Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

17/04/2024, 12:37

240417-pths4afc45 8

17/04/2024, 12:37

240417-ptg7kafc43 8

17/04/2024, 12:36

240417-ptcbbafc34 8

17/04/2024, 12:36

240417-ptbpsafc29 8

17/04/2024, 12:36

240417-pta39afc28 8

16/04/2024, 13:44

240416-q1vxnsda7z 8

Analysis

  • max time kernel
    144s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2024, 12:36

General

  • Target

    64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe

  • Size

    5.3MB

  • MD5

    63552c60caeefe5f2d0e4028b3cc65d3

  • SHA1

    dbed3040d53495a6afda01bfb8399376792eb48c

  • SHA256

    64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab

  • SHA512

    caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0

  • SSDEEP

    98304:vwrOjNr08jQxkFg97Nw76XgfqCPa1AQy2cmw:YC5r0wQxKg97Nw76XgyC6

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 4 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
    "C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2500
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4300
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2900
    • C:\Windows\SYSTEM32\schtasks.exe
      schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
      2⤵
      • Creates scheduled task(s)
      PID:3248
    • C:\Windows\System\svchost.exe
      "C:\Windows\System\svchost.exe" formal
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1060
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:440
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4104
      • C:\Users\Admin\AppData\Local\Temp\~tlF7C9.tmp
        C:\Users\Admin\AppData\Local\Temp\~tlF7C9.tmp
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2556
        • C:\Windows\SYSTEM32\netsh.exe
          netsh int ipv4 set dynamicport tcp start=1025 num=64511
          4⤵
            PID:4344
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:4296
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:880
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4972
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4084
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /delete /TN "Timer"
            4⤵
              PID:4032
            • C:\Windows\SYSTEM32\schtasks.exe
              schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
              4⤵
              • Creates scheduled task(s)
              PID:964
            • C:\Windows\System\svchost.exe
              "C:\Windows\System\svchost.exe" formal
              4⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:5116
              • C:\Windows\SYSTEM32\netsh.exe
                netsh int ipv4 set dynamicport tcp start=1025 num=64511
                5⤵
                  PID:4388
                • C:\Windows\System32\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                  5⤵
                  • Modifies Windows Firewall
                  PID:1432
                • C:\Windows\System32\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                  5⤵
                  • Modifies Windows Firewall
                  PID:3020
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                  5⤵
                    PID:2468
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                    5⤵
                      PID:3744

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

              Filesize

              2KB

              MD5

              d85ba6ff808d9e5444a4b369f5bc2730

              SHA1

              31aa9d96590fff6981b315e0b391b575e4c0804a

              SHA256

              84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

              SHA512

              8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              2524e72b0573fa94e9cb8089728a4b47

              SHA1

              3d5c4dfd6e7632153e687ee866f8ecc70730a0f1

              SHA256

              fafde5bec1db5e838e0a43603714686f9911b7aaa8d8ff0fe40f9496a7b38747

              SHA512

              99a7593a82353f792a58ea99196330aaa8c34ac2f616f0be4b4ca4f76388485866ba96dc62d9b8e7627c1df6a1f74111342307ba82400adce5adac68b47a6fa8

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              ed6490dbd8de3438a72bc2f37e00af47

              SHA1

              59027f126727773a21226bc1d150baf600ac6338

              SHA256

              b33522fa13a5b3f76d36c11fa670beb1bb175813789cc4868274d228fc2aff2f

              SHA512

              8d37650e2d2696f8bdebe581468c79f5b2da6dff719aec34d630ae3fd237424d9fd677e16285caa9f6a98de0377abf8d54dc6a09160d48dd3a423d956f64ca8d

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              6d42b6da621e8df5674e26b799c8e2aa

              SHA1

              ab3ce1327ea1eeedb987ec823d5e0cb146bafa48

              SHA256

              5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c

              SHA512

              53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              15dde0683cd1ca19785d7262f554ba93

              SHA1

              d039c577e438546d10ac64837b05da480d06bf69

              SHA256

              d6fa39eab7ee36f44dc3f9f2839d098433db95c1eba924e4bcf4e5c0d268d961

              SHA512

              57c0e1b87bc1c136f0d39f3ce64bb8f8274a0491e4ca6e45e5c7f9070aa9d9370c6f590ce37cd600b252df2638d870205249a514c43245ca7ed49017024a4672

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dgyaopb3.uam.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Users\Admin\AppData\Local\Temp\~tlF7C9.tmp

              Filesize

              385KB

              MD5

              e802c96760e48c5139995ffb2d891f90

              SHA1

              bba3d278c0eb1094a26e5d2f4c099ad685371578

              SHA256

              cb82ea45a37f8f79d10726a7c165aa5b392b68d5ac954141129c1762a539722c

              SHA512

              97300ac501be6b6ea3ac1915361dd472824fe612801cab8561a02c7df071b1534190d2d5ef872d89d24c8c915b88101e7315f948f53215c2538d661181e3a5f0

            • C:\Users\Admin\AppData\Roaming\tor\cached-microdesc-consensus.tmp

              Filesize

              2.6MB

              MD5

              8c29dca81612f559ac2e9aa5012896e4

              SHA1

              e7b504c8be6ae987ced54380dc2a34d03c613ef7

              SHA256

              b8ac5707fb24e123ee2bb53e97cfb166b3e86f1ee46b36bef7c41cf0f58047fd

              SHA512

              7c910b5c97dc3f556d35c9b48dd5ea4c4b55827bb66b508347c63650ad744f3992280df808a187f06daede1895347c46787fd110ba2015f92a927ab1f650a98c

            • C:\Users\Admin\AppData\Roaming\tor\cached-microdescs.new

              Filesize

              19.0MB

              MD5

              ab3c71077f40291f095ebc24eb843947

              SHA1

              e7f2c397eeacac99e9fd17f75b6f02010e27aaea

              SHA256

              e6a41a099506ed5a0ada6ade89f2190e5306f72ec31fa335d9317d8666520e9b

              SHA512

              e8da9baf9c8949368c9eb9a9138a70ccb15283985504ebfec9da7e47e8e9b4ae0e58b4bdd2853f5094804f5c3870bb5f75c18bc681b5419aea71693905ce5b4c

            • C:\Windows\System\svchost.exe

              Filesize

              5.3MB

              MD5

              63552c60caeefe5f2d0e4028b3cc65d3

              SHA1

              dbed3040d53495a6afda01bfb8399376792eb48c

              SHA256

              64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab

              SHA512

              caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0

            • memory/440-56-0x0000022CC3C30000-0x0000022CC3C40000-memory.dmp

              Filesize

              64KB

            • memory/440-79-0x00007FFFF90C0000-0x00007FFFF9B81000-memory.dmp

              Filesize

              10.8MB

            • memory/440-55-0x00007FFFF90C0000-0x00007FFFF9B81000-memory.dmp

              Filesize

              10.8MB

            • memory/1060-124-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/1060-83-0x0000000015540000-0x0000000015A3C000-memory.dmp

              Filesize

              5.0MB

            • memory/1060-106-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/1060-134-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/1060-123-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/1060-52-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/1060-54-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/2468-182-0x00007FFFF9BF0000-0x00007FFFFA6B1000-memory.dmp

              Filesize

              10.8MB

            • memory/2468-183-0x00000209232D0000-0x00000209232E0000-memory.dmp

              Filesize

              64KB

            • memory/2468-207-0x00007FFFF9BF0000-0x00007FFFFA6B1000-memory.dmp

              Filesize

              10.8MB

            • memory/2500-48-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/2500-0-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/2500-6-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/2500-3-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/2500-5-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/2556-136-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/2556-135-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/2556-137-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/2556-180-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/2556-133-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/2900-36-0x00007FFFF90C0000-0x00007FFFF9B81000-memory.dmp

              Filesize

              10.8MB

            • memory/2900-27-0x00007FFFF90C0000-0x00007FFFF9B81000-memory.dmp

              Filesize

              10.8MB

            • memory/2900-29-0x00000251A2420000-0x00000251A2430000-memory.dmp

              Filesize

              64KB

            • memory/3744-204-0x0000028461E00000-0x0000028461E10000-memory.dmp

              Filesize

              64KB

            • memory/3744-210-0x00007FFFF9BF0000-0x00007FFFFA6B1000-memory.dmp

              Filesize

              10.8MB

            • memory/3744-203-0x00007FFFF9BF0000-0x00007FFFFA6B1000-memory.dmp

              Filesize

              10.8MB

            • memory/3744-205-0x0000028461E00000-0x0000028461E10000-memory.dmp

              Filesize

              64KB

            • memory/4084-166-0x00007FFFF9790000-0x00007FFFFA251000-memory.dmp

              Filesize

              10.8MB

            • memory/4084-156-0x00007FFFF9790000-0x00007FFFFA251000-memory.dmp

              Filesize

              10.8MB

            • memory/4084-161-0x000002025EA30000-0x000002025EA40000-memory.dmp

              Filesize

              64KB

            • memory/4104-71-0x00007FFFF90C0000-0x00007FFFF9B81000-memory.dmp

              Filesize

              10.8MB

            • memory/4104-82-0x00007FFFF90C0000-0x00007FFFF9B81000-memory.dmp

              Filesize

              10.8MB

            • memory/4104-72-0x00000202FCA50000-0x00000202FCA60000-memory.dmp

              Filesize

              64KB

            • memory/4300-26-0x00007FFFF90C0000-0x00007FFFF9B81000-memory.dmp

              Filesize

              10.8MB

            • memory/4300-28-0x000001D1FBA60000-0x000001D1FBA70000-memory.dmp

              Filesize

              64KB

            • memory/4300-37-0x00007FFFF90C0000-0x00007FFFF9B81000-memory.dmp

              Filesize

              10.8MB

            • memory/4300-30-0x000001D1FBA60000-0x000001D1FBA70000-memory.dmp

              Filesize

              64KB

            • memory/4300-17-0x000001D1FBB70000-0x000001D1FBB92000-memory.dmp

              Filesize

              136KB

            • memory/4972-140-0x0000021967B60000-0x0000021967B70000-memory.dmp

              Filesize

              64KB

            • memory/4972-165-0x00007FFFF9790000-0x00007FFFFA251000-memory.dmp

              Filesize

              10.8MB

            • memory/4972-139-0x0000021967B60000-0x0000021967B70000-memory.dmp

              Filesize

              64KB

            • memory/4972-138-0x00007FFFF9790000-0x00007FFFFA251000-memory.dmp

              Filesize

              10.8MB

            • memory/5116-181-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/5116-179-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/5116-178-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB