Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

17/04/2024, 12:37

240417-pths4afc45 8

17/04/2024, 12:37

240417-ptg7kafc43 8

17/04/2024, 12:36

240417-ptcbbafc34 8

17/04/2024, 12:36

240417-ptbpsafc29 8

17/04/2024, 12:36

240417-pta39afc28 8

16/04/2024, 13:44

240416-q1vxnsda7z 8

Analysis

  • max time kernel
    294s
  • max time network
    311s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    17/04/2024, 12:36

General

  • Target

    64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe

  • Size

    5.3MB

  • MD5

    63552c60caeefe5f2d0e4028b3cc65d3

  • SHA1

    dbed3040d53495a6afda01bfb8399376792eb48c

  • SHA256

    64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab

  • SHA512

    caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0

  • SSDEEP

    98304:vwrOjNr08jQxkFg97Nw76XgfqCPa1AQy2cmw:YC5r0wQxKg97Nw76XgyC6

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
    "C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:5040
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:204
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3308
    • C:\Windows\SYSTEM32\schtasks.exe
      schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
      2⤵
      • Creates scheduled task(s)
      PID:4960
    • C:\Windows\System\svchost.exe
      "C:\Windows\System\svchost.exe" formal
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1040
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    cd5b15b46b9fe0d89c2b8d351c303d2a

    SHA1

    e1d30a8f98585e20c709732c013e926c7078a3c2

    SHA256

    0a8a0dcbec27e07c8dc9ef31622ac41591871416ccd9146f40d8cc9a2421da7a

    SHA512

    d7261b2ff89adcdb909b775c6a47b3cd366b7c3f5cbb4f60428e849582c93e14e76d7dcadec79003eef7c9a3059e305d5e4f6b5b912b9ebc3518e06b0d284dd7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    2dad336730b63413fa5dc44834de0867

    SHA1

    a21a4a511ebf7d74aa37de98fd48a19f40ecfe93

    SHA256

    87d5d784102d37fe52ee4c654605c9bda10c29cc3a0042028bed1cf0059d8b0b

    SHA512

    2688ab094516a186b92cd267309e01b1974abc0792fcf7c0857e1549cb6c42b30b1066ca1f6a3f83a6acee78870b672bc3a1869484faa1ec7433d106d498d8bc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    62b2d7058d086dbea4ee70fd1f4abbf1

    SHA1

    c72cfd44dbbdff0604987c80e2ff0e7bc0c946f8

    SHA256

    019d2b214a90a5556829328daca2d32426c78797481df5b618fae4443b2b679b

    SHA512

    7c8bafd86dca1bc923c51d3c20c854bbc1ae81ccf4015e7108c4d4daffaf1e9634d13863755db0cecbe2b59e38e64993e4f73b4a679988c376aa21201a9adc0c

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5oh13bsj.bmb.ps1

    Filesize

    1B

    MD5

    c4ca4238a0b923820dcc509a6f75849b

    SHA1

    356a192b7913b04c54574d18c28d46e6395428ab

    SHA256

    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

    SHA512

    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

  • C:\Users\Admin\AppData\Roaming\tor\cached-microdesc-consensus.tmp

    Filesize

    2.6MB

    MD5

    8c29dca81612f559ac2e9aa5012896e4

    SHA1

    e7b504c8be6ae987ced54380dc2a34d03c613ef7

    SHA256

    b8ac5707fb24e123ee2bb53e97cfb166b3e86f1ee46b36bef7c41cf0f58047fd

    SHA512

    7c910b5c97dc3f556d35c9b48dd5ea4c4b55827bb66b508347c63650ad744f3992280df808a187f06daede1895347c46787fd110ba2015f92a927ab1f650a98c

  • C:\Users\Admin\AppData\Roaming\tor\cached-microdescs.new

    Filesize

    5.8MB

    MD5

    ef65e270a8b7d25c015099b8a191e361

    SHA1

    54cd12c3f6bbe17a2409c2358aed2757abb2fca5

    SHA256

    99ab4f82ecdc4bd4227596e59a8536767830ad8f4ab0bbe4f70d1a7073d3e023

    SHA512

    4793f37c0abbedcd9199bf517993471d12fef4dfd3f8ac9fed51637a6565a172c07fe0991ba650cb5f10a62252d859fad515595eb85b27676b46d82198608e58

  • C:\Windows\System\svchost.exe

    Filesize

    5.3MB

    MD5

    63552c60caeefe5f2d0e4028b3cc65d3

    SHA1

    dbed3040d53495a6afda01bfb8399376792eb48c

    SHA256

    64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab

    SHA512

    caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0

  • memory/204-18-0x000001C2B6050000-0x000001C2B6060000-memory.dmp

    Filesize

    64KB

  • memory/204-52-0x000001C2B6050000-0x000001C2B6060000-memory.dmp

    Filesize

    64KB

  • memory/204-15-0x000001C2B6000000-0x000001C2B6022000-memory.dmp

    Filesize

    136KB

  • memory/204-112-0x00007FF9AA530000-0x00007FF9AAF1C000-memory.dmp

    Filesize

    9.9MB

  • memory/204-19-0x000001C2B6050000-0x000001C2B6060000-memory.dmp

    Filesize

    64KB

  • memory/204-24-0x000001C2B62E0000-0x000001C2B6356000-memory.dmp

    Filesize

    472KB

  • memory/204-107-0x000001C2B6050000-0x000001C2B6060000-memory.dmp

    Filesize

    64KB

  • memory/204-16-0x00007FF9AA530000-0x00007FF9AAF1C000-memory.dmp

    Filesize

    9.9MB

  • memory/1040-131-0x000001AFECC00000-0x000001AFECC10000-memory.dmp

    Filesize

    64KB

  • memory/1040-129-0x00007FF9AA530000-0x00007FF9AAF1C000-memory.dmp

    Filesize

    9.9MB

  • memory/1040-133-0x000001AFECC00000-0x000001AFECC10000-memory.dmp

    Filesize

    64KB

  • memory/1040-219-0x000001AFECC00000-0x000001AFECC10000-memory.dmp

    Filesize

    64KB

  • memory/1040-168-0x000001AFECC00000-0x000001AFECC10000-memory.dmp

    Filesize

    64KB

  • memory/1040-223-0x00007FF9AA530000-0x00007FF9AAF1C000-memory.dmp

    Filesize

    9.9MB

  • memory/1784-177-0x000002086E680000-0x000002086E690000-memory.dmp

    Filesize

    64KB

  • memory/1784-220-0x000002086E680000-0x000002086E690000-memory.dmp

    Filesize

    64KB

  • memory/1784-136-0x00007FF9AA530000-0x00007FF9AAF1C000-memory.dmp

    Filesize

    9.9MB

  • memory/1784-139-0x000002086E680000-0x000002086E690000-memory.dmp

    Filesize

    64KB

  • memory/1784-138-0x000002086E680000-0x000002086E690000-memory.dmp

    Filesize

    64KB

  • memory/1784-227-0x00007FF9AA530000-0x00007FF9AAF1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2728-279-0x0000000140000000-0x0000000140644400-memory.dmp

    Filesize

    6.3MB

  • memory/2728-124-0x0000000140000000-0x0000000140644400-memory.dmp

    Filesize

    6.3MB

  • memory/2728-125-0x0000000140000000-0x0000000140644400-memory.dmp

    Filesize

    6.3MB

  • memory/2728-273-0x0000000140000000-0x0000000140644400-memory.dmp

    Filesize

    6.3MB

  • memory/2728-255-0x0000000140000000-0x0000000140644400-memory.dmp

    Filesize

    6.3MB

  • memory/2728-228-0x0000000015840000-0x0000000015D3C000-memory.dmp

    Filesize

    5.0MB

  • memory/3308-21-0x0000021034D90000-0x0000021034DA0000-memory.dmp

    Filesize

    64KB

  • memory/3308-17-0x00007FF9AA530000-0x00007FF9AAF1C000-memory.dmp

    Filesize

    9.9MB

  • memory/3308-106-0x00007FF9AA530000-0x00007FF9AAF1C000-memory.dmp

    Filesize

    9.9MB

  • memory/3308-22-0x0000021034D90000-0x0000021034DA0000-memory.dmp

    Filesize

    64KB

  • memory/3308-51-0x0000021034D90000-0x0000021034DA0000-memory.dmp

    Filesize

    64KB

  • memory/3308-100-0x0000021034D90000-0x0000021034DA0000-memory.dmp

    Filesize

    64KB

  • memory/5040-0-0x0000000140000000-0x0000000140644400-memory.dmp

    Filesize

    6.3MB

  • memory/5040-6-0x0000000140000000-0x0000000140644400-memory.dmp

    Filesize

    6.3MB

  • memory/5040-5-0x0000000140000000-0x0000000140644400-memory.dmp

    Filesize

    6.3MB

  • memory/5040-4-0x0000000140000000-0x0000000140644400-memory.dmp

    Filesize

    6.3MB

  • memory/5040-3-0x0000000140000000-0x0000000140644400-memory.dmp

    Filesize

    6.3MB

  • memory/5040-119-0x0000000140000000-0x0000000140644400-memory.dmp

    Filesize

    6.3MB