Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    5s
  • max time network
    13s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/08/2023, 12:26

General

  • Target

    9d82a6bf1c356fe0fe0081f3a71f2383ec8b0138528c2c6bcc8205dd4a50b55f.exe

  • Size

    5.9MB

  • MD5

    b419051e313f622bf30b2506412102dc

  • SHA1

    439c1fb8eb772a60f11b0e782ca89e1acd67c83b

  • SHA256

    9d82a6bf1c356fe0fe0081f3a71f2383ec8b0138528c2c6bcc8205dd4a50b55f

  • SHA512

    9338f4df8fdc8f64778d10a71d94a13e24e8d2ad79b0e613bc10d930c58dc672249e7ed6d131e28faf7d1d7a076be45a24b5dbf1db1839ff39a644c2928ae9e3

  • SSDEEP

    98304:4GYNgZEX3Zewjl2r3teVZAl0V/wdfMXR5fbQsDyDUURBITrUWchB5py77PDs0/bb:4G9Zw34mArUZ0w84TksibyfP9b9XsTh8

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1276
      • C:\Users\Admin\AppData\Local\Temp\9d82a6bf1c356fe0fe0081f3a71f2383ec8b0138528c2c6bcc8205dd4a50b55f.exe
        "C:\Users\Admin\AppData\Local\Temp\9d82a6bf1c356fe0fe0081f3a71f2383ec8b0138528c2c6bcc8205dd4a50b55f.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious behavior: EnumeratesProcesses
        PID:3500
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#vnlax#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -RunLevel 'Highest' -Force; }
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4792
      • C:\Windows\System32\schtasks.exe
        C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
        2⤵
          PID:1244
        • C:\Windows\System32\cmd.exe
          C:\Windows\System32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\9d82a6bf1c356fe0fe0081f3a71f2383ec8b0138528c2c6bcc8205dd4a50b55f.exe"
          2⤵
            PID:632
            • C:\Windows\System32\choice.exe
              choice /C Y /N /D Y /T 3
              3⤵
                PID:456
          • C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe
            C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe
            1⤵
              PID:4940

            Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_knbp2icl.z1e.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Users\Admin\AppData\Roaming\Google\Chrome\updater.exe

              Filesize

              448KB

              MD5

              ed217887ccf87d6087e8cf42e1d75da1

              SHA1

              4a925c55e858a27ede3a5486a2147a74dcc18bff

              SHA256

              a4a714c9cc7fc2d673765e50ba08ccd326a0b8c7f106491593296743fb163848

              SHA512

              ecfede2607c961ae0c41725a706468885ba9c80cbda8b555ba8f85954d731f620fc7d6013fb7da60528f8cd98cfb4811437da9a6f4978fa7181fa3e96aa5b7b3

            • memory/3500-31-0x0000027F7C180000-0x0000027F7C1C0000-memory.dmp

              Filesize

              256KB

            • memory/3500-2-0x00007FF729AE0000-0x00007FF72A62B000-memory.dmp

              Filesize

              11.3MB

            • memory/3500-6-0x00007FF729AE0000-0x00007FF72A62B000-memory.dmp

              Filesize

              11.3MB

            • memory/3500-4-0x0000027F7C180000-0x0000027F7C1C0000-memory.dmp

              Filesize

              256KB

            • memory/3500-7-0x0000027F7C180000-0x0000027F7C1C0000-memory.dmp

              Filesize

              256KB

            • memory/3500-33-0x00007FF729AE0000-0x00007FF72A62B000-memory.dmp

              Filesize

              11.3MB

            • memory/3500-32-0x00007FF729AE0000-0x00007FF72A62B000-memory.dmp

              Filesize

              11.3MB

            • memory/4792-22-0x000002602F2C0000-0x000002602F2D0000-memory.dmp

              Filesize

              64KB

            • memory/4792-25-0x000002602F2C0000-0x000002602F2D0000-memory.dmp

              Filesize

              64KB

            • memory/4792-28-0x00007FFE5DA20000-0x00007FFE5E4E1000-memory.dmp

              Filesize

              10.8MB

            • memory/4792-24-0x000002602F2C0000-0x000002602F2D0000-memory.dmp

              Filesize

              64KB

            • memory/4792-23-0x000002602F2C0000-0x000002602F2D0000-memory.dmp

              Filesize

              64KB

            • memory/4792-21-0x00007FFE5DA20000-0x00007FFE5E4E1000-memory.dmp

              Filesize

              10.8MB

            • memory/4792-20-0x000002602F230000-0x000002602F252000-memory.dmp

              Filesize

              136KB

            • memory/4940-35-0x00007FF761CA0000-0x00007FF7627EB000-memory.dmp

              Filesize

              11.3MB