Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/03/2024, 02:11

General

  • Target

    Schizopod/Nonmakeup101.ps1

  • Size

    53KB

  • MD5

    2e56e126a7f68c9dbb6167bfc1cd26c2

  • SHA1

    e45b4e9dff74f0711968994253b8fcaf39a5f8e3

  • SHA256

    b3fb58fdae2d31784f1b1c4f62b2c20a985789de7cb63b6e4748168aac4fb70a

  • SHA512

    15b0861ae57b05cc8906d8706332797da2152d44f16ba4c89da37fc6ec5753d543e890d898ecda384bcf1cf18894291a94262959dd7f395649e220629a814e3d

  • SSDEEP

    1536:Gz9YtlEnPI/VDPvl1vT47lZs98nds/Z5m3:0beDPtBTEaE2/C

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 30 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Schizopod\Nonmakeup101.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
      2⤵
        PID:2980
      • C:\Windows\system32\wermgr.exe
        "C:\Windows\system32\wermgr.exe" "-outproc" "1152" "1140"
        2⤵
          PID:2372
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2760

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\OutofProcReport259445193.txt

        Filesize

        1KB

        MD5

        42c7714bf79533439dc5b42730e5cb73

        SHA1

        44d92d433254c8d9b4ed2beaebd7ff81d18d011c

        SHA256

        fb9fae4500bab6708d483825e98dad8f1c3d3ef73e07a633fcc421f55cde6be9

        SHA512

        df22c4d488a365d1250fd5a088460464ce7c2899f8007b5a76d6feb1c879449e55de35d0b3f2347ff893a1909da7350b46b6ae3a96d840d804af28c714278028

      • memory/1152-13-0x0000000002630000-0x00000000026B0000-memory.dmp

        Filesize

        512KB

      • memory/1152-5-0x000007FEF61C0000-0x000007FEF6B5D000-memory.dmp

        Filesize

        9.6MB

      • memory/1152-7-0x0000000002630000-0x00000000026B0000-memory.dmp

        Filesize

        512KB

      • memory/1152-8-0x000007FEF61C0000-0x000007FEF6B5D000-memory.dmp

        Filesize

        9.6MB

      • memory/1152-9-0x0000000002630000-0x00000000026B0000-memory.dmp

        Filesize

        512KB

      • memory/1152-10-0x0000000002630000-0x00000000026B0000-memory.dmp

        Filesize

        512KB

      • memory/1152-4-0x000000001B160000-0x000000001B442000-memory.dmp

        Filesize

        2.9MB

      • memory/1152-19-0x000007FEF61C0000-0x000007FEF6B5D000-memory.dmp

        Filesize

        9.6MB

      • memory/1152-11-0x0000000002630000-0x00000000026B0000-memory.dmp

        Filesize

        512KB

      • memory/1152-15-0x000000001B660000-0x000000001B664000-memory.dmp

        Filesize

        16KB

      • memory/1152-6-0x0000000002570000-0x0000000002578000-memory.dmp

        Filesize

        32KB

      • memory/1152-18-0x0000000002630000-0x00000000026B0000-memory.dmp

        Filesize

        512KB

      • memory/2760-14-0x00000000043B0000-0x00000000043B1000-memory.dmp

        Filesize

        4KB

      • memory/2760-20-0x00000000043B0000-0x00000000043B1000-memory.dmp

        Filesize

        4KB

      • memory/2760-24-0x0000000002570000-0x0000000002580000-memory.dmp

        Filesize

        64KB