Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

17/04/2024, 12:37

240417-pths4afc45 8

17/04/2024, 12:37

240417-ptg7kafc43 8

17/04/2024, 12:36

240417-ptcbbafc34 8

17/04/2024, 12:36

240417-ptbpsafc29 8

17/04/2024, 12:36

240417-pta39afc28 8

16/04/2024, 13:44

240416-q1vxnsda7z 8

Analysis

  • max time kernel
    145s
  • max time network
    156s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    17/04/2024, 12:36

General

  • Target

    64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe

  • Size

    5.3MB

  • MD5

    63552c60caeefe5f2d0e4028b3cc65d3

  • SHA1

    dbed3040d53495a6afda01bfb8399376792eb48c

  • SHA256

    64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab

  • SHA512

    caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0

  • SSDEEP

    98304:vwrOjNr08jQxkFg97Nw76XgfqCPa1AQy2cmw:YC5r0wQxKg97Nw76XgyC6

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
    "C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1060
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2272
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1904
    • C:\Windows\SYSTEM32\schtasks.exe
      schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
      2⤵
      • Creates scheduled task(s)
      PID:2532
    • C:\Windows\System\svchost.exe
      "C:\Windows\System\svchost.exe" formal
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1800
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1348
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1016
      • C:\Users\Admin\AppData\Local\Temp\~tlCC4F.tmp
        C:\Users\Admin\AppData\Local\Temp\~tlCC4F.tmp
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3144
        • C:\Windows\SYSTEM32\netsh.exe
          netsh int ipv4 set dynamicport tcp start=1025 num=64511
          4⤵
            PID:2824
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:2980
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:3692
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
            4⤵
              PID:5012
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
              4⤵
                PID:4148

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

          Filesize

          2KB

          MD5

          268b890dae39e430e8b127909067ed96

          SHA1

          35939515965c0693ef46e021254c3e73ea8c4a2b

          SHA256

          7643d492a6f1e035b63b2e16c9c21d974a77dfd2d8e90b9c15ee412625e88c4c

          SHA512

          abc4b2ce10a6566f38c00ad55e433791dd45fca47deec70178daf0763578ff019fb0ec70792d5e9ecde4eb6778a35ba8a8c7ecd07550597d9bbb13521c9b98fb

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          25b20391137be191190a7e0ad7d4d16f

          SHA1

          3bcf32e209fe4d385eb48c8977a9114533c86d6a

          SHA256

          ccac288eb7e10339ccd5d4d97c4bca8722ee8d8f293fc54ec83e468fbbc20da1

          SHA512

          8560cb3494fb2f5121e27ba6861fe93dc388270f29f26682e4fde2c40ae5323a9887eabbc2ef55287fe24634006eceb9c88aa8385de41a1407dcf82f9432cec1

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          07d8e464679c0efee6b3b9506757603d

          SHA1

          44f2bfc6f6e840294b605b10bdc970cc07fa3606

          SHA256

          7418547094386c2104ab2599e4332f60ab1e5c87927cb41f1ae37abe3cb92bfa

          SHA512

          ce76f02077e73741ba3d5fe12b523dd5c66ad6b6c981337649c6fc0a72cbbc0d7e5c13a462bd009318c16132631ec79f412445e1d88fbd1075c0bf12b37626b1

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          62959df62ecea4d5a75cbb8e98459796

          SHA1

          80f0b42dd2da11f1953fd2fe5d66c387d56c9359

          SHA256

          471c2e25775d8c60eae9c5d0726a2c2551c384eb8415e95eeed07e8ea58bd422

          SHA512

          86b378e83fc23d50ca3106d0952ea3dc81af6ac984b4f547cf6befc1789425fef0ac46a9bab12105a15aaf11c193d570b9d418717af32017589f3ffdb177a693

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_w5nfzqkg.bba.ps1

          Filesize

          1B

          MD5

          c4ca4238a0b923820dcc509a6f75849b

          SHA1

          356a192b7913b04c54574d18c28d46e6395428ab

          SHA256

          6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

          SHA512

          4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

        • C:\Users\Admin\AppData\Local\Temp\~tlCC4F.tmp

          Filesize

          385KB

          MD5

          e802c96760e48c5139995ffb2d891f90

          SHA1

          bba3d278c0eb1094a26e5d2f4c099ad685371578

          SHA256

          cb82ea45a37f8f79d10726a7c165aa5b392b68d5ac954141129c1762a539722c

          SHA512

          97300ac501be6b6ea3ac1915361dd472824fe612801cab8561a02c7df071b1534190d2d5ef872d89d24c8c915b88101e7315f948f53215c2538d661181e3a5f0

        • C:\Users\Admin\AppData\Roaming\tor\cached-microdesc-consensus.tmp

          Filesize

          2.6MB

          MD5

          8c29dca81612f559ac2e9aa5012896e4

          SHA1

          e7b504c8be6ae987ced54380dc2a34d03c613ef7

          SHA256

          b8ac5707fb24e123ee2bb53e97cfb166b3e86f1ee46b36bef7c41cf0f58047fd

          SHA512

          7c910b5c97dc3f556d35c9b48dd5ea4c4b55827bb66b508347c63650ad744f3992280df808a187f06daede1895347c46787fd110ba2015f92a927ab1f650a98c

        • C:\Users\Admin\AppData\Roaming\tor\cached-microdescs.new

          Filesize

          14.9MB

          MD5

          5a59ba5e60de2a79398d6c997efb9ef1

          SHA1

          0d21362f48464a54117f3c8f663bed2c630f83a0

          SHA256

          ccfd00cdabb93c6b8a3a551f0b3983b013814583feba0eba2c24e416be53a9c0

          SHA512

          acfba24fbdca3f0f55957ba3f82e0364dd2bed7feb002eb5ad721193f46838c45e5a30f7602b7be970853c519ca1888d17f4b1162111187f59908ee82e792f46

        • C:\Windows\System\svchost.exe

          Filesize

          5.3MB

          MD5

          63552c60caeefe5f2d0e4028b3cc65d3

          SHA1

          dbed3040d53495a6afda01bfb8399376792eb48c

          SHA256

          64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab

          SHA512

          caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0

        • memory/1016-136-0x0000021C70D90000-0x0000021C70DA0000-memory.dmp

          Filesize

          64KB

        • memory/1016-167-0x0000021C70D90000-0x0000021C70DA0000-memory.dmp

          Filesize

          64KB

        • memory/1016-137-0x0000021C70D90000-0x0000021C70DA0000-memory.dmp

          Filesize

          64KB

        • memory/1016-224-0x00007FF9D8440000-0x00007FF9D8E2C000-memory.dmp

          Filesize

          9.9MB

        • memory/1016-217-0x0000021C70D90000-0x0000021C70DA0000-memory.dmp

          Filesize

          64KB

        • memory/1016-134-0x00007FF9D8440000-0x00007FF9D8E2C000-memory.dmp

          Filesize

          9.9MB

        • memory/1060-3-0x0000000140000000-0x0000000140644400-memory.dmp

          Filesize

          6.3MB

        • memory/1060-0-0x0000000140000000-0x0000000140644400-memory.dmp

          Filesize

          6.3MB

        • memory/1060-118-0x0000000140000000-0x0000000140644400-memory.dmp

          Filesize

          6.3MB

        • memory/1060-4-0x0000000140000000-0x0000000140644400-memory.dmp

          Filesize

          6.3MB

        • memory/1060-6-0x0000000140000000-0x0000000140644400-memory.dmp

          Filesize

          6.3MB

        • memory/1060-5-0x0000000140000000-0x0000000140644400-memory.dmp

          Filesize

          6.3MB

        • memory/1348-135-0x0000025A9A0C0000-0x0000025A9A0D0000-memory.dmp

          Filesize

          64KB

        • memory/1348-218-0x0000025A9A0C0000-0x0000025A9A0D0000-memory.dmp

          Filesize

          64KB

        • memory/1348-130-0x00007FF9D8440000-0x00007FF9D8E2C000-memory.dmp

          Filesize

          9.9MB

        • memory/1348-225-0x00007FF9D8440000-0x00007FF9D8E2C000-memory.dmp

          Filesize

          9.9MB

        • memory/1348-168-0x0000025A9A0C0000-0x0000025A9A0D0000-memory.dmp

          Filesize

          64KB

        • memory/1800-123-0x0000000140000000-0x0000000140644400-memory.dmp

          Filesize

          6.3MB

        • memory/1800-124-0x0000000140000000-0x0000000140644400-memory.dmp

          Filesize

          6.3MB

        • memory/1800-272-0x0000000140000000-0x0000000140644400-memory.dmp

          Filesize

          6.3MB

        • memory/1800-242-0x0000000140000000-0x0000000140644400-memory.dmp

          Filesize

          6.3MB

        • memory/1800-226-0x0000000015640000-0x0000000015B3C000-memory.dmp

          Filesize

          5.0MB

        • memory/1800-284-0x0000000140000000-0x0000000140644400-memory.dmp

          Filesize

          6.3MB

        • memory/1800-276-0x0000000140000000-0x0000000140644400-memory.dmp

          Filesize

          6.3MB

        • memory/1904-21-0x00007FF9D8440000-0x00007FF9D8E2C000-memory.dmp

          Filesize

          9.9MB

        • memory/1904-18-0x00000211D3440000-0x00000211D3450000-memory.dmp

          Filesize

          64KB

        • memory/1904-108-0x00007FF9D8440000-0x00007FF9D8E2C000-memory.dmp

          Filesize

          9.9MB

        • memory/1904-23-0x00000211EBC40000-0x00000211EBCB6000-memory.dmp

          Filesize

          472KB

        • memory/1904-50-0x00000211D3440000-0x00000211D3450000-memory.dmp

          Filesize

          64KB

        • memory/1904-98-0x00000211D3440000-0x00000211D3450000-memory.dmp

          Filesize

          64KB

        • memory/2272-51-0x0000029E4EE70000-0x0000029E4EE80000-memory.dmp

          Filesize

          64KB

        • memory/2272-110-0x00007FF9D8440000-0x00007FF9D8E2C000-memory.dmp

          Filesize

          9.9MB

        • memory/2272-104-0x0000029E4EE70000-0x0000029E4EE80000-memory.dmp

          Filesize

          64KB

        • memory/2272-19-0x0000029E4ED80000-0x0000029E4EDA2000-memory.dmp

          Filesize

          136KB

        • memory/2272-14-0x00007FF9D8440000-0x00007FF9D8E2C000-memory.dmp

          Filesize

          9.9MB

        • memory/2272-17-0x0000029E4EE70000-0x0000029E4EE80000-memory.dmp

          Filesize

          64KB

        • memory/2272-16-0x0000029E4EE70000-0x0000029E4EE80000-memory.dmp

          Filesize

          64KB

        • memory/3144-283-0x0000000140000000-0x000000014015E400-memory.dmp

          Filesize

          1.4MB

        • memory/3144-285-0x0000000140000000-0x000000014015E400-memory.dmp

          Filesize

          1.4MB

        • memory/3144-286-0x0000000140000000-0x000000014015E400-memory.dmp

          Filesize

          1.4MB

        • memory/3144-287-0x0000000140000000-0x000000014015E400-memory.dmp

          Filesize

          1.4MB

        • memory/4148-331-0x000001F537900000-0x000001F537910000-memory.dmp

          Filesize

          64KB

        • memory/4148-298-0x00007FF9D8180000-0x00007FF9D8B6C000-memory.dmp

          Filesize

          9.9MB

        • memory/4148-300-0x000001F537900000-0x000001F537910000-memory.dmp

          Filesize

          64KB

        • memory/4148-301-0x000001F537900000-0x000001F537910000-memory.dmp

          Filesize

          64KB

        • memory/4148-379-0x000001F537900000-0x000001F537910000-memory.dmp

          Filesize

          64KB

        • memory/4148-382-0x00007FF9D8180000-0x00007FF9D8B6C000-memory.dmp

          Filesize

          9.9MB

        • memory/5012-294-0x0000016A78020000-0x0000016A78030000-memory.dmp

          Filesize

          64KB

        • memory/5012-293-0x0000016A78020000-0x0000016A78030000-memory.dmp

          Filesize

          64KB

        • memory/5012-334-0x0000016A78020000-0x0000016A78030000-memory.dmp

          Filesize

          64KB

        • memory/5012-385-0x0000016A78020000-0x0000016A78030000-memory.dmp

          Filesize

          64KB

        • memory/5012-292-0x00007FF9D8180000-0x00007FF9D8B6C000-memory.dmp

          Filesize

          9.9MB

        • memory/5012-389-0x00007FF9D8180000-0x00007FF9D8B6C000-memory.dmp

          Filesize

          9.9MB