Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/03/2024, 02:11
Static task
static1
Behavioral task
behavioral1
Sample
Bibeskftigelserne221.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Bibeskftigelserne221.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Schizopod/Nonmakeup101.ps1
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Schizopod/Nonmakeup101.ps1
Resource
win10v2004-20240226-en
General
-
Target
Schizopod/Nonmakeup101.ps1
-
Size
53KB
-
MD5
2e56e126a7f68c9dbb6167bfc1cd26c2
-
SHA1
e45b4e9dff74f0711968994253b8fcaf39a5f8e3
-
SHA256
b3fb58fdae2d31784f1b1c4f62b2c20a985789de7cb63b6e4748168aac4fb70a
-
SHA512
15b0861ae57b05cc8906d8706332797da2152d44f16ba4c89da37fc6ec5753d543e890d898ecda384bcf1cf18894291a94262959dd7f395649e220629a814e3d
-
SSDEEP
1536:Gz9YtlEnPI/VDPvl1vT47lZs98nds/Z5m3:0beDPtBTEaE2/C
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1152 powershell.exe 1152 powershell.exe 1152 powershell.exe 1152 powershell.exe 1152 powershell.exe 1152 powershell.exe 1152 powershell.exe 1152 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2760 explorer.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 1152 powershell.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe Token: SeShutdownPrivilege 2760 explorer.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe 2760 explorer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2980 1152 powershell.exe 29 PID 1152 wrote to memory of 2980 1152 powershell.exe 29 PID 1152 wrote to memory of 2980 1152 powershell.exe 29 PID 1152 wrote to memory of 2372 1152 powershell.exe 33 PID 1152 wrote to memory of 2372 1152 powershell.exe 33 PID 1152 wrote to memory of 2372 1152 powershell.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Schizopod\Nonmakeup101.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "set /A 1^^0"2⤵PID:2980
-
-
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "1152" "1140"2⤵PID:2372
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD542c7714bf79533439dc5b42730e5cb73
SHA144d92d433254c8d9b4ed2beaebd7ff81d18d011c
SHA256fb9fae4500bab6708d483825e98dad8f1c3d3ef73e07a633fcc421f55cde6be9
SHA512df22c4d488a365d1250fd5a088460464ce7c2899f8007b5a76d6feb1c879449e55de35d0b3f2347ff893a1909da7350b46b6ae3a96d840d804af28c714278028