Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 06:08
Behavioral task
behavioral1
Sample
New Client.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
New Client.exe
Resource
win10v2004-20230915-en
General
-
Target
New Client.exe
-
Size
164KB
-
MD5
f08772b3bdde7388a4c43b7e41da5684
-
SHA1
439cd4653ddbdf9d7433a165f5cd4eb6afe82bcb
-
SHA256
6e0125f382bf828fbff9e7467a227c0584385395c2cb20a06a4c045f9ac6a43d
-
SHA512
7776c2894397fae7a1934af7d87513d5e25114a10fd9cbb3fbbcc8fb1512dc68cad8b066dbba7c9462ded0d9c5c70f32d9fca42b18a72a0a2a67fd04755945a3
-
SSDEEP
3072:0ibn/zRv40/9nUx0EpuCRwzzbEcr5+cbet7lo9Wagc:0i3Ux0EjGz4q5jbKz5
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe Client.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe Client.exe -
Executes dropped EXE 3 IoCs
pid Process 2324 Client.exe 2748 Client.exe 2360 Client.exe -
Loads dropped DLL 1 IoCs
pid Process 2412 New Client.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Client.exe\" .." Client.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Client.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Client.exe\" .." Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2792 schtasks.exe 2332 schtasks.exe 2604 schtasks.exe 2752 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeDebugPrivilege 2324 Client.exe Token: 33 2324 Client.exe Token: SeIncBasePriorityPrivilege 2324 Client.exe Token: 33 2324 Client.exe Token: SeIncBasePriorityPrivilege 2324 Client.exe Token: 33 2324 Client.exe Token: SeIncBasePriorityPrivilege 2324 Client.exe Token: 33 2324 Client.exe Token: SeIncBasePriorityPrivilege 2324 Client.exe Token: 33 2324 Client.exe Token: SeIncBasePriorityPrivilege 2324 Client.exe Token: 33 2324 Client.exe Token: SeIncBasePriorityPrivilege 2324 Client.exe Token: 33 2324 Client.exe Token: SeIncBasePriorityPrivilege 2324 Client.exe Token: 33 2324 Client.exe Token: SeIncBasePriorityPrivilege 2324 Client.exe Token: 33 2324 Client.exe Token: SeIncBasePriorityPrivilege 2324 Client.exe Token: 33 2324 Client.exe Token: SeIncBasePriorityPrivilege 2324 Client.exe Token: 33 2324 Client.exe Token: SeIncBasePriorityPrivilege 2324 Client.exe Token: 33 2324 Client.exe Token: SeIncBasePriorityPrivilege 2324 Client.exe Token: 33 2324 Client.exe Token: SeIncBasePriorityPrivilege 2324 Client.exe Token: 33 2324 Client.exe Token: SeIncBasePriorityPrivilege 2324 Client.exe Token: 33 2324 Client.exe Token: SeIncBasePriorityPrivilege 2324 Client.exe Token: 33 2324 Client.exe Token: SeIncBasePriorityPrivilege 2324 Client.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2116 2412 New Client.exe 28 PID 2412 wrote to memory of 2116 2412 New Client.exe 28 PID 2412 wrote to memory of 2116 2412 New Client.exe 28 PID 2412 wrote to memory of 2116 2412 New Client.exe 28 PID 2412 wrote to memory of 2332 2412 New Client.exe 30 PID 2412 wrote to memory of 2332 2412 New Client.exe 30 PID 2412 wrote to memory of 2332 2412 New Client.exe 30 PID 2412 wrote to memory of 2332 2412 New Client.exe 30 PID 2412 wrote to memory of 2324 2412 New Client.exe 32 PID 2412 wrote to memory of 2324 2412 New Client.exe 32 PID 2412 wrote to memory of 2324 2412 New Client.exe 32 PID 2412 wrote to memory of 2324 2412 New Client.exe 32 PID 2324 wrote to memory of 2760 2324 Client.exe 33 PID 2324 wrote to memory of 2760 2324 Client.exe 33 PID 2324 wrote to memory of 2760 2324 Client.exe 33 PID 2324 wrote to memory of 2760 2324 Client.exe 33 PID 2324 wrote to memory of 2604 2324 Client.exe 35 PID 2324 wrote to memory of 2604 2324 Client.exe 35 PID 2324 wrote to memory of 2604 2324 Client.exe 35 PID 2324 wrote to memory of 2604 2324 Client.exe 35 PID 1944 wrote to memory of 2748 1944 taskeng.exe 38 PID 1944 wrote to memory of 2748 1944 taskeng.exe 38 PID 1944 wrote to memory of 2748 1944 taskeng.exe 38 PID 1944 wrote to memory of 2748 1944 taskeng.exe 38 PID 2748 wrote to memory of 2504 2748 Client.exe 39 PID 2748 wrote to memory of 2504 2748 Client.exe 39 PID 2748 wrote to memory of 2504 2748 Client.exe 39 PID 2748 wrote to memory of 2504 2748 Client.exe 39 PID 2748 wrote to memory of 2752 2748 Client.exe 41 PID 2748 wrote to memory of 2752 2748 Client.exe 41 PID 2748 wrote to memory of 2752 2748 Client.exe 41 PID 2748 wrote to memory of 2752 2748 Client.exe 41 PID 1944 wrote to memory of 2360 1944 taskeng.exe 45 PID 1944 wrote to memory of 2360 1944 taskeng.exe 45 PID 1944 wrote to memory of 2360 1944 taskeng.exe 45 PID 1944 wrote to memory of 2360 1944 taskeng.exe 45 PID 2360 wrote to memory of 2856 2360 Client.exe 46 PID 2360 wrote to memory of 2856 2360 Client.exe 46 PID 2360 wrote to memory of 2856 2360 Client.exe 46 PID 2360 wrote to memory of 2856 2360 Client.exe 46 PID 2360 wrote to memory of 2792 2360 Client.exe 48 PID 2360 wrote to memory of 2792 2360 Client.exe 48 PID 2360 wrote to memory of 2792 2360 Client.exe 48 PID 2360 wrote to memory of 2792 2360 Client.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Client.exe"C:\Users\Admin\AppData\Local\Temp\New Client.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F2⤵PID:2116
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\New Client.exe" /sc minute /mo 12⤵
- Creates scheduled task(s)
PID:2332
-
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F3⤵PID:2760
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 13⤵
- Creates scheduled task(s)
PID:2604
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {F37161EE-B6BA-40DF-BFE6-E372EADB2E76} S-1-5-21-2180306848-1874213455-4093218721-1000:XEBBURHY\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\Client.exeC:\Users\Admin\AppData\Local\Temp\Client.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F3⤵PID:2504
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 13⤵
- Creates scheduled task(s)
PID:2752
-
-
-
C:\Users\Admin\AppData\Local\Temp\Client.exeC:\Users\Admin\AppData\Local\Temp\Client.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F3⤵PID:2856
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 13⤵
- Creates scheduled task(s)
PID:2792
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD5f08772b3bdde7388a4c43b7e41da5684
SHA1439cd4653ddbdf9d7433a165f5cd4eb6afe82bcb
SHA2566e0125f382bf828fbff9e7467a227c0584385395c2cb20a06a4c045f9ac6a43d
SHA5127776c2894397fae7a1934af7d87513d5e25114a10fd9cbb3fbbcc8fb1512dc68cad8b066dbba7c9462ded0d9c5c70f32d9fca42b18a72a0a2a67fd04755945a3
-
Filesize
164KB
MD5f08772b3bdde7388a4c43b7e41da5684
SHA1439cd4653ddbdf9d7433a165f5cd4eb6afe82bcb
SHA2566e0125f382bf828fbff9e7467a227c0584385395c2cb20a06a4c045f9ac6a43d
SHA5127776c2894397fae7a1934af7d87513d5e25114a10fd9cbb3fbbcc8fb1512dc68cad8b066dbba7c9462ded0d9c5c70f32d9fca42b18a72a0a2a67fd04755945a3
-
Filesize
164KB
MD5f08772b3bdde7388a4c43b7e41da5684
SHA1439cd4653ddbdf9d7433a165f5cd4eb6afe82bcb
SHA2566e0125f382bf828fbff9e7467a227c0584385395c2cb20a06a4c045f9ac6a43d
SHA5127776c2894397fae7a1934af7d87513d5e25114a10fd9cbb3fbbcc8fb1512dc68cad8b066dbba7c9462ded0d9c5c70f32d9fca42b18a72a0a2a67fd04755945a3
-
Filesize
164KB
MD5f08772b3bdde7388a4c43b7e41da5684
SHA1439cd4653ddbdf9d7433a165f5cd4eb6afe82bcb
SHA2566e0125f382bf828fbff9e7467a227c0584385395c2cb20a06a4c045f9ac6a43d
SHA5127776c2894397fae7a1934af7d87513d5e25114a10fd9cbb3fbbcc8fb1512dc68cad8b066dbba7c9462ded0d9c5c70f32d9fca42b18a72a0a2a67fd04755945a3
-
Filesize
164KB
MD5f08772b3bdde7388a4c43b7e41da5684
SHA1439cd4653ddbdf9d7433a165f5cd4eb6afe82bcb
SHA2566e0125f382bf828fbff9e7467a227c0584385395c2cb20a06a4c045f9ac6a43d
SHA5127776c2894397fae7a1934af7d87513d5e25114a10fd9cbb3fbbcc8fb1512dc68cad8b066dbba7c9462ded0d9c5c70f32d9fca42b18a72a0a2a67fd04755945a3
-
Filesize
164KB
MD5f08772b3bdde7388a4c43b7e41da5684
SHA1439cd4653ddbdf9d7433a165f5cd4eb6afe82bcb
SHA2566e0125f382bf828fbff9e7467a227c0584385395c2cb20a06a4c045f9ac6a43d
SHA5127776c2894397fae7a1934af7d87513d5e25114a10fd9cbb3fbbcc8fb1512dc68cad8b066dbba7c9462ded0d9c5c70f32d9fca42b18a72a0a2a67fd04755945a3