Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    24/05/2023, 13:30

General

  • Target

    49037.exe

  • Size

    6.7MB

  • MD5

    b1f6556ce2648139c4faea68dd226520

  • SHA1

    6bd326258e1536aa4a3a7a8bae18e8de5af69f9f

  • SHA256

    397fbdb4b1a71350d390873d70ff32ff992ed73ce699b49794518fa93dfd5f20

  • SHA512

    53428e7145472c4171d8fead376721cdf3b207ef27093b095fa3054863436b79a4d497e2a498c7e4e9af6f55edf24341e9d572c9f96ace20c2ee90c5c6db097f

  • SSDEEP

    196608:e8DQkHOCvp51n5Zt/MA6zBH9Pe8bpQgdYYut5LgQ:39OMjZvm9xFQgdKtD

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • XMRig Miner payload 8 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Themida packer 16 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1268
      • C:\Users\Admin\AppData\Local\Temp\49037.exe
        "C:\Users\Admin\AppData\Local\Temp\49037.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:1252
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2008
        • C:\Windows\System32\powercfg.exe
          powercfg /x -hibernate-timeout-ac 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1380
        • C:\Windows\System32\powercfg.exe
          powercfg /x -hibernate-timeout-dc 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1460
        • C:\Windows\System32\powercfg.exe
          powercfg /x -standby-timeout-ac 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1104
        • C:\Windows\System32\powercfg.exe
          powercfg /x -standby-timeout-dc 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2032
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wwviaeydz#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }
        2⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2028
        • C:\Windows\system32\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn GoogleUpdateTaskMachineQC /tr 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe'
          3⤵
          • Creates scheduled task(s)
          PID:676
      • C:\Windows\System32\schtasks.exe
        C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
        2⤵
          PID:876
        • C:\Windows\System32\cmd.exe
          C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1912
          • C:\Windows\System32\powercfg.exe
            powercfg /x -hibernate-timeout-ac 0
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1896
          • C:\Windows\System32\powercfg.exe
            powercfg /x -hibernate-timeout-dc 0
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:964
          • C:\Windows\System32\powercfg.exe
            powercfg /x -standby-timeout-ac 0
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:592
          • C:\Windows\System32\powercfg.exe
            powercfg /x -standby-timeout-dc 0
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1188
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wwviaeydz#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }
          2⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:528
          • C:\Windows\system32\schtasks.exe
            "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn GoogleUpdateTaskMachineQC /tr 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe'
            3⤵
            • Creates scheduled task(s)
            PID:1888
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:1796
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {2F5884C5-9118-48D2-A365-7B16818007CE} S-1-5-21-3430344531-3702557399-3004411149-1000:WFSTZEPN\Admin:Interactive:[1]
        1⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1528
        • C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe
          C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe
          2⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:912

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe

        Filesize

        6.7MB

        MD5

        b1f6556ce2648139c4faea68dd226520

        SHA1

        6bd326258e1536aa4a3a7a8bae18e8de5af69f9f

        SHA256

        397fbdb4b1a71350d390873d70ff32ff992ed73ce699b49794518fa93dfd5f20

        SHA512

        53428e7145472c4171d8fead376721cdf3b207ef27093b095fa3054863436b79a4d497e2a498c7e4e9af6f55edf24341e9d572c9f96ace20c2ee90c5c6db097f

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

        Filesize

        7KB

        MD5

        dd0e739c8a02fae6bb409b69fc99bdab

        SHA1

        493b4bec511a531637823473107427ee247e04c1

        SHA256

        a028235d7716396979263b11219c626f2fc458012d8604ec87498dfa16a7c278

        SHA512

        f0e65fd626f91749fb1d1538694f621828eeefd4a85e06640dac7f1654253b28a7020a580a137b4bf53fe93e14d525cff464f01aa655854b0b848522fa053b52

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\EXV00SUTK7TYDIFR27JH.temp

        Filesize

        7KB

        MD5

        dd0e739c8a02fae6bb409b69fc99bdab

        SHA1

        493b4bec511a531637823473107427ee247e04c1

        SHA256

        a028235d7716396979263b11219c626f2fc458012d8604ec87498dfa16a7c278

        SHA512

        f0e65fd626f91749fb1d1538694f621828eeefd4a85e06640dac7f1654253b28a7020a580a137b4bf53fe93e14d525cff464f01aa655854b0b848522fa053b52

      • \Users\Admin\AppData\Roaming\Google\Chrome\updater.exe

        Filesize

        6.7MB

        MD5

        b1f6556ce2648139c4faea68dd226520

        SHA1

        6bd326258e1536aa4a3a7a8bae18e8de5af69f9f

        SHA256

        397fbdb4b1a71350d390873d70ff32ff992ed73ce699b49794518fa93dfd5f20

        SHA512

        53428e7145472c4171d8fead376721cdf3b207ef27093b095fa3054863436b79a4d497e2a498c7e4e9af6f55edf24341e9d572c9f96ace20c2ee90c5c6db097f

      • memory/528-93-0x000000000234B000-0x0000000002382000-memory.dmp

        Filesize

        220KB

      • memory/528-92-0x0000000002344000-0x0000000002347000-memory.dmp

        Filesize

        12KB

      • memory/528-91-0x00000000021F0000-0x00000000021F8000-memory.dmp

        Filesize

        32KB

      • memory/528-90-0x000000001B020000-0x000000001B302000-memory.dmp

        Filesize

        2.9MB

      • memory/912-96-0x000000013FC40000-0x000000014092E000-memory.dmp

        Filesize

        12.9MB

      • memory/912-77-0x000000013FC40000-0x000000014092E000-memory.dmp

        Filesize

        12.9MB

      • memory/912-82-0x000000013FC40000-0x000000014092E000-memory.dmp

        Filesize

        12.9MB

      • memory/912-81-0x000000013FC40000-0x000000014092E000-memory.dmp

        Filesize

        12.9MB

      • memory/912-80-0x000000013FC40000-0x000000014092E000-memory.dmp

        Filesize

        12.9MB

      • memory/912-79-0x000000013FC40000-0x000000014092E000-memory.dmp

        Filesize

        12.9MB

      • memory/912-78-0x000000013FC40000-0x000000014092E000-memory.dmp

        Filesize

        12.9MB

      • memory/1252-58-0x000000013F280000-0x000000013FF6E000-memory.dmp

        Filesize

        12.9MB

      • memory/1252-59-0x000000013F280000-0x000000013FF6E000-memory.dmp

        Filesize

        12.9MB

      • memory/1252-54-0x000000013F280000-0x000000013FF6E000-memory.dmp

        Filesize

        12.9MB

      • memory/1252-73-0x000000013F280000-0x000000013FF6E000-memory.dmp

        Filesize

        12.9MB

      • memory/1252-55-0x000000013F280000-0x000000013FF6E000-memory.dmp

        Filesize

        12.9MB

      • memory/1252-56-0x000000013F280000-0x000000013FF6E000-memory.dmp

        Filesize

        12.9MB

      • memory/1252-57-0x000000013F280000-0x000000013FF6E000-memory.dmp

        Filesize

        12.9MB

      • memory/1796-100-0x0000000140000000-0x00000001407EF000-memory.dmp

        Filesize

        7.9MB

      • memory/1796-101-0x0000000002070000-0x0000000002090000-memory.dmp

        Filesize

        128KB

      • memory/1796-106-0x0000000140000000-0x00000001407EF000-memory.dmp

        Filesize

        7.9MB

      • memory/1796-105-0x0000000140000000-0x00000001407EF000-memory.dmp

        Filesize

        7.9MB

      • memory/1796-104-0x0000000140000000-0x00000001407EF000-memory.dmp

        Filesize

        7.9MB

      • memory/1796-103-0x0000000140000000-0x00000001407EF000-memory.dmp

        Filesize

        7.9MB

      • memory/1796-97-0x00000000000B0000-0x00000000000D0000-memory.dmp

        Filesize

        128KB

      • memory/1796-98-0x0000000002070000-0x0000000002090000-memory.dmp

        Filesize

        128KB

      • memory/1796-99-0x0000000140000000-0x00000001407EF000-memory.dmp

        Filesize

        7.9MB

      • memory/1796-102-0x0000000140000000-0x00000001407EF000-memory.dmp

        Filesize

        7.9MB

      • memory/2028-69-0x00000000024A0000-0x0000000002520000-memory.dmp

        Filesize

        512KB

      • memory/2028-67-0x0000000002350000-0x0000000002358000-memory.dmp

        Filesize

        32KB

      • memory/2028-68-0x00000000024A0000-0x0000000002520000-memory.dmp

        Filesize

        512KB

      • memory/2028-71-0x00000000024AB000-0x00000000024E2000-memory.dmp

        Filesize

        220KB

      • memory/2028-70-0x00000000024A0000-0x0000000002520000-memory.dmp

        Filesize

        512KB

      • memory/2028-66-0x000000001B040000-0x000000001B322000-memory.dmp

        Filesize

        2.9MB