Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

17/04/2024, 12:37

240417-pths4afc45 8

17/04/2024, 12:37

240417-ptg7kafc43 8

17/04/2024, 12:36

240417-ptcbbafc34 8

17/04/2024, 12:36

240417-ptbpsafc29 8

17/04/2024, 12:36

240417-pta39afc28 8

16/04/2024, 13:44

240416-q1vxnsda7z 8

Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    17/04/2024, 12:36

General

  • Target

    64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe

  • Size

    5.3MB

  • MD5

    63552c60caeefe5f2d0e4028b3cc65d3

  • SHA1

    dbed3040d53495a6afda01bfb8399376792eb48c

  • SHA256

    64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab

  • SHA512

    caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0

  • SSDEEP

    98304:vwrOjNr08jQxkFg97Nw76XgfqCPa1AQy2cmw:YC5r0wQxKg97Nw76XgyC6

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
    "C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:388
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3632
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3728
    • C:\Windows\SYSTEM32\schtasks.exe
      schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
      2⤵
      • Creates scheduled task(s)
      PID:4424
    • C:\Windows\System\svchost.exe
      "C:\Windows\System\svchost.exe" formal
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2480
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4296
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2760
      • C:\Users\Admin\AppData\Local\Temp\~tlE12F.tmp
        C:\Users\Admin\AppData\Local\Temp\~tlE12F.tmp
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3804
        • C:\Windows\SYSTEM32\netsh.exe
          netsh int ipv4 set dynamicport tcp start=1025 num=64511
          4⤵
            PID:2740
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:4436
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:984
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
            4⤵
              PID:356
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
              4⤵
                PID:4244

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

          Filesize

          2KB

          MD5

          cd5b15b46b9fe0d89c2b8d351c303d2a

          SHA1

          e1d30a8f98585e20c709732c013e926c7078a3c2

          SHA256

          0a8a0dcbec27e07c8dc9ef31622ac41591871416ccd9146f40d8cc9a2421da7a

          SHA512

          d7261b2ff89adcdb909b775c6a47b3cd366b7c3f5cbb4f60428e849582c93e14e76d7dcadec79003eef7c9a3059e305d5e4f6b5b912b9ebc3518e06b0d284dd7

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          08780c2b38dfe5b4a4d66b64b21e248e

          SHA1

          0bd089cd64d6ad092408e94b1900fede998e57ba

          SHA256

          de85bf4d7891113231a13ec7a68e3abc08dd0abe307f034efd57b6e594f55a2b

          SHA512

          11b642c5b4d18e27a9732528072147177870e57c8b1964b0b098b802c6f6f4a6dc21381cc334d7bed245b74d9952400720224ee6f2de3a893c4b1aae17af5c8f

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          70195821da95053d486898e72ca39861

          SHA1

          4a2f0acb403ee4e6924ccbf883cfbf692fb7ea6b

          SHA256

          f9db9a2c6dae797aae3469c244a37a5ffafde932a8d8749a63d4ad2ac404b5ad

          SHA512

          f0459bb977fc5ca4ff78edf5420ad3553d66cfd6231aeae4c80ae12ffd6858fe140da95554b0c81d487c31e8b7b1d66bacc6da0582262cbf8465e94b6569139b

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bvlp3lrz.hmb.ps1

          Filesize

          1B

          MD5

          c4ca4238a0b923820dcc509a6f75849b

          SHA1

          356a192b7913b04c54574d18c28d46e6395428ab

          SHA256

          6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

          SHA512

          4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

        • C:\Users\Admin\AppData\Local\Temp\~tlE12F.tmp

          Filesize

          385KB

          MD5

          e802c96760e48c5139995ffb2d891f90

          SHA1

          bba3d278c0eb1094a26e5d2f4c099ad685371578

          SHA256

          cb82ea45a37f8f79d10726a7c165aa5b392b68d5ac954141129c1762a539722c

          SHA512

          97300ac501be6b6ea3ac1915361dd472824fe612801cab8561a02c7df071b1534190d2d5ef872d89d24c8c915b88101e7315f948f53215c2538d661181e3a5f0

        • C:\Users\Admin\AppData\Roaming\tor\cached-microdesc-consensus.tmp

          Filesize

          2.6MB

          MD5

          8c29dca81612f559ac2e9aa5012896e4

          SHA1

          e7b504c8be6ae987ced54380dc2a34d03c613ef7

          SHA256

          b8ac5707fb24e123ee2bb53e97cfb166b3e86f1ee46b36bef7c41cf0f58047fd

          SHA512

          7c910b5c97dc3f556d35c9b48dd5ea4c4b55827bb66b508347c63650ad744f3992280df808a187f06daede1895347c46787fd110ba2015f92a927ab1f650a98c

        • C:\Users\Admin\AppData\Roaming\tor\cached-microdescs.new

          Filesize

          12.4MB

          MD5

          7cfd40218d8fa06ca99d65ab7d000950

          SHA1

          795d9ca6e9348a9d0c8d0668ca1c9b61783e1926

          SHA256

          c54aaa54b29887a1ab5a21e62a5be0a53a4a99e9baf3226625f9023b11ce1fe0

          SHA512

          cf9dc76f971ac715e58a112f4b65027fa88af025f114670f2b6a985d2b44a068902f89e033842423ded0dc6a0789d459e228917798fb844669e70b7309787f69

        • C:\Windows\System\svchost.exe

          Filesize

          5.3MB

          MD5

          63552c60caeefe5f2d0e4028b3cc65d3

          SHA1

          dbed3040d53495a6afda01bfb8399376792eb48c

          SHA256

          64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab

          SHA512

          caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0

        • memory/356-297-0x0000022EEF190000-0x0000022EEF1A0000-memory.dmp

          Filesize

          64KB

        • memory/356-296-0x00007FFFBCB90000-0x00007FFFBD57C000-memory.dmp

          Filesize

          9.9MB

        • memory/356-299-0x0000022EEF190000-0x0000022EEF1A0000-memory.dmp

          Filesize

          64KB

        • memory/388-0-0x0000000140000000-0x0000000140644400-memory.dmp

          Filesize

          6.3MB

        • memory/388-6-0x0000000140000000-0x0000000140644400-memory.dmp

          Filesize

          6.3MB

        • memory/388-3-0x0000000140000000-0x0000000140644400-memory.dmp

          Filesize

          6.3MB

        • memory/388-4-0x0000000140000000-0x0000000140644400-memory.dmp

          Filesize

          6.3MB

        • memory/388-5-0x0000000140000000-0x0000000140644400-memory.dmp

          Filesize

          6.3MB

        • memory/388-119-0x0000000140000000-0x0000000140644400-memory.dmp

          Filesize

          6.3MB

        • memory/2480-278-0x0000000140000000-0x0000000140644400-memory.dmp

          Filesize

          6.3MB

        • memory/2480-124-0x0000000140000000-0x0000000140644400-memory.dmp

          Filesize

          6.3MB

        • memory/2480-279-0x0000000140000000-0x0000000140644400-memory.dmp

          Filesize

          6.3MB

        • memory/2480-242-0x0000000140000000-0x0000000140644400-memory.dmp

          Filesize

          6.3MB

        • memory/2480-227-0x0000000015440000-0x000000001593C000-memory.dmp

          Filesize

          5.0MB

        • memory/2480-287-0x0000000140000000-0x0000000140644400-memory.dmp

          Filesize

          6.3MB

        • memory/2480-125-0x0000000140000000-0x0000000140644400-memory.dmp

          Filesize

          6.3MB

        • memory/2760-139-0x000002701E140000-0x000002701E150000-memory.dmp

          Filesize

          64KB

        • memory/2760-218-0x000002701E140000-0x000002701E150000-memory.dmp

          Filesize

          64KB

        • memory/2760-132-0x00007FFFCCA10000-0x00007FFFCD3FC000-memory.dmp

          Filesize

          9.9MB

        • memory/2760-137-0x000002701E140000-0x000002701E150000-memory.dmp

          Filesize

          64KB

        • memory/2760-174-0x000002701E140000-0x000002701E150000-memory.dmp

          Filesize

          64KB

        • memory/2760-225-0x00007FFFCCA10000-0x00007FFFCD3FC000-memory.dmp

          Filesize

          9.9MB

        • memory/3632-15-0x00007FFFCCAA0000-0x00007FFFCD48C000-memory.dmp

          Filesize

          9.9MB

        • memory/3632-106-0x0000028524710000-0x0000028524720000-memory.dmp

          Filesize

          64KB

        • memory/3632-20-0x0000028524710000-0x0000028524720000-memory.dmp

          Filesize

          64KB

        • memory/3632-19-0x0000028524710000-0x0000028524720000-memory.dmp

          Filesize

          64KB

        • memory/3632-111-0x00007FFFCCAA0000-0x00007FFFCD48C000-memory.dmp

          Filesize

          9.9MB

        • memory/3632-51-0x0000028524710000-0x0000028524720000-memory.dmp

          Filesize

          64KB

        • memory/3728-26-0x000001A5FE0A0000-0x000001A5FE116000-memory.dmp

          Filesize

          472KB

        • memory/3728-16-0x00007FFFCCAA0000-0x00007FFFCD48C000-memory.dmp

          Filesize

          9.9MB

        • memory/3728-99-0x000001A5E5A70000-0x000001A5E5A80000-memory.dmp

          Filesize

          64KB

        • memory/3728-56-0x000001A5E5A70000-0x000001A5E5A80000-memory.dmp

          Filesize

          64KB

        • memory/3728-17-0x000001A5E5A30000-0x000001A5E5A52000-memory.dmp

          Filesize

          136KB

        • memory/3728-105-0x00007FFFCCAA0000-0x00007FFFCD48C000-memory.dmp

          Filesize

          9.9MB

        • memory/3728-18-0x000001A5E5A70000-0x000001A5E5A80000-memory.dmp

          Filesize

          64KB

        • memory/3728-21-0x000001A5E5A70000-0x000001A5E5A80000-memory.dmp

          Filesize

          64KB

        • memory/3804-291-0x0000000140000000-0x000000014015E400-memory.dmp

          Filesize

          1.4MB

        • memory/3804-286-0x0000000140000000-0x000000014015E400-memory.dmp

          Filesize

          1.4MB

        • memory/3804-288-0x0000000140000000-0x000000014015E400-memory.dmp

          Filesize

          1.4MB

        • memory/3804-289-0x0000000140000000-0x000000014015E400-memory.dmp

          Filesize

          1.4MB

        • memory/3804-290-0x0000000140000000-0x000000014015E400-memory.dmp

          Filesize

          1.4MB

        • memory/4244-302-0x00007FFFBCB90000-0x00007FFFBD57C000-memory.dmp

          Filesize

          9.9MB

        • memory/4244-304-0x000001F1FAF10000-0x000001F1FAF20000-memory.dmp

          Filesize

          64KB

        • memory/4244-305-0x000001F1FAF10000-0x000001F1FAF20000-memory.dmp

          Filesize

          64KB

        • memory/4296-138-0x0000029467000000-0x0000029467010000-memory.dmp

          Filesize

          64KB

        • memory/4296-167-0x0000029467000000-0x0000029467010000-memory.dmp

          Filesize

          64KB

        • memory/4296-226-0x00007FFFCCA10000-0x00007FFFCD3FC000-memory.dmp

          Filesize

          9.9MB

        • memory/4296-219-0x0000029467000000-0x0000029467010000-memory.dmp

          Filesize

          64KB

        • memory/4296-135-0x00007FFFCCA10000-0x00007FFFCD3FC000-memory.dmp

          Filesize

          9.9MB