Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    108s
  • max time network
    112s
  • platform
    windows7_x64
  • resource
    win7-20230220-ja
  • resource tags

    arch:x64arch:x86image:win7-20230220-jalocale:ja-jpos:windows7-x64systemwindows
  • submitted
    16/05/2023, 06:00

Errors

Reason
Machine shutdown

General

  • Target

    christmaslistcountdown.zip

  • Size

    54KB

  • MD5

    193195995d084cfca0b8130170d92cf0

  • SHA1

    1d2193cdeeefe2b09701ebd2ee99e8f270987d9d

  • SHA256

    7e9f8d4be691c76607d87e7a2139ad4f849d5bb4c443c82faa0143cefd75ad65

  • SHA512

    f86e133384663ac74af29d5ffaf128b1e7a2d46ed78f2a5356af499981eb8e7cb3da152a642e01a3666574abe919c07febe95874e45386ec3aa250f2efd81a62

  • SSDEEP

    1536:TTZh8DH0pwi06rIUEPDrRwMj3+w7KWBmZ33w7KWBmZ3T:fZh8DH0Z06rInPfRwM7TVIZwVIZD

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 7 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 1 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 32 IoCs
  • Modifies data under HKEY_USERS 9 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\christmaslistcountdown.zip
    1⤵
      PID:1532
    • C:\Windows\ehome\ehshell.exe
      "C:\Windows\ehome\ehshell.exe"
      1⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1832
      • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
        "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /SkipFUE /RemoteOCXLaunch /SuppressDialogs
        2⤵
        • Drops desktop.ini file(s)
        • Enumerates connected drives
        • Modifies registry class
        PID:1408
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x570
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1748
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x0
      1⤵
        PID:1984
      • C:\Windows\system32\csrss.exe
        %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
        1⤵
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:1820
      • C:\Windows\system32\winlogon.exe
        winlogon.exe
        1⤵
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:932
        • C:\Windows\system32\LogonUI.exe
          "LogonUI.exe" /flags:0x0
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1208
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x1
        1⤵
          PID:1856

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Media Player\アート キャッシュ\LocalMLS\{C561A488-1883-4ED7-BC97-0DDB95EECD5C}.jpg

          Filesize

          22KB

          MD5

          35e787587cd3fa8ed360036c9fca3df2

          SHA1

          84c76a25c6fe336f6559c033917a4c327279886d

          SHA256

          98c49a68ee578e10947209ebc17c0ad188ed39c7d0c91a2b505f317259c0c9b2

          SHA512

          aeec3eed5a52670f4cc35935005bb04bb435964a1975e489b8e101adfbce278142fd1a6c475860b7ccb414afe5e24613361a66d92f457937de9b21a7a112e1f9

        • memory/1208-134-0x0000000002780000-0x0000000002781000-memory.dmp

          Filesize

          4KB

        • memory/1408-69-0x0000000000140000-0x0000000000141000-memory.dmp

          Filesize

          4KB

        • memory/1408-132-0x0000000003E60000-0x0000000003E6A000-memory.dmp

          Filesize

          40KB

        • memory/1408-128-0x0000000003E60000-0x0000000003E6A000-memory.dmp

          Filesize

          40KB

        • memory/1832-67-0x00000000022B0000-0x0000000002330000-memory.dmp

          Filesize

          512KB

        • memory/1832-71-0x00000000022B0000-0x0000000002330000-memory.dmp

          Filesize

          512KB

        • memory/1832-62-0x0000000001FB0000-0x0000000001FB1000-memory.dmp

          Filesize

          4KB

        • memory/1832-63-0x000000001C910000-0x000000001C9AE000-memory.dmp

          Filesize

          632KB

        • memory/1832-64-0x000000001D6B0000-0x000000001D768000-memory.dmp

          Filesize

          736KB

        • memory/1832-54-0x00000000022B0000-0x0000000002330000-memory.dmp

          Filesize

          512KB

        • memory/1832-68-0x00000000022B0000-0x0000000002330000-memory.dmp

          Filesize

          512KB

        • memory/1832-60-0x000000001DDA0000-0x000000001E3A8000-memory.dmp

          Filesize

          6.0MB

        • memory/1832-72-0x00000000022B0000-0x0000000002330000-memory.dmp

          Filesize

          512KB

        • memory/1832-61-0x000000001E3B0000-0x000000001E534000-memory.dmp

          Filesize

          1.5MB

        • memory/1832-75-0x0000000001FB0000-0x0000000001FB1000-memory.dmp

          Filesize

          4KB

        • memory/1832-96-0x00000000022B0000-0x0000000002330000-memory.dmp

          Filesize

          512KB

        • memory/1832-59-0x00000000022B0000-0x0000000002330000-memory.dmp

          Filesize

          512KB

        • memory/1832-58-0x00000000022B0000-0x0000000002330000-memory.dmp

          Filesize

          512KB

        • memory/1832-57-0x000000001B4F0000-0x000000001B548000-memory.dmp

          Filesize

          352KB

        • memory/1832-55-0x00000000022B0000-0x0000000002330000-memory.dmp

          Filesize

          512KB

        • memory/1856-135-0x0000000002780000-0x0000000002781000-memory.dmp

          Filesize

          4KB

        • memory/1984-133-0x0000000002990000-0x0000000002991000-memory.dmp

          Filesize

          4KB