Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
49s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 12:35
Static task
static1
Behavioral task
behavioral1
Sample
6c1dfafc437e8cb6b57dd0729cb39822.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6c1dfafc437e8cb6b57dd0729cb39822.exe
Resource
win10v2004-20231215-en
General
-
Target
6c1dfafc437e8cb6b57dd0729cb39822.exe
-
Size
1.1MB
-
MD5
6c1dfafc437e8cb6b57dd0729cb39822
-
SHA1
92d61dc5bc58d94e3bc1d672e27bfe8133056b8a
-
SHA256
12782684d8480075ea8ece059fd7a364c46ab53bcf9094e44f5cfccd57d335cb
-
SHA512
d82a0a86d9dbe499ca3a7b62fbe447272746ae88202479b850701e01b2ea724acf6e8a35be6be04331bbdf37e2769c5d11a70cdf449a599273c533de3eee7638
-
SSDEEP
24576:d5nQlHDiGRXcIVofrYIfvJWPL1zY7zzXeic8DfNQKpyEeiTbZ:7IH2voT6n08TmOx/l
Malware Config
Signatures
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "3" dc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "3" dc.exe -
Modifies Windows Firewall 2 TTPs 4 IoCs
pid Process 2600 netsh.exe 2684 netsh.exe 580 netsh.exe 1808 netsh.exe -
Executes dropped EXE 3 IoCs
pid Process 2520 dc.exe 2028 svchost.exe 1544 dc.exe -
Loads dropped DLL 2 IoCs
pid Process 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection dc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection dc.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol dc.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini dc.exe File opened for modification C:\Windows\System32\GroupPolicy\Machine\Registry.pol dc.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\System\dc.exe 6c1dfafc437e8cb6b57dd0729cb39822.exe File created C:\Windows\System\svchost.exe 6c1dfafc437e8cb6b57dd0729cb39822.exe File opened for modification C:\Windows\System\svchost.exe 6c1dfafc437e8cb6b57dd0729cb39822.exe File created C:\Windows\System\xxx1.bak svchost.exe File opened for modification C:\Windows\System\dc.exe svchost.exe File created C:\Windows\System\xxx1.bak 6c1dfafc437e8cb6b57dd0729cb39822.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2776 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe 2612 powershell.exe 2596 powershell.exe 2520 dc.exe 2520 dc.exe 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe 2028 svchost.exe 804 powershell.exe 1804 powershell.exe 1544 dc.exe 1544 dc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2612 powershell.exe Token: SeDebugPrivilege 2596 powershell.exe Token: SeDebugPrivilege 804 powershell.exe Token: SeDebugPrivilege 1804 powershell.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2600 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe 29 PID 2316 wrote to memory of 2600 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe 29 PID 2316 wrote to memory of 2600 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe 29 PID 2316 wrote to memory of 2684 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe 31 PID 2316 wrote to memory of 2684 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe 31 PID 2316 wrote to memory of 2684 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe 31 PID 2316 wrote to memory of 2612 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe 33 PID 2316 wrote to memory of 2612 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe 33 PID 2316 wrote to memory of 2612 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe 33 PID 2316 wrote to memory of 2596 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe 35 PID 2316 wrote to memory of 2596 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe 35 PID 2316 wrote to memory of 2596 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe 35 PID 2316 wrote to memory of 2520 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe 37 PID 2316 wrote to memory of 2520 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe 37 PID 2316 wrote to memory of 2520 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe 37 PID 2316 wrote to memory of 2520 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe 37 PID 2316 wrote to memory of 2120 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe 40 PID 2316 wrote to memory of 2120 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe 40 PID 2316 wrote to memory of 2120 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe 40 PID 2316 wrote to memory of 2776 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe 42 PID 2316 wrote to memory of 2776 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe 42 PID 2316 wrote to memory of 2776 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe 42 PID 2316 wrote to memory of 2028 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe 44 PID 2316 wrote to memory of 2028 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe 44 PID 2316 wrote to memory of 2028 2316 6c1dfafc437e8cb6b57dd0729cb39822.exe 44 PID 2028 wrote to memory of 580 2028 svchost.exe 46 PID 2028 wrote to memory of 580 2028 svchost.exe 46 PID 2028 wrote to memory of 580 2028 svchost.exe 46 PID 2028 wrote to memory of 1808 2028 svchost.exe 48 PID 2028 wrote to memory of 1808 2028 svchost.exe 48 PID 2028 wrote to memory of 1808 2028 svchost.exe 48 PID 2028 wrote to memory of 804 2028 svchost.exe 50 PID 2028 wrote to memory of 804 2028 svchost.exe 50 PID 2028 wrote to memory of 804 2028 svchost.exe 50 PID 2028 wrote to memory of 1804 2028 svchost.exe 53 PID 2028 wrote to memory of 1804 2028 svchost.exe 53 PID 2028 wrote to memory of 1804 2028 svchost.exe 53 PID 2028 wrote to memory of 1544 2028 svchost.exe 54 PID 2028 wrote to memory of 1544 2028 svchost.exe 54 PID 2028 wrote to memory of 1544 2028 svchost.exe 54 PID 2028 wrote to memory of 1544 2028 svchost.exe 54 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c1dfafc437e8cb6b57dd0729cb39822.exe"C:\Users\Admin\AppData\Local\Temp\6c1dfafc437e8cb6b57dd0729cb39822.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:2600
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:2684
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Windows\System\dc.exe"C:\Windows\System\dc.exe" /D2⤵
- Modifies security service
- Executes dropped EXE
- Windows security modification
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2520
-
-
C:\Windows\system32\schtasks.exeschtasks /delete /TN "Timer"2⤵PID:2120
-
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM2⤵
- Creates scheduled task(s)
PID:2776
-
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:580
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:1808
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:804
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-
C:\Windows\System\dc.exe"C:\Windows\System\dc.exe" /D3⤵
- Modifies security service
- Executes dropped EXE
- Windows security modification
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1544
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2344
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2332
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD507232b64be72593980cd952e8f85017e
SHA161dba57cc51f4501ace3520e2cf559d8e42e04d7
SHA256ef342bcc3c938c2fa9b38bc84019d8dce94d018372f7d9c29a8ee7ff3f0fc3a8
SHA512d5417f270e14fe3437c0d017e037117001377379475531b70f9d6840548dd830117fbf62c152c9af09f586bdf944edac330bc560cca4fa45105269319e7158cb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5028b19e1330b70f8ffe852f05cc18590
SHA1d98a81ecfa7eeac3f325edae7fc0613ccef7461f
SHA25681be1b8a88d51d15c9a8c21d9f601483a7595f90262a4d521ec0de2c740e3690
SHA512463450e61727b2c13a4b77557a4053c9d34741eba4af9add5ae51c8cc77bb2483041c559ebd7db15e3ef1e9dfe779e1d53a60de49626b1abd8a962596ab6cba2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\O5V8MN1C7X5Y8LBFMBZN.temp
Filesize7KB
MD54b4ae43632a13c23b709a1a81c07b143
SHA1972a38f36e0edd20378afaa0c2db4989c14ebd16
SHA256879bf2ef8ce83e4aa54798185af512cc23f9154c577aa59537112fd554fb5922
SHA5127e15746eb7e0ca0bb8d301740626cc65be2a588bef0b21e0a9a8ac59ea805a827b1dee6e0ca228bf6650404dd2420bfb16e7d7ec1dfde548767f6e39e99bf8cf
-
Filesize
160B
MD558f8eb09a822c09fc11f5a42baae36f1
SHA19e7063eeee62c8588e0020bef3a116e9379966aa
SHA2566509c7fc4fa70391399831bbc3d66206d3f6f8f2bb20ffcac4e04844861d733a
SHA51253806780934bd86bb032ee4a515dfc0e8464a5ecc5f4c8c593304fcd969c1058d443bdec54e7ae21469adb942b16693cc9eaf997217adc69d3618ab0ec99dc1e
-
Filesize
233B
MD5cd4326a6fd01cd3ca77cfd8d0f53821b
SHA1a1030414d1f8e5d5a6e89d5a309921b8920856f9
SHA2561c59482111e657ef5190e22de6c047609a67e46e28d67fd70829882fd8087a9c
SHA51229ce5532fb3adf55caa011e53736507fbf241afee9d3ca516a1d9bffec6e5cb2f87c4cd73e4da8c33b8706f96ba3b31f13ce229746110d5bd248839f67ec6d67
-
Filesize
640KB
MD56578c690e27d738a171d8a3048b4edee
SHA1ea9990d26769e037a527dd7d926bc568ab9be987
SHA256ec44d62bcbb98f9974f4db44d0042dac8c997ab2a850e4854a6e653858b2debb
SHA5123ac669fb1b046e87b9fb10cb768b0e416db71ccdb8af4ba0bd885ed1d2dfd20fbecb3c9988d2cdcddd6f648c3495b838e982d94b33d48ad1ee4deef8e34e9759
-
Filesize
396KB
MD52a9e0d06af8c237ea2a2351769d07fd4
SHA1874075b125d5c93e8b60d8e44552c1732ae8596a
SHA256c97576e83cf92c96a78be3cb99167761b7df33e488c45aa826c1321dbb39759c
SHA5129b9a3b8d605218bd0f05916b5567644559c9a960c98fa8a8a618fb067a34b0cf971b50bdcbd2ebd7870a36a40baded94d70632effca5f11a0ccb300939a50d46
-
Filesize
452KB
MD578225b04046708beb19acf672aca3937
SHA129880b20895f4eca6d87833d8438d8c7e9364808
SHA2567904ae0067062cbe0f1de22150bda633b2b886cb9d575327e0ad9aaf52868ee9
SHA512aa73f9560073a839d69d183daf954ee4460d0894f6ec52be003505a4989720acce364b3986f596e9452130800af349720c1ffda0e7be2a6baac0dbfbe7535bd5
-
Filesize
763KB
MD50a50081a6cd37aea0945c91de91c5d97
SHA1755309c6d9fa4cd13b6c867cde01cc1e0d415d00
SHA2566606d759667fbdfaa46241db7ffb4839d2c47b88a20120446f41e916cad77d0b
SHA512f0a4e9a3dc065df2182527b17077c822d4535db86bf61f5ee795ee469b15159560a8e81e60d3037f3de1bb38e92f0fc8a422c2656882650d699e2b96948f9846
-
Filesize
533KB
MD51c28d234dd008f9be083be96c15c9dce
SHA1e33e5f4854c28158fa54cbb815d4a67a8cefd662
SHA256559bc908d07366a9db0572ca77c98404aaa5c7b60baea7aaf5af71f980464080
SHA51246286722c7f411a140c40ccf8afed48981ff139acce164e105c1126b76d7ccb9dbde5debb4a2940ae1d40439783a28b810eb8f0ad97333a0317e4d0f0eff7f57
-
Filesize
1.1MB
MD56c1dfafc437e8cb6b57dd0729cb39822
SHA192d61dc5bc58d94e3bc1d672e27bfe8133056b8a
SHA25612782684d8480075ea8ece059fd7a364c46ab53bcf9094e44f5cfccd57d335cb
SHA512d82a0a86d9dbe499ca3a7b62fbe447272746ae88202479b850701e01b2ea724acf6e8a35be6be04331bbdf37e2769c5d11a70cdf449a599273c533de3eee7638