Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2024, 08:00

General

  • Target

    Algoesthesiometer/Kvitteringer/Naaletrs.ps1

  • Size

    45KB

  • MD5

    134c07fce8184c599cb40754d2ae6db7

  • SHA1

    af5f44ed3b7ab716af0a5b683218f5ca96b0175c

  • SHA256

    a17d8d7ec7a761817970478b591b1b8e69d41119636067ce4d221e72b9ca058a

  • SHA512

    82c58aa95897217226a15674154b5c0a567962c60bd60ecdb98b486767391b05eaa2d03bcadcf6cf102aaa632f5bb2527af791b9e7049cde112107a3c874c221

  • SSDEEP

    768:L9FgRj8sOglYNISbpapSUGxX+V8k0R6ljVP1W2HXhqIwKjLdHmH1BsB7WHl4C+bK:L9FgRIgMtpapS0WRapM2HFZjFK/l4dK

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 17 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Algoesthesiometer\Kvitteringer\Naaletrs.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1064
    • C:\Windows\system32\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "1064" "1072"
      2⤵
        PID:1220
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2896

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259423107.txt

      Filesize

      1KB

      MD5

      5a70215fc20ee0b56537cb13b7e0382a

      SHA1

      647dbef60402582b806bbf667e83e36b2792dabd

      SHA256

      498bdb896aa765ec711b34f33dc46a2a9dacd8337e624121ca04544428f4d820

      SHA512

      31273854936e16338841f510ed56e3eadaaf29a8129c4bd58065ede653fb43e20a17314ed474a345eb217614e9eaa462258cddd520e6e39cb36ed8526509e56d

    • memory/1064-13-0x0000000002690000-0x0000000002710000-memory.dmp

      Filesize

      512KB

    • memory/1064-6-0x0000000001DF0000-0x0000000001DF8000-memory.dmp

      Filesize

      32KB

    • memory/1064-5-0x000007FEF5EB0000-0x000007FEF684D000-memory.dmp

      Filesize

      9.6MB

    • memory/1064-9-0x0000000002690000-0x0000000002710000-memory.dmp

      Filesize

      512KB

    • memory/1064-8-0x000007FEF5EB0000-0x000007FEF684D000-memory.dmp

      Filesize

      9.6MB

    • memory/1064-10-0x0000000002690000-0x0000000002710000-memory.dmp

      Filesize

      512KB

    • memory/1064-7-0x0000000002690000-0x0000000002710000-memory.dmp

      Filesize

      512KB

    • memory/1064-16-0x0000000002950000-0x0000000002954000-memory.dmp

      Filesize

      16KB

    • memory/1064-11-0x0000000002690000-0x0000000002710000-memory.dmp

      Filesize

      512KB

    • memory/1064-17-0x0000000002690000-0x0000000002710000-memory.dmp

      Filesize

      512KB

    • memory/1064-4-0x000000001B320000-0x000000001B602000-memory.dmp

      Filesize

      2.9MB

    • memory/1064-18-0x000007FEF5EB0000-0x000007FEF684D000-memory.dmp

      Filesize

      9.6MB

    • memory/2896-19-0x0000000004190000-0x0000000004191000-memory.dmp

      Filesize

      4KB

    • memory/2896-20-0x0000000004190000-0x0000000004191000-memory.dmp

      Filesize

      4KB

    • memory/2896-24-0x00000000039C0000-0x00000000039D0000-memory.dmp

      Filesize

      64KB