PID:788
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {9DFD19EC-F7D3-418E-98F9-DF1BB8CA108A} S-1-5-21-3499517378-2376672570-1134980332-1000:MLXLFKOI\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Users\Admin\AppData\Local\Temp\94b9a662f8f42a25d8546d8e92da803e.exeC:\Users\Admin\AppData\Local\Temp\94b9a662f8f42a25d8546d8e92da803e.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYANP /F3⤵PID:1512
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Local\Temp\94b9a662f8f42a25d8546d8e92da803e.exe" /sc minute /mo 53⤵
- Creates scheduled task(s)
PID:1508
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F3⤵PID:1620
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\94b9a662f8f42a25d8546d8e92da803e.exe" /sc minute /mo 13⤵
- Creates scheduled task(s)
PID:1528
-
-
-
C:\Users\Admin\AppData\Local\Temp\Client.exeC:\Users\Admin\AppData\Local\Temp\Client.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYANP /F3⤵PID:752
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 53⤵
- Creates scheduled task(s)
PID:1036
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F3⤵PID:920
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 13⤵
- Creates scheduled task(s)
PID:1712
-
-
-
C:\Users\Admin\AppData\Local\Temp\Client.exeC:\Users\Admin\AppData\Local\Temp\Client.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:892 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYANP /F3⤵PID:1568
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 53⤵
- Creates scheduled task(s)
PID:932
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F3⤵PID:1792
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 13⤵
- Creates scheduled task(s)
PID:1280
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD594b9a662f8f42a25d8546d8e92da803e
SHA1030940062e7def70b69b4c1c93fc4eaa44449f0f
SHA256e02f76cba9aa4e7c1c8de333af719bcf18e2dfb216b7f363b00e64bfde79616b
SHA512185fbc5da3ea6df42e7e26966acbe904d922114e5d32769e237d8d562d7a08ffbe20d794ddc42a4cbf88948d77818eb166641bc7235ecd30775e1c6f8549a65b
-
Filesize
164KB
MD594b9a662f8f42a25d8546d8e92da803e
SHA1030940062e7def70b69b4c1c93fc4eaa44449f0f
SHA256e02f76cba9aa4e7c1c8de333af719bcf18e2dfb216b7f363b00e64bfde79616b
SHA512185fbc5da3ea6df42e7e26966acbe904d922114e5d32769e237d8d562d7a08ffbe20d794ddc42a4cbf88948d77818eb166641bc7235ecd30775e1c6f8549a65b
-
Filesize
164KB
MD594b9a662f8f42a25d8546d8e92da803e
SHA1030940062e7def70b69b4c1c93fc4eaa44449f0f
SHA256e02f76cba9aa4e7c1c8de333af719bcf18e2dfb216b7f363b00e64bfde79616b
SHA512185fbc5da3ea6df42e7e26966acbe904d922114e5d32769e237d8d562d7a08ffbe20d794ddc42a4cbf88948d77818eb166641bc7235ecd30775e1c6f8549a65b
-
Filesize
164KB
MD594b9a662f8f42a25d8546d8e92da803e
SHA1030940062e7def70b69b4c1c93fc4eaa44449f0f
SHA256e02f76cba9aa4e7c1c8de333af719bcf18e2dfb216b7f363b00e64bfde79616b
SHA512185fbc5da3ea6df42e7e26966acbe904d922114e5d32769e237d8d562d7a08ffbe20d794ddc42a4cbf88948d77818eb166641bc7235ecd30775e1c6f8549a65b
-
Filesize
164KB
MD594b9a662f8f42a25d8546d8e92da803e
SHA1030940062e7def70b69b4c1c93fc4eaa44449f0f
SHA256e02f76cba9aa4e7c1c8de333af719bcf18e2dfb216b7f363b00e64bfde79616b
SHA512185fbc5da3ea6df42e7e26966acbe904d922114e5d32769e237d8d562d7a08ffbe20d794ddc42a4cbf88948d77818eb166641bc7235ecd30775e1c6f8549a65b
-
Filesize
164KB
MD594b9a662f8f42a25d8546d8e92da803e
SHA1030940062e7def70b69b4c1c93fc4eaa44449f0f
SHA256e02f76cba9aa4e7c1c8de333af719bcf18e2dfb216b7f363b00e64bfde79616b
SHA512185fbc5da3ea6df42e7e26966acbe904d922114e5d32769e237d8d562d7a08ffbe20d794ddc42a4cbf88948d77818eb166641bc7235ecd30775e1c6f8549a65b