Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
17/04/2024, 12:37
240417-pths4afc45 817/04/2024, 12:37
240417-ptg7kafc43 817/04/2024, 12:36
240417-ptcbbafc34 817/04/2024, 12:36
240417-ptbpsafc29 817/04/2024, 12:36
240417-pta39afc28 816/04/2024, 13:44
240416-q1vxnsda7z 8Analysis
-
max time kernel
300s -
max time network
303s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 13:44
Static task
static1
Behavioral task
behavioral1
Sample
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral4
Sample
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
Resource
win11-20240412-en
General
-
Target
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
-
Size
5.3MB
-
MD5
63552c60caeefe5f2d0e4028b3cc65d3
-
SHA1
dbed3040d53495a6afda01bfb8399376792eb48c
-
SHA256
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab
-
SHA512
caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0
-
SSDEEP
98304:vwrOjNr08jQxkFg97Nw76XgfqCPa1AQy2cmw:YC5r0wQxKg97Nw76XgyC6
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 6 IoCs
pid Process 2280 netsh.exe 2296 netsh.exe 1668 netsh.exe 2460 netsh.exe 2404 netsh.exe 2316 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 2356 svchost.exe 2224 ~tl7955.tmp 1908 svchost.exe 1628 ~tl51B9.tmp -
Loads dropped DLL 8 IoCs
pid Process 2372 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 2372 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 2356 svchost.exe 2356 svchost.exe 2224 ~tl7955.tmp 2224 ~tl7955.tmp 1908 svchost.exe 1908 svchost.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\System\svchost.exe 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\System\xxx1.bak ~tl7955.tmp File opened for modification C:\Windows\System\svchost.exe ~tl7955.tmp File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\System\xxx1.bak 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe File created C:\Windows\System\svchost.exe 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2912 schtasks.exe 2176 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2672 powershell.exe 2668 powershell.exe 2372 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 1968 powershell.exe 528 powershell.exe 2224 ~tl7955.tmp 2428 powershell.exe 2440 powershell.exe 2224 ~tl7955.tmp 1908 svchost.exe 280 powershell.exe 1392 powershell.exe 1628 ~tl51B9.tmp 1000 powershell.exe 2752 powershell.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2672 powershell.exe Token: SeDebugPrivilege 2668 powershell.exe Token: SeDebugPrivilege 1968 powershell.exe Token: SeDebugPrivilege 528 powershell.exe Token: SeDebugPrivilege 2428 powershell.exe Token: SeDebugPrivilege 2440 powershell.exe Token: SeDebugPrivilege 280 powershell.exe Token: SeDebugPrivilege 1392 powershell.exe Token: SeDebugPrivilege 1000 powershell.exe Token: SeDebugPrivilege 2752 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2672 2372 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 28 PID 2372 wrote to memory of 2672 2372 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 28 PID 2372 wrote to memory of 2672 2372 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 28 PID 2372 wrote to memory of 2668 2372 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 30 PID 2372 wrote to memory of 2668 2372 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 30 PID 2372 wrote to memory of 2668 2372 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 30 PID 2372 wrote to memory of 2912 2372 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 32 PID 2372 wrote to memory of 2912 2372 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 32 PID 2372 wrote to memory of 2912 2372 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 32 PID 2372 wrote to memory of 2356 2372 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 34 PID 2372 wrote to memory of 2356 2372 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 34 PID 2372 wrote to memory of 2356 2372 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 34 PID 2356 wrote to memory of 1968 2356 svchost.exe 37 PID 2356 wrote to memory of 1968 2356 svchost.exe 37 PID 2356 wrote to memory of 1968 2356 svchost.exe 37 PID 2356 wrote to memory of 528 2356 svchost.exe 39 PID 2356 wrote to memory of 528 2356 svchost.exe 39 PID 2356 wrote to memory of 528 2356 svchost.exe 39 PID 2356 wrote to memory of 2224 2356 svchost.exe 41 PID 2356 wrote to memory of 2224 2356 svchost.exe 41 PID 2356 wrote to memory of 2224 2356 svchost.exe 41 PID 2224 wrote to memory of 2584 2224 ~tl7955.tmp 44 PID 2224 wrote to memory of 2584 2224 ~tl7955.tmp 44 PID 2224 wrote to memory of 2584 2224 ~tl7955.tmp 44 PID 2224 wrote to memory of 2460 2224 ~tl7955.tmp 46 PID 2224 wrote to memory of 2460 2224 ~tl7955.tmp 46 PID 2224 wrote to memory of 2460 2224 ~tl7955.tmp 46 PID 2224 wrote to memory of 2404 2224 ~tl7955.tmp 48 PID 2224 wrote to memory of 2404 2224 ~tl7955.tmp 48 PID 2224 wrote to memory of 2404 2224 ~tl7955.tmp 48 PID 2224 wrote to memory of 2428 2224 ~tl7955.tmp 50 PID 2224 wrote to memory of 2428 2224 ~tl7955.tmp 50 PID 2224 wrote to memory of 2428 2224 ~tl7955.tmp 50 PID 2224 wrote to memory of 2440 2224 ~tl7955.tmp 52 PID 2224 wrote to memory of 2440 2224 ~tl7955.tmp 52 PID 2224 wrote to memory of 2440 2224 ~tl7955.tmp 52 PID 2224 wrote to memory of 1696 2224 ~tl7955.tmp 54 PID 2224 wrote to memory of 1696 2224 ~tl7955.tmp 54 PID 2224 wrote to memory of 1696 2224 ~tl7955.tmp 54 PID 2224 wrote to memory of 2176 2224 ~tl7955.tmp 56 PID 2224 wrote to memory of 2176 2224 ~tl7955.tmp 56 PID 2224 wrote to memory of 2176 2224 ~tl7955.tmp 56 PID 2224 wrote to memory of 1908 2224 ~tl7955.tmp 58 PID 2224 wrote to memory of 1908 2224 ~tl7955.tmp 58 PID 2224 wrote to memory of 1908 2224 ~tl7955.tmp 58 PID 1908 wrote to memory of 1816 1908 svchost.exe 60 PID 1908 wrote to memory of 1816 1908 svchost.exe 60 PID 1908 wrote to memory of 1816 1908 svchost.exe 60 PID 1908 wrote to memory of 2316 1908 svchost.exe 62 PID 1908 wrote to memory of 2316 1908 svchost.exe 62 PID 1908 wrote to memory of 2316 1908 svchost.exe 62 PID 1908 wrote to memory of 2280 1908 svchost.exe 64 PID 1908 wrote to memory of 2280 1908 svchost.exe 64 PID 1908 wrote to memory of 2280 1908 svchost.exe 64 PID 1908 wrote to memory of 280 1908 svchost.exe 66 PID 1908 wrote to memory of 280 1908 svchost.exe 66 PID 1908 wrote to memory of 280 1908 svchost.exe 66 PID 1908 wrote to memory of 1392 1908 svchost.exe 68 PID 1908 wrote to memory of 1392 1908 svchost.exe 68 PID 1908 wrote to memory of 1392 1908 svchost.exe 68 PID 1908 wrote to memory of 1628 1908 svchost.exe 70 PID 1908 wrote to memory of 1628 1908 svchost.exe 70 PID 1908 wrote to memory of 1628 1908 svchost.exe 70 PID 1628 wrote to memory of 3032 1628 ~tl51B9.tmp 72 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe"C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM2⤵
- Creates scheduled task(s)
PID:2912
-
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:528
-
-
C:\Users\Admin\AppData\Local\Temp\~tl7955.tmpC:\Users\Admin\AppData\Local\Temp\~tl7955.tmp3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645114⤵PID:2584
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2460
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2404
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
-
C:\Windows\system32\schtasks.exeschtasks /delete /TN "Timer"4⤵PID:1696
-
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM4⤵
- Creates scheduled task(s)
PID:2176
-
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645115⤵PID:1816
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:2316
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:2280
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:280
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1392
-
-
C:\Users\Admin\AppData\Local\Temp\~tl51B9.tmpC:\Users\Admin\AppData\Local\Temp\~tl51B9.tmp5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645116⤵PID:3032
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:2296
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:1668
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1000
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD58152d75e0d26a4aba255c222f7bd7370
SHA1df5d799d1540eeca1ee6e1e3efb65ecb7d6b6205
SHA256f19cc2e21ea04170df97c5a7fb8886298a8bc64f2b4f3cfaffaab565dfae65a8
SHA51242443ed036defd34472e4119eb2cd3cbdb45239c1cddc93e8f1530ac63e5a8d9b6f42ee609212e7ba539a49b7c436a50982e4c246c1c8110172afdffbdd0a710
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\CEBE9IC1SUICIABKFBBA.temp
Filesize7KB
MD57164b9ae2edeb4612b6d3d3e92684d03
SHA13be33c8f09092c3184f0a83e0b25f5b88338c3cf
SHA2565a34ecef671bebfdaa5601c0df8aa08a354ff8a8ce859825838cbe90de8810c5
SHA512631651652578467955a6d847d18482e37a4b99c2dcbdbb373eb8461c1f2167ed14db0480f8daec5b00b36e8e8c82f4e068c3858f0294a6e21b92535d156ad05c
-
Filesize
2.6MB
MD519a1ff4739901b80c88834cf7d4925eb
SHA175dec3747387d1a54035c9ae1ce7bc7488bec125
SHA2561f23e720888ae52453dfe0df103aa9fd98e6e77f9ceba6c8798ba64339b26e61
SHA512e3e0302c24bc98b07d640492a691a6d6d31a8345cf443a00d086eb91ae8a8bc26e90b3daf38288d6e2da0098097c60fb05e2e94971a4ba1c45654b357d060ac1
-
Filesize
7.0MB
MD52a753d8fe84bc87c05118b8111ba18ac
SHA1c7071af69671f896e4c2112f2d1efbfcdcfc627d
SHA256fafcd3ecdc9f6e2388d94cbb186c84160ebd9be87227ff6b30a81132841e1e81
SHA5127cdd05287bc1b4185e8aad4b836d86a47d88419d3d2845c470b34c78ec1d342f758631cded2b1c21e92c136140c2b11b1c6a41b0517f9aef5cdedca3f29d18c0
-
Filesize
5.3MB
MD563552c60caeefe5f2d0e4028b3cc65d3
SHA1dbed3040d53495a6afda01bfb8399376792eb48c
SHA25664e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab
SHA512caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0
-
Filesize
393KB
MD59dbdd43a2e0b032604943c252eaf634a
SHA19584dc66f3c1cce4210fdf827a1b4e2bb22263af
SHA25633c53cd5265502e7b62432dba0e1b5ed702b5007cc79973ccd1e71b2acc01e86
SHA512b7b20b06dac952a96eda254bad29966fe7a4f827912beb0bc66d5af5b302d7c0282d70c1b01ff782507dd03a1d58706f05cb157521c7f2887a43085ffe5f94d1
-
Filesize
385KB
MD5e802c96760e48c5139995ffb2d891f90
SHA1bba3d278c0eb1094a26e5d2f4c099ad685371578
SHA256cb82ea45a37f8f79d10726a7c165aa5b392b68d5ac954141129c1762a539722c
SHA51297300ac501be6b6ea3ac1915361dd472824fe612801cab8561a02c7df071b1534190d2d5ef872d89d24c8c915b88101e7315f948f53215c2538d661181e3a5f0