Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

24/02/2024, 19:03

240224-xqmxmsbg52 3

24/02/2024, 16:14

240224-tpyqzagc67 1

24/02/2024, 16:11

240224-tm7wvsgc32 4

24/02/2024, 16:11

240224-tmycesgc27 1

24/02/2024, 16:09

240224-tls2baha4s 1

24/02/2024, 16:07

240224-tkqvkagb79 3

Analysis

  • max time kernel
    35s
  • max time network
    36s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    24/02/2024, 16:07

Errors

Reason
Machine shutdown

General

  • Target

    NITROGEN/NITROGEN.vbs

  • Size

    224B

  • MD5

    e485af611d0d005a5094eed1778a4ff7

  • SHA1

    2a299d4703ddf8471c187cb58f9e33abed0e9264

  • SHA256

    34147011e951b5672b7cf571a2380b135f13edf2b8624b08845f916193d658a5

  • SHA512

    5d0b58f7136035cb6e4dc4b77ef00dae946f14e517a049af2914413bc01f6eca470ccf6d637f2d050b40de3fbe7bb1b687b645e2a532237f52007b6ffe558d24

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\NITROGEN\NITROGEN.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Windows\System32\shutdown.exe
      "C:\Windows\System32\shutdown.exe" -s -t 01
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1992
  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3856
  • C:\Windows\System32\PickerHost.exe
    C:\Windows\System32\PickerHost.exe -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2508
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa3a0e055 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:3096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

    Filesize

    10KB

    MD5

    d3c1574e06e9c0ed4ddfecf7eda00476

    SHA1

    e90dcb7eeb77fdeee2883c9c99fea03c50f80eca

    SHA256

    0b643c95e32e8cb6c8ad9a28231243f3d028db10560130aabe10cd65c62dace7

    SHA512

    06a7e8fa4859fd6902e842760ab1be755247ced2cb5d5b92fda7e25483749d2a65acc7ada0dd351c943711eef033f152137aafc18b5283bf3c310737b8b7077b