Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
17/04/2024, 12:37
240417-pths4afc45 817/04/2024, 12:37
240417-ptg7kafc43 817/04/2024, 12:36
240417-ptcbbafc34 817/04/2024, 12:36
240417-ptbpsafc29 817/04/2024, 12:36
240417-pta39afc28 816/04/2024, 13:44
240416-q1vxnsda7z 8Analysis
-
max time kernel
294s -
max time network
311s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
17/04/2024, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
Resource
win7-20240215-en
Behavioral task
behavioral3
Sample
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
Resource
win11-20240412-en
General
-
Target
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
-
Size
5.3MB
-
MD5
63552c60caeefe5f2d0e4028b3cc65d3
-
SHA1
dbed3040d53495a6afda01bfb8399376792eb48c
-
SHA256
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab
-
SHA512
caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0
-
SSDEEP
98304:vwrOjNr08jQxkFg97Nw76XgfqCPa1AQy2cmw:YC5r0wQxKg97Nw76XgyC6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2728 svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\System\xxx1.bak 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe File created C:\Windows\System\svchost.exe 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe File opened for modification C:\Windows\System\svchost.exe 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe File created C:\Windows\System\xxx1.bak svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4960 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 204 powershell.exe 3308 powershell.exe 204 powershell.exe 3308 powershell.exe 204 powershell.exe 3308 powershell.exe 5040 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 5040 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 1040 powershell.exe 1784 powershell.exe 1040 powershell.exe 1784 powershell.exe 1040 powershell.exe 1784 powershell.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 204 powershell.exe Token: SeDebugPrivilege 3308 powershell.exe Token: SeIncreaseQuotaPrivilege 204 powershell.exe Token: SeSecurityPrivilege 204 powershell.exe Token: SeTakeOwnershipPrivilege 204 powershell.exe Token: SeLoadDriverPrivilege 204 powershell.exe Token: SeSystemProfilePrivilege 204 powershell.exe Token: SeSystemtimePrivilege 204 powershell.exe Token: SeProfSingleProcessPrivilege 204 powershell.exe Token: SeIncBasePriorityPrivilege 204 powershell.exe Token: SeCreatePagefilePrivilege 204 powershell.exe Token: SeBackupPrivilege 204 powershell.exe Token: SeRestorePrivilege 204 powershell.exe Token: SeShutdownPrivilege 204 powershell.exe Token: SeDebugPrivilege 204 powershell.exe Token: SeSystemEnvironmentPrivilege 204 powershell.exe Token: SeRemoteShutdownPrivilege 204 powershell.exe Token: SeUndockPrivilege 204 powershell.exe Token: SeManageVolumePrivilege 204 powershell.exe Token: 33 204 powershell.exe Token: 34 204 powershell.exe Token: 35 204 powershell.exe Token: 36 204 powershell.exe Token: SeDebugPrivilege 1040 powershell.exe Token: SeDebugPrivilege 1784 powershell.exe Token: SeIncreaseQuotaPrivilege 1040 powershell.exe Token: SeSecurityPrivilege 1040 powershell.exe Token: SeTakeOwnershipPrivilege 1040 powershell.exe Token: SeLoadDriverPrivilege 1040 powershell.exe Token: SeSystemProfilePrivilege 1040 powershell.exe Token: SeSystemtimePrivilege 1040 powershell.exe Token: SeProfSingleProcessPrivilege 1040 powershell.exe Token: SeIncBasePriorityPrivilege 1040 powershell.exe Token: SeCreatePagefilePrivilege 1040 powershell.exe Token: SeBackupPrivilege 1040 powershell.exe Token: SeRestorePrivilege 1040 powershell.exe Token: SeShutdownPrivilege 1040 powershell.exe Token: SeDebugPrivilege 1040 powershell.exe Token: SeSystemEnvironmentPrivilege 1040 powershell.exe Token: SeRemoteShutdownPrivilege 1040 powershell.exe Token: SeUndockPrivilege 1040 powershell.exe Token: SeManageVolumePrivilege 1040 powershell.exe Token: 33 1040 powershell.exe Token: 34 1040 powershell.exe Token: 35 1040 powershell.exe Token: 36 1040 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5040 wrote to memory of 204 5040 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 72 PID 5040 wrote to memory of 204 5040 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 72 PID 5040 wrote to memory of 3308 5040 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 74 PID 5040 wrote to memory of 3308 5040 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 74 PID 5040 wrote to memory of 4960 5040 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 77 PID 5040 wrote to memory of 4960 5040 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 77 PID 5040 wrote to memory of 2728 5040 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 79 PID 5040 wrote to memory of 2728 5040 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 79 PID 2728 wrote to memory of 1040 2728 svchost.exe 81 PID 2728 wrote to memory of 1040 2728 svchost.exe 81 PID 2728 wrote to memory of 1784 2728 svchost.exe 83 PID 2728 wrote to memory of 1784 2728 svchost.exe 83 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe"C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:204
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3308
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM2⤵
- Creates scheduled task(s)
PID:4960
-
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1040
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5cd5b15b46b9fe0d89c2b8d351c303d2a
SHA1e1d30a8f98585e20c709732c013e926c7078a3c2
SHA2560a8a0dcbec27e07c8dc9ef31622ac41591871416ccd9146f40d8cc9a2421da7a
SHA512d7261b2ff89adcdb909b775c6a47b3cd366b7c3f5cbb4f60428e849582c93e14e76d7dcadec79003eef7c9a3059e305d5e4f6b5b912b9ebc3518e06b0d284dd7
-
Filesize
1KB
MD52dad336730b63413fa5dc44834de0867
SHA1a21a4a511ebf7d74aa37de98fd48a19f40ecfe93
SHA25687d5d784102d37fe52ee4c654605c9bda10c29cc3a0042028bed1cf0059d8b0b
SHA5122688ab094516a186b92cd267309e01b1974abc0792fcf7c0857e1549cb6c42b30b1066ca1f6a3f83a6acee78870b672bc3a1869484faa1ec7433d106d498d8bc
-
Filesize
1KB
MD562b2d7058d086dbea4ee70fd1f4abbf1
SHA1c72cfd44dbbdff0604987c80e2ff0e7bc0c946f8
SHA256019d2b214a90a5556829328daca2d32426c78797481df5b618fae4443b2b679b
SHA5127c8bafd86dca1bc923c51d3c20c854bbc1ae81ccf4015e7108c4d4daffaf1e9634d13863755db0cecbe2b59e38e64993e4f73b4a679988c376aa21201a9adc0c
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
2.6MB
MD58c29dca81612f559ac2e9aa5012896e4
SHA1e7b504c8be6ae987ced54380dc2a34d03c613ef7
SHA256b8ac5707fb24e123ee2bb53e97cfb166b3e86f1ee46b36bef7c41cf0f58047fd
SHA5127c910b5c97dc3f556d35c9b48dd5ea4c4b55827bb66b508347c63650ad744f3992280df808a187f06daede1895347c46787fd110ba2015f92a927ab1f650a98c
-
Filesize
5.8MB
MD5ef65e270a8b7d25c015099b8a191e361
SHA154cd12c3f6bbe17a2409c2358aed2757abb2fca5
SHA25699ab4f82ecdc4bd4227596e59a8536767830ad8f4ab0bbe4f70d1a7073d3e023
SHA5124793f37c0abbedcd9199bf517993471d12fef4dfd3f8ac9fed51637a6565a172c07fe0991ba650cb5f10a62252d859fad515595eb85b27676b46d82198608e58
-
Filesize
5.3MB
MD563552c60caeefe5f2d0e4028b3cc65d3
SHA1dbed3040d53495a6afda01bfb8399376792eb48c
SHA25664e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab
SHA512caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0