Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
8e9fea5458c969eaf662771d87e2e9d2487e904e5dbeea5d90fc7e44369c3f95.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8e9fea5458c969eaf662771d87e2e9d2487e904e5dbeea5d90fc7e44369c3f95.exe
Resource
win10v2004-20240319-en
Behavioral task
behavioral3
Sample
Paleolimnology/ansgningsfristernes/Dishonorables/Sweety64.ps1
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Paleolimnology/ansgningsfristernes/Dishonorables/Sweety64.ps1
Resource
win10v2004-20240226-en
General
-
Target
Paleolimnology/ansgningsfristernes/Dishonorables/Sweety64.ps1
-
Size
61KB
-
MD5
e5c2dca2119f3e664238f0f51539dbb5
-
SHA1
24fc5d8ac634d19acafbf78852482014c052f996
-
SHA256
b3f8b29f9da552c657a02fbadad0745e365ea1d548fe22ddbfb3e9450eb29837
-
SHA512
458178c3e2f344a9f28a505c870667d5f3387c7cdd0b6cde22ff428e460b2d433f2653b7516fc5698837e41a635e31f2f59564a33631e938b0801749c6f7b7a6
-
SSDEEP
1536:wOnRUJt1Yo/oPn0xI1lp85xiLpcdL/mJf7RUw++4:eJt1Yoh+zgwpKKJdb4
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2952 powershell.exe 2952 powershell.exe 2952 powershell.exe 2952 powershell.exe 2952 powershell.exe 2952 powershell.exe 2952 powershell.exe 2952 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2416 explorer.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 2952 powershell.exe Token: SeShutdownPrivilege 2416 explorer.exe Token: SeShutdownPrivilege 2416 explorer.exe Token: SeShutdownPrivilege 2416 explorer.exe Token: SeShutdownPrivilege 2416 explorer.exe Token: SeShutdownPrivilege 2416 explorer.exe Token: SeShutdownPrivilege 2416 explorer.exe Token: SeShutdownPrivilege 2416 explorer.exe Token: SeShutdownPrivilege 2416 explorer.exe Token: SeShutdownPrivilege 2416 explorer.exe Token: SeShutdownPrivilege 2416 explorer.exe Token: SeShutdownPrivilege 2416 explorer.exe Token: SeShutdownPrivilege 2416 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe 2416 explorer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2596 2952 powershell.exe 29 PID 2952 wrote to memory of 2596 2952 powershell.exe 29 PID 2952 wrote to memory of 2596 2952 powershell.exe 29 PID 2952 wrote to memory of 2604 2952 powershell.exe 31 PID 2952 wrote to memory of 2604 2952 powershell.exe 31 PID 2952 wrote to memory of 2604 2952 powershell.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Paleolimnology\ansgningsfristernes\Dishonorables\Sweety64.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "set /A 1^^0"2⤵PID:2596
-
-
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "2952" "1128"2⤵PID:2604
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59e0d9b2e4ce272d89e72ed916432ee43
SHA19659481e162b115acfe8c6468866f528b5c28d5a
SHA256ecf2bd3e082eadd42de9a4b50e9fdb7ee2a203561437d1dae66825041e4436bb
SHA5128674b8cb47e7afb294d4ba6296892605bf91c45260a4986a09190cf0b2ab1214dc88c3b0ebc2beb295fa35ccbeab6fc722fda0ac8978d15df15e971cb50b9512