Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
17/04/2024, 12:37
240417-pths4afc45 817/04/2024, 12:37
240417-ptg7kafc43 817/04/2024, 12:36
240417-ptcbbafc34 817/04/2024, 12:36
240417-ptbpsafc29 817/04/2024, 12:36
240417-pta39afc28 816/04/2024, 13:44
240416-q1vxnsda7z 8Analysis
-
max time kernel
300s -
max time network
299s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
Resource
win7-20240215-en
Behavioral task
behavioral3
Sample
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
Resource
win11-20240412-en
General
-
Target
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
-
Size
5.3MB
-
MD5
63552c60caeefe5f2d0e4028b3cc65d3
-
SHA1
dbed3040d53495a6afda01bfb8399376792eb48c
-
SHA256
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab
-
SHA512
caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0
-
SSDEEP
98304:vwrOjNr08jQxkFg97Nw76XgfqCPa1AQy2cmw:YC5r0wQxKg97Nw76XgyC6
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 6 IoCs
pid Process 2424 netsh.exe 812 netsh.exe 704 netsh.exe 2612 netsh.exe 1168 netsh.exe 2784 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 2496 svchost.exe 2216 ~tl24A0.tmp 1768 svchost.exe 3048 ~tlF95C.tmp -
Loads dropped DLL 8 IoCs
pid Process 3028 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 3028 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 2496 svchost.exe 2496 svchost.exe 2216 ~tl24A0.tmp 2216 ~tl24A0.tmp 1768 svchost.exe 1768 svchost.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\System\xxx1.bak ~tl24A0.tmp File opened for modification C:\Windows\System\svchost.exe ~tl24A0.tmp File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\System\xxx1.bak 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe File created C:\Windows\System\svchost.exe 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe File opened for modification C:\Windows\System\svchost.exe 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1984 schtasks.exe 2272 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2556 powershell.exe 2176 powershell.exe 3028 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 1988 powershell.exe 2748 powershell.exe 2216 ~tl24A0.tmp 2956 powershell.exe 2844 powershell.exe 2216 ~tl24A0.tmp 1768 svchost.exe 1108 powershell.exe 1832 powershell.exe 3048 ~tlF95C.tmp 2324 powershell.exe 2264 powershell.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2556 powershell.exe Token: SeDebugPrivilege 2176 powershell.exe Token: SeDebugPrivilege 1988 powershell.exe Token: SeDebugPrivilege 2748 powershell.exe Token: SeDebugPrivilege 2956 powershell.exe Token: SeDebugPrivilege 2844 powershell.exe Token: SeDebugPrivilege 1108 powershell.exe Token: SeDebugPrivilege 1832 powershell.exe Token: SeDebugPrivilege 2324 powershell.exe Token: SeDebugPrivilege 2264 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2176 3028 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 28 PID 3028 wrote to memory of 2176 3028 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 28 PID 3028 wrote to memory of 2176 3028 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 28 PID 3028 wrote to memory of 2556 3028 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 30 PID 3028 wrote to memory of 2556 3028 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 30 PID 3028 wrote to memory of 2556 3028 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 30 PID 3028 wrote to memory of 1984 3028 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 32 PID 3028 wrote to memory of 1984 3028 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 32 PID 3028 wrote to memory of 1984 3028 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 32 PID 3028 wrote to memory of 2496 3028 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 34 PID 3028 wrote to memory of 2496 3028 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 34 PID 3028 wrote to memory of 2496 3028 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 34 PID 2496 wrote to memory of 1988 2496 svchost.exe 37 PID 2496 wrote to memory of 1988 2496 svchost.exe 37 PID 2496 wrote to memory of 1988 2496 svchost.exe 37 PID 2496 wrote to memory of 2748 2496 svchost.exe 39 PID 2496 wrote to memory of 2748 2496 svchost.exe 39 PID 2496 wrote to memory of 2748 2496 svchost.exe 39 PID 2496 wrote to memory of 2216 2496 svchost.exe 41 PID 2496 wrote to memory of 2216 2496 svchost.exe 41 PID 2496 wrote to memory of 2216 2496 svchost.exe 41 PID 2216 wrote to memory of 2488 2216 ~tl24A0.tmp 44 PID 2216 wrote to memory of 2488 2216 ~tl24A0.tmp 44 PID 2216 wrote to memory of 2488 2216 ~tl24A0.tmp 44 PID 2216 wrote to memory of 1168 2216 ~tl24A0.tmp 46 PID 2216 wrote to memory of 1168 2216 ~tl24A0.tmp 46 PID 2216 wrote to memory of 1168 2216 ~tl24A0.tmp 46 PID 2216 wrote to memory of 2784 2216 ~tl24A0.tmp 47 PID 2216 wrote to memory of 2784 2216 ~tl24A0.tmp 47 PID 2216 wrote to memory of 2784 2216 ~tl24A0.tmp 47 PID 2216 wrote to memory of 2956 2216 ~tl24A0.tmp 50 PID 2216 wrote to memory of 2956 2216 ~tl24A0.tmp 50 PID 2216 wrote to memory of 2956 2216 ~tl24A0.tmp 50 PID 2216 wrote to memory of 2844 2216 ~tl24A0.tmp 52 PID 2216 wrote to memory of 2844 2216 ~tl24A0.tmp 52 PID 2216 wrote to memory of 2844 2216 ~tl24A0.tmp 52 PID 2216 wrote to memory of 2788 2216 ~tl24A0.tmp 54 PID 2216 wrote to memory of 2788 2216 ~tl24A0.tmp 54 PID 2216 wrote to memory of 2788 2216 ~tl24A0.tmp 54 PID 2216 wrote to memory of 2272 2216 ~tl24A0.tmp 56 PID 2216 wrote to memory of 2272 2216 ~tl24A0.tmp 56 PID 2216 wrote to memory of 2272 2216 ~tl24A0.tmp 56 PID 2216 wrote to memory of 1768 2216 ~tl24A0.tmp 58 PID 2216 wrote to memory of 1768 2216 ~tl24A0.tmp 58 PID 2216 wrote to memory of 1768 2216 ~tl24A0.tmp 58 PID 1768 wrote to memory of 2948 1768 svchost.exe 60 PID 1768 wrote to memory of 2948 1768 svchost.exe 60 PID 1768 wrote to memory of 2948 1768 svchost.exe 60 PID 1768 wrote to memory of 2424 1768 svchost.exe 62 PID 1768 wrote to memory of 2424 1768 svchost.exe 62 PID 1768 wrote to memory of 2424 1768 svchost.exe 62 PID 1768 wrote to memory of 812 1768 svchost.exe 63 PID 1768 wrote to memory of 812 1768 svchost.exe 63 PID 1768 wrote to memory of 812 1768 svchost.exe 63 PID 1768 wrote to memory of 1108 1768 svchost.exe 66 PID 1768 wrote to memory of 1108 1768 svchost.exe 66 PID 1768 wrote to memory of 1108 1768 svchost.exe 66 PID 1768 wrote to memory of 1832 1768 svchost.exe 68 PID 1768 wrote to memory of 1832 1768 svchost.exe 68 PID 1768 wrote to memory of 1832 1768 svchost.exe 68 PID 1768 wrote to memory of 3048 1768 svchost.exe 70 PID 1768 wrote to memory of 3048 1768 svchost.exe 70 PID 1768 wrote to memory of 3048 1768 svchost.exe 70 PID 3048 wrote to memory of 2196 3048 ~tlF95C.tmp 72 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe"C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM2⤵
- Creates scheduled task(s)
PID:1984
-
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
C:\Users\Admin\AppData\Local\Temp\~tl24A0.tmpC:\Users\Admin\AppData\Local\Temp\~tl24A0.tmp3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645114⤵PID:2488
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1168
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2784
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
C:\Windows\system32\schtasks.exeschtasks /delete /TN "Timer"4⤵PID:2788
-
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM4⤵
- Creates scheduled task(s)
PID:2272
-
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645115⤵PID:2948
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:2424
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:812
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1832
-
-
C:\Users\Admin\AppData\Local\Temp\~tlF95C.tmpC:\Users\Admin\AppData\Local\Temp\~tlF95C.tmp5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645116⤵PID:2196
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:704
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:2612
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5baa8daf16628b5bdd48d79b0b40cea35
SHA178465e2b4decd3e3d51f149db40194f0f70af774
SHA256a5412945fafe281bdd45ae9b98c450c86b11f8c9e7feb1d4f6b52f33f4d0cf25
SHA51242102ca403104d44060ee9673620f0b99ba869da7164968ecf4edf89e380f9bc52bd5d67caebfe91f37d5145d5299c0c830d973e605f4b17e5faeff18b4242c7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\CC3TRGFPXOLZSC1RQMNA.temp
Filesize7KB
MD58d6e07044df3815a0056fadb1fc7b0fc
SHA184ab6628539e2ace8ed1481897d866485415ada5
SHA2560bbed98d0a69545531e198aee86ea655bf8eeb8177d24050813bfdda232f7224
SHA512109388d62c88170868fa687539448bbbb25c31c9a6179adae2ffd42f994d2f0c563cd0be389f3e5bc242c9bb0d771c0bebc3722d82bb4749c8281e9718714dc0
-
Filesize
2.6MB
MD58c29dca81612f559ac2e9aa5012896e4
SHA1e7b504c8be6ae987ced54380dc2a34d03c613ef7
SHA256b8ac5707fb24e123ee2bb53e97cfb166b3e86f1ee46b36bef7c41cf0f58047fd
SHA5127c910b5c97dc3f556d35c9b48dd5ea4c4b55827bb66b508347c63650ad744f3992280df808a187f06daede1895347c46787fd110ba2015f92a927ab1f650a98c
-
Filesize
7.9MB
MD5c54ae82300295cd9bbc28c2977381bd6
SHA1335b9c7954dd44bc4dafd77e2b511417a912d75a
SHA2568cbaf45e77b9fa4edaf9742ffcfe06570cea77d022bf0d0bcb620a11814d5067
SHA512dcf5cff43c18f9e1816cdc7c7865f3ae510f442cad75c80e56e9923f33f9894457f822811dd278cc5b1bbea4352c0e3d8ea9fb56e05ed3f9538d14eb46d4c0ce
-
Filesize
385KB
MD5afca213ee0321f46e8bde639ae2de3e2
SHA14dc7621667b7cdb544c03c4b756cd0193b9d74f9
SHA256664200ddc8a80df3122556faae95263e64a5affe4d086982e690aec7d1bae7dc
SHA512a075fbb1648b87768ab7973ff8ba97d658dd1f5c8b07e3ba4e535d7f318ded08aab4714eff38becf61cbc2d68cb5a6bc7011b6e7cdc2ea47ecd2d143ea7cb843
-
Filesize
5.3MB
MD563552c60caeefe5f2d0e4028b3cc65d3
SHA1dbed3040d53495a6afda01bfb8399376792eb48c
SHA25664e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab
SHA512caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0
-
Filesize
385KB
MD5e802c96760e48c5139995ffb2d891f90
SHA1bba3d278c0eb1094a26e5d2f4c099ad685371578
SHA256cb82ea45a37f8f79d10726a7c165aa5b392b68d5ac954141129c1762a539722c
SHA51297300ac501be6b6ea3ac1915361dd472824fe612801cab8561a02c7df071b1534190d2d5ef872d89d24c8c915b88101e7315f948f53215c2538d661181e3a5f0
-
Filesize
393KB
MD59dbdd43a2e0b032604943c252eaf634a
SHA19584dc66f3c1cce4210fdf827a1b4e2bb22263af
SHA25633c53cd5265502e7b62432dba0e1b5ed702b5007cc79973ccd1e71b2acc01e86
SHA512b7b20b06dac952a96eda254bad29966fe7a4f827912beb0bc66d5af5b302d7c0282d70c1b01ff782507dd03a1d58706f05cb157521c7f2887a43085ffe5f94d1