Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/01/2024, 13:30

General

  • Target

    b7f218e507f9c5b46add1865b6ea130d13918371b236865d3acc1191a20dfedb.exe

  • Size

    705KB

  • MD5

    372c3c5872cb016a4a29d0bb283b1cb2

  • SHA1

    6fefba5095eae11c63cfbf86b1582fbf5fb59b0f

  • SHA256

    b7f218e507f9c5b46add1865b6ea130d13918371b236865d3acc1191a20dfedb

  • SHA512

    22b4baba146585bd636266f3979e2062c8c387b51dab558e725484998edbe0557003e17e69323b1b967d4e55387d133f5d9703e871b8eb5bae95e2b3f24d6d0f

  • SSDEEP

    12288:wW9B+VJFCrNDFKYmKIiirRGW2phzrvXuayM1J3AAlrAf0d83QC0OXxcpGHMki:wW9Bq8NDFKYmKOF0zr31JwAlcR3QC0O3

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 22 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 24 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7f218e507f9c5b46add1865b6ea130d13918371b236865d3acc1191a20dfedb.exe
    "C:\Users\Admin\AppData\Local\Temp\b7f218e507f9c5b46add1865b6ea130d13918371b236865d3acc1191a20dfedb.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3016
  • \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
    "c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
    1⤵
    • Executes dropped EXE
    PID:640
  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
    "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
    1⤵
    • Executes dropped EXE
    PID:3416
  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"
    1⤵
    • Executes dropped EXE
    PID:4228
  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2108
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1568
  • C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    1⤵
    • Executes dropped EXE
    PID:3132
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv
    1⤵
      PID:3096
    • C:\Windows\system32\fxssvc.exe
      C:\Windows\system32\fxssvc.exe
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:1396
    • C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe
      C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe
      1⤵
      • Executes dropped EXE
      PID:1616
    • C:\Windows\SysWow64\perfhost.exe
      C:\Windows\SysWow64\perfhost.exe
      1⤵
      • Executes dropped EXE
      PID:4744
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc
      1⤵
        PID:4248
      • C:\Windows\system32\AgentService.exe
        C:\Windows\system32\AgentService.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4260
      • C:\Windows\system32\wbem\WmiApSrv.exe
        C:\Windows\system32\wbem\WmiApSrv.exe
        1⤵
        • Executes dropped EXE
        PID:2796
      • C:\Windows\system32\SearchIndexer.exe
        C:\Windows\system32\SearchIndexer.exe /Embedding
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3200
        • C:\Windows\system32\SearchFilterHost.exe
          "C:\Windows\system32\SearchFilterHost.exe" 0 916 920 928 8192 924 900
          2⤵
          • Modifies data under HKEY_USERS
          PID:4552
        • C:\Windows\system32\SearchProtocolHost.exe
          "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
          2⤵
          • Modifies data under HKEY_USERS
          PID:2120
      • C:\Windows\system32\wbengine.exe
        "C:\Windows\system32\wbengine.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3080
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:5032
      • C:\Windows\System32\vds.exe
        C:\Windows\System32\vds.exe
        1⤵
        • Executes dropped EXE
        PID:2852
      • C:\Windows\system32\TieringEngineService.exe
        C:\Windows\system32\TieringEngineService.exe
        1⤵
        • Executes dropped EXE
        • Checks processor information in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:4116
      • C:\Windows\System32\OpenSSH\ssh-agent.exe
        C:\Windows\System32\OpenSSH\ssh-agent.exe
        1⤵
        • Executes dropped EXE
        PID:3756
      • C:\Windows\system32\spectrum.exe
        C:\Windows\system32\spectrum.exe
        1⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        PID:2756
      • C:\Windows\System32\snmptrap.exe
        C:\Windows\System32\snmptrap.exe
        1⤵
        • Executes dropped EXE
        PID:1684
      • C:\Windows\System32\SensorDataService.exe
        C:\Windows\System32\SensorDataService.exe
        1⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        PID:1932
      • C:\Windows\system32\locator.exe
        C:\Windows\system32\locator.exe
        1⤵
        • Executes dropped EXE
        PID:4968
      • C:\Windows\System32\msdtc.exe
        C:\Windows\System32\msdtc.exe
        1⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        PID:1404

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

        Filesize

        781KB

        MD5

        e309f7818e33611e2dae90efac3d3b6a

        SHA1

        45a698ee4d143b80e3a02809b4a17e0b317b9175

        SHA256

        6b47595f7cfae7ce921f7bb01c01b8a1e99c207e4ac4a74bc8824701c612c93e

        SHA512

        0809e2fee8aac2e2470436c18b25f60ec563e8801f166b819da03a4562eece6d31d2d21b9c644ad90064557cbd05e080de66beefb6db8193a6fafb90fcb21575

      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

        Filesize

        92KB

        MD5

        f5017437fed334d8579b5a92d090be21

        SHA1

        79a666d563fd8ea51929cf94dc3c30f2ea23d072

        SHA256

        8b02d4f17711c6af42af8d3b256689afae8e3985ec23a2f96c90af34e6353c28

        SHA512

        41cffb91bc3a822099b64ad973f58c477f4426b890d883469de493ff91ff7517d7d7b9b62fa6105f1763d043bb59ec73a4db2f1e283ef8e0e8467bd95e773399

      • C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe

        Filesize

        659KB

        MD5

        1230024fd3044b489727de273b0def17

        SHA1

        fecbf72831a5d4b59fccac0ea54243d38e1f8d70

        SHA256

        79ec581f56ebc8a2d6d31b31d4aae71c92f0a5352afa2bf99731f95f598f76b0

        SHA512

        b7a4dec8db29f225c5b4c563d2026ef78af00b5602406e2293451062a5b7b5e3b96a09a912030da09e53e7e234f7d9be6a95c86ef9976224dcba42872608c9e0

      • C:\Windows\System32\FXSSVC.exe

        Filesize

        1.2MB

        MD5

        0b08ce9dd28b60c8c0e7e33ad2b0f754

        SHA1

        cc4cc3d8be2d3d6a22cf4363d44a7623669bd67f

        SHA256

        860f871d8871cfe2dd0da1e611a1bc672d6e67ab561338fe36f28b9d8452f108

        SHA512

        2b27d645dcadc9eb4b3f9b770b879869583dda24a2af25d02e9c2254bb3a4f284d6c43cd241684b5180bd1ddb5c60c618bd638d9d5bc9abdd3677056f46dc98c

      • C:\Windows\System32\OpenSSH\ssh-agent.exe

        Filesize

        894KB

        MD5

        b2fe5a5d8d092a5d39d967270bc1aaa1

        SHA1

        e9f552aaba7fb07c18f2bafacd968273d5176a15

        SHA256

        eed95bf7ac5a93b37b5fb5b7da01d4059a298f2a785a858728c6d96336a2225f

        SHA512

        71547791f32501de4c544ad163e450cf3ec3121f30d50bd306de713452dadfa2113ab0cc6c02ff45f7ca3f13079d41796d1011633337c6f1eaf373da9adf3f37

      • C:\Windows\System32\PerceptionSimulation\PerceptionSimulationService.exe

        Filesize

        671KB

        MD5

        8d1f08e7c73f017c8447d8bc000fdc1d

        SHA1

        1f5b78101c7134167c2c2c962b259a5e941fe3fd

        SHA256

        99af5988865f7a842102f8038bbec726408867a8718a15f3216f5d572aa61aac

        SHA512

        9efbc9e4f9305ed6c38cfb20e5eae623d35224c6b5ce13282dac4169bea8152329866e68c691bce609015973034b2e1c18d8dfd19a17d01ba10818abc8a30d6c

      • C:\Windows\System32\SensorDataService.exe

        Filesize

        1024KB

        MD5

        9c227b64067e3488bded95fd041cadbd

        SHA1

        5b942ecb86f6aaaf325bc4ecfd21947d143caf8f

        SHA256

        78a62287a3bfbb59e5c35da34cdba5418a7544c531fa6d9822c4e7e2a34e40db

        SHA512

        7c7d018da4f3071fc104b6f499c18a17fff5bad8e172e8d121b9f8b872156155757789b8423e536acbd591d586628c9381423f0dccc60c6daec1805d4e341a28

      • C:\Windows\System32\alg.exe

        Filesize

        385KB

        MD5

        0cfe3aca4a0801b2a71a48c8afc3ae36

        SHA1

        72b32158f2fd1c7fa711dd683315b6db258911c8

        SHA256

        8b1e391efddb720874c62b99589a58c647fe873f91bc657bb87b41f79ab78f80

        SHA512

        cd6e1f0ec9d5964e31e408886e3fc87e0858fb36149b0c66bb9d0c3eaf3f573e4b9d4b7fc8683c6a3f788f19c9ab2f2ce1e58a515ace2cd5b103e6d73368c84f

      • C:\Windows\System32\msdtc.exe

        Filesize

        321KB

        MD5

        ff0f083dac17091dfb8390cd76a008f2

        SHA1

        3911e10c2dc96e9054adedb3982ca950a4bc8795

        SHA256

        22c32a75865c83aaa8a99d7d5b8d247fccbfde5d7fbeaddeb0d8dc7f58fbaa2d

        SHA512

        d8c80416f5a87991ed59e64cc737f836686940cda0edff87cc054bbd7bec8d48eb04117d9d8050cb78ebe250f26e00fa0408078f87896347809a73932a6155ef

      • C:\Windows\System32\snmptrap.exe

        Filesize

        584KB

        MD5

        9ef424f61a9a1106f0253687e9cda505

        SHA1

        36fed5e4c880a302188dcf51aba43b4dc2fe330a

        SHA256

        9f6d08c00f929c75e5dfb552bc28d1e56d607a451c0b3f10561a6d9d23460197

        SHA512

        a43e5c3decccb05c93bd29a113f0b1573727ac0718e95472c06257d80c1adb2b34c476c0e4b4bc9789fc80ed766d9f1e7b6413973df89e1b6014999424e1cb92

      • memory/640-66-0x0000000140000000-0x00000001400CF000-memory.dmp

        Filesize

        828KB

      • memory/640-73-0x00000000007B0000-0x0000000000810000-memory.dmp

        Filesize

        384KB

      • memory/640-65-0x00000000007B0000-0x0000000000810000-memory.dmp

        Filesize

        384KB

      • memory/640-239-0x0000000140000000-0x00000001400CF000-memory.dmp

        Filesize

        828KB

      • memory/1396-272-0x0000000000DA0000-0x0000000000E00000-memory.dmp

        Filesize

        384KB

      • memory/1396-257-0x0000000000DA0000-0x0000000000E00000-memory.dmp

        Filesize

        384KB

      • memory/1396-256-0x0000000140000000-0x0000000140135000-memory.dmp

        Filesize

        1.2MB

      • memory/1396-270-0x0000000140000000-0x0000000140135000-memory.dmp

        Filesize

        1.2MB

      • memory/1396-266-0x0000000000DA0000-0x0000000000E00000-memory.dmp

        Filesize

        384KB

      • memory/1404-282-0x0000000000D40000-0x0000000000DA0000-memory.dmp

        Filesize

        384KB

      • memory/1404-273-0x0000000140000000-0x00000001400B9000-memory.dmp

        Filesize

        740KB

      • memory/1404-339-0x0000000140000000-0x00000001400B9000-memory.dmp

        Filesize

        740KB

      • memory/1568-14-0x0000000000830000-0x0000000000890000-memory.dmp

        Filesize

        384KB

      • memory/1568-230-0x0000000140000000-0x00000001400AA000-memory.dmp

        Filesize

        680KB

      • memory/1568-16-0x0000000140000000-0x00000001400AA000-memory.dmp

        Filesize

        680KB

      • memory/1568-22-0x0000000000830000-0x0000000000890000-memory.dmp

        Filesize

        384KB

      • memory/1616-298-0x0000000000680000-0x00000000006E0000-memory.dmp

        Filesize

        384KB

      • memory/1616-286-0x0000000140000000-0x00000001400AB000-memory.dmp

        Filesize

        684KB

      • memory/1616-352-0x0000000140000000-0x00000001400AB000-memory.dmp

        Filesize

        684KB

      • memory/1684-348-0x00000000006D0000-0x0000000000730000-memory.dmp

        Filesize

        384KB

      • memory/1684-408-0x0000000140000000-0x0000000140096000-memory.dmp

        Filesize

        600KB

      • memory/1684-340-0x0000000140000000-0x0000000140096000-memory.dmp

        Filesize

        600KB

      • memory/1932-326-0x0000000140000000-0x00000001401D7000-memory.dmp

        Filesize

        1.8MB

      • memory/1932-391-0x0000000140000000-0x00000001401D7000-memory.dmp

        Filesize

        1.8MB

      • memory/1932-335-0x0000000000730000-0x0000000000790000-memory.dmp

        Filesize

        384KB

      • memory/2108-235-0x0000000140000000-0x0000000140237000-memory.dmp

        Filesize

        2.2MB

      • memory/2108-34-0x0000000000D50000-0x0000000000DB0000-memory.dmp

        Filesize

        384KB

      • memory/2108-28-0x0000000140000000-0x0000000140237000-memory.dmp

        Filesize

        2.2MB

      • memory/2108-27-0x0000000000D50000-0x0000000000DB0000-memory.dmp

        Filesize

        384KB

      • memory/2756-361-0x0000000000820000-0x0000000000880000-memory.dmp

        Filesize

        384KB

      • memory/2756-354-0x0000000140000000-0x0000000140169000-memory.dmp

        Filesize

        1.4MB

      • memory/2756-421-0x0000000140000000-0x0000000140169000-memory.dmp

        Filesize

        1.4MB

      • memory/2796-457-0x0000000000660000-0x00000000006C0000-memory.dmp

        Filesize

        384KB

      • memory/2796-450-0x0000000140000000-0x00000001400C6000-memory.dmp

        Filesize

        792KB

      • memory/2852-409-0x0000000140000000-0x0000000140147000-memory.dmp

        Filesize

        1.3MB

      • memory/2852-555-0x0000000140000000-0x0000000140147000-memory.dmp

        Filesize

        1.3MB

      • memory/2852-417-0x0000000000C30000-0x0000000000C90000-memory.dmp

        Filesize

        384KB

      • memory/3016-18-0x0000000000400000-0x00000000004B5000-memory.dmp

        Filesize

        724KB

      • memory/3016-0-0x0000000000400000-0x00000000004B5000-memory.dmp

        Filesize

        724KB

      • memory/3016-6-0x00000000023A0000-0x0000000002407000-memory.dmp

        Filesize

        412KB

      • memory/3016-7-0x00000000023A0000-0x0000000002407000-memory.dmp

        Filesize

        412KB

      • memory/3016-1-0x00000000023A0000-0x0000000002407000-memory.dmp

        Filesize

        412KB

      • memory/3080-443-0x00000000006E0000-0x0000000000740000-memory.dmp

        Filesize

        384KB

      • memory/3080-437-0x0000000140000000-0x0000000140216000-memory.dmp

        Filesize

        2.1MB

      • memory/3132-244-0x0000000140000000-0x00000001400A9000-memory.dmp

        Filesize

        676KB

      • memory/3132-245-0x0000000000680000-0x00000000006E0000-memory.dmp

        Filesize

        384KB

      • memory/3132-251-0x0000000000680000-0x00000000006E0000-memory.dmp

        Filesize

        384KB

      • memory/3132-312-0x0000000140000000-0x00000001400A9000-memory.dmp

        Filesize

        676KB

      • memory/3132-252-0x0000000000680000-0x00000000006E0000-memory.dmp

        Filesize

        384KB

      • memory/3200-470-0x0000000000870000-0x00000000008D0000-memory.dmp

        Filesize

        384KB

      • memory/3200-462-0x0000000140000000-0x0000000140179000-memory.dmp

        Filesize

        1.5MB

      • memory/3416-63-0x0000000140000000-0x00000001400CA000-memory.dmp

        Filesize

        808KB

      • memory/3416-51-0x0000000140000000-0x00000001400CA000-memory.dmp

        Filesize

        808KB

      • memory/3416-60-0x0000000000C00000-0x0000000000C60000-memory.dmp

        Filesize

        384KB

      • memory/3416-50-0x0000000000C00000-0x0000000000C60000-memory.dmp

        Filesize

        384KB

      • memory/3416-57-0x0000000000C00000-0x0000000000C60000-memory.dmp

        Filesize

        384KB

      • memory/3756-367-0x0000000140000000-0x0000000140102000-memory.dmp

        Filesize

        1.0MB

      • memory/3756-434-0x0000000140000000-0x0000000140102000-memory.dmp

        Filesize

        1.0MB

      • memory/3756-375-0x00000000008F0000-0x0000000000950000-memory.dmp

        Filesize

        384KB

      • memory/4116-448-0x0000000140000000-0x00000001400E2000-memory.dmp

        Filesize

        904KB

      • memory/4116-388-0x0000000000890000-0x00000000008F0000-memory.dmp

        Filesize

        384KB

      • memory/4116-379-0x0000000140000000-0x00000001400E2000-memory.dmp

        Filesize

        904KB

      • memory/4228-46-0x00000000001A0000-0x0000000000200000-memory.dmp

        Filesize

        384KB

      • memory/4228-39-0x0000000140000000-0x000000014022B000-memory.dmp

        Filesize

        2.2MB

      • memory/4228-236-0x0000000140000000-0x000000014022B000-memory.dmp

        Filesize

        2.2MB

      • memory/4228-38-0x00000000001A0000-0x0000000000200000-memory.dmp

        Filesize

        384KB

      • memory/4260-401-0x0000000000C30000-0x0000000000C90000-memory.dmp

        Filesize

        384KB

      • memory/4260-406-0x0000000000C30000-0x0000000000C90000-memory.dmp

        Filesize

        384KB

      • memory/4260-405-0x0000000140000000-0x00000001401C0000-memory.dmp

        Filesize

        1.8MB

      • memory/4260-394-0x0000000140000000-0x00000001401C0000-memory.dmp

        Filesize

        1.8MB

      • memory/4744-308-0x00000000006B0000-0x0000000000717000-memory.dmp

        Filesize

        412KB

      • memory/4744-301-0x0000000000400000-0x0000000000497000-memory.dmp

        Filesize

        604KB

      • memory/4744-365-0x0000000000400000-0x0000000000497000-memory.dmp

        Filesize

        604KB

      • memory/4968-378-0x0000000140000000-0x0000000140095000-memory.dmp

        Filesize

        596KB

      • memory/4968-322-0x0000000000750000-0x00000000007B0000-memory.dmp

        Filesize

        384KB

      • memory/4968-315-0x0000000140000000-0x0000000140095000-memory.dmp

        Filesize

        596KB

      • memory/5032-431-0x0000000000620000-0x0000000000680000-memory.dmp

        Filesize

        384KB

      • memory/5032-422-0x0000000140000000-0x00000001401FC000-memory.dmp

        Filesize

        2.0MB