Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
17/04/2024, 12:37
240417-pths4afc45 817/04/2024, 12:37
240417-ptg7kafc43 817/04/2024, 12:36
240417-ptcbbafc34 817/04/2024, 12:36
240417-ptbpsafc29 817/04/2024, 12:36
240417-pta39afc28 816/04/2024, 13:44
240416-q1vxnsda7z 8Analysis
-
max time kernel
599s -
max time network
600s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
Resource
win11-20240412-en
General
-
Target
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
-
Size
5.3MB
-
MD5
63552c60caeefe5f2d0e4028b3cc65d3
-
SHA1
dbed3040d53495a6afda01bfb8399376792eb48c
-
SHA256
64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab
-
SHA512
caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0
-
SSDEEP
98304:vwrOjNr08jQxkFg97Nw76XgfqCPa1AQy2cmw:YC5r0wQxKg97Nw76XgyC6
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 6 IoCs
pid Process 2428 netsh.exe 2008 netsh.exe 1740 netsh.exe 1116 netsh.exe 1552 netsh.exe 2800 netsh.exe -
Executes dropped EXE 5 IoCs
pid Process 1556 svchost.exe 336 svchost.exe 3016 ~tl4A2.tmp 2028 svchost.exe 1796 ~tlEDE8.tmp -
Loads dropped DLL 9 IoCs
pid Process 2164 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 2164 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 2932 taskeng.exe 1556 svchost.exe 1556 svchost.exe 3016 ~tl4A2.tmp 3016 ~tl4A2.tmp 2028 svchost.exe 2028 svchost.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\System\svchost.exe 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe File opened for modification C:\Windows\System\svchost.exe 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\System\xxx1.bak ~tl4A2.tmp File opened for modification C:\Windows\System\svchost.exe ~tl4A2.tmp File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\System\xxx1.bak 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 332 schtasks.exe 2868 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2492 powershell.exe 2616 powershell.exe 2164 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 1948 powershell.exe 1996 powershell.exe 3016 ~tl4A2.tmp 2200 powershell.exe 1512 powershell.exe 3016 ~tl4A2.tmp 2028 svchost.exe 1800 powershell.exe 2680 powershell.exe 1796 ~tlEDE8.tmp 2056 powershell.exe 2104 powershell.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2492 powershell.exe Token: SeDebugPrivilege 2616 powershell.exe Token: SeDebugPrivilege 1948 powershell.exe Token: SeDebugPrivilege 1996 powershell.exe Token: SeDebugPrivilege 2200 powershell.exe Token: SeDebugPrivilege 1512 powershell.exe Token: SeDebugPrivilege 1800 powershell.exe Token: SeDebugPrivilege 2680 powershell.exe Token: SeDebugPrivilege 2056 powershell.exe Token: SeDebugPrivilege 2104 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2616 2164 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 28 PID 2164 wrote to memory of 2616 2164 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 28 PID 2164 wrote to memory of 2616 2164 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 28 PID 2164 wrote to memory of 2492 2164 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 30 PID 2164 wrote to memory of 2492 2164 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 30 PID 2164 wrote to memory of 2492 2164 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 30 PID 2164 wrote to memory of 332 2164 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 32 PID 2164 wrote to memory of 332 2164 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 32 PID 2164 wrote to memory of 332 2164 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 32 PID 2164 wrote to memory of 1556 2164 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 34 PID 2164 wrote to memory of 1556 2164 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 34 PID 2164 wrote to memory of 1556 2164 64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe 34 PID 1556 wrote to memory of 1948 1556 svchost.exe 37 PID 1556 wrote to memory of 1948 1556 svchost.exe 37 PID 1556 wrote to memory of 1948 1556 svchost.exe 37 PID 1556 wrote to memory of 1996 1556 svchost.exe 39 PID 1556 wrote to memory of 1996 1556 svchost.exe 39 PID 1556 wrote to memory of 1996 1556 svchost.exe 39 PID 2932 wrote to memory of 336 2932 taskeng.exe 42 PID 2932 wrote to memory of 336 2932 taskeng.exe 42 PID 2932 wrote to memory of 336 2932 taskeng.exe 42 PID 1556 wrote to memory of 3016 1556 svchost.exe 43 PID 1556 wrote to memory of 3016 1556 svchost.exe 43 PID 1556 wrote to memory of 3016 1556 svchost.exe 43 PID 3016 wrote to memory of 1264 3016 ~tl4A2.tmp 46 PID 3016 wrote to memory of 1264 3016 ~tl4A2.tmp 46 PID 3016 wrote to memory of 1264 3016 ~tl4A2.tmp 46 PID 3016 wrote to memory of 1552 3016 ~tl4A2.tmp 48 PID 3016 wrote to memory of 1552 3016 ~tl4A2.tmp 48 PID 3016 wrote to memory of 1552 3016 ~tl4A2.tmp 48 PID 3016 wrote to memory of 2800 3016 ~tl4A2.tmp 50 PID 3016 wrote to memory of 2800 3016 ~tl4A2.tmp 50 PID 3016 wrote to memory of 2800 3016 ~tl4A2.tmp 50 PID 3016 wrote to memory of 2200 3016 ~tl4A2.tmp 52 PID 3016 wrote to memory of 2200 3016 ~tl4A2.tmp 52 PID 3016 wrote to memory of 2200 3016 ~tl4A2.tmp 52 PID 3016 wrote to memory of 1512 3016 ~tl4A2.tmp 54 PID 3016 wrote to memory of 1512 3016 ~tl4A2.tmp 54 PID 3016 wrote to memory of 1512 3016 ~tl4A2.tmp 54 PID 3016 wrote to memory of 2584 3016 ~tl4A2.tmp 56 PID 3016 wrote to memory of 2584 3016 ~tl4A2.tmp 56 PID 3016 wrote to memory of 2584 3016 ~tl4A2.tmp 56 PID 3016 wrote to memory of 2868 3016 ~tl4A2.tmp 58 PID 3016 wrote to memory of 2868 3016 ~tl4A2.tmp 58 PID 3016 wrote to memory of 2868 3016 ~tl4A2.tmp 58 PID 3016 wrote to memory of 2028 3016 ~tl4A2.tmp 60 PID 3016 wrote to memory of 2028 3016 ~tl4A2.tmp 60 PID 3016 wrote to memory of 2028 3016 ~tl4A2.tmp 60 PID 2028 wrote to memory of 2164 2028 svchost.exe 62 PID 2028 wrote to memory of 2164 2028 svchost.exe 62 PID 2028 wrote to memory of 2164 2028 svchost.exe 62 PID 2028 wrote to memory of 2428 2028 svchost.exe 64 PID 2028 wrote to memory of 2428 2028 svchost.exe 64 PID 2028 wrote to memory of 2428 2028 svchost.exe 64 PID 2028 wrote to memory of 2008 2028 svchost.exe 66 PID 2028 wrote to memory of 2008 2028 svchost.exe 66 PID 2028 wrote to memory of 2008 2028 svchost.exe 66 PID 2028 wrote to memory of 1800 2028 svchost.exe 68 PID 2028 wrote to memory of 1800 2028 svchost.exe 68 PID 2028 wrote to memory of 1800 2028 svchost.exe 68 PID 2028 wrote to memory of 2680 2028 svchost.exe 70 PID 2028 wrote to memory of 2680 2028 svchost.exe 70 PID 2028 wrote to memory of 2680 2028 svchost.exe 70 PID 2028 wrote to memory of 1796 2028 svchost.exe 72 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe"C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM2⤵
- Creates scheduled task(s)
PID:332
-
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\~tl4A2.tmpC:\Users\Admin\AppData\Local\Temp\~tl4A2.tmp3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645114⤵PID:1264
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1552
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2800
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
C:\Windows\system32\schtasks.exeschtasks /delete /TN "Timer"4⤵PID:2584
-
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM4⤵
- Creates scheduled task(s)
PID:2868
-
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645115⤵PID:2164
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:2428
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:2008
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\~tlEDE8.tmpC:\Users\Admin\AppData\Local\Temp\~tlEDE8.tmp5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1796 -
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645116⤵PID:940
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:1116
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:1740
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {1414C764-EBFE-4B6F-9CD0-AE4F9ECF2721} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2932 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe2⤵
- Executes dropped EXE
PID:336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5e802c96760e48c5139995ffb2d891f90
SHA1bba3d278c0eb1094a26e5d2f4c099ad685371578
SHA256cb82ea45a37f8f79d10726a7c165aa5b392b68d5ac954141129c1762a539722c
SHA51297300ac501be6b6ea3ac1915361dd472824fe612801cab8561a02c7df071b1534190d2d5ef872d89d24c8c915b88101e7315f948f53215c2538d661181e3a5f0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD59fca60c74a8e56016ce08f803922f4ae
SHA1c512e26bf02b6dcf2ab35cf17a943e528da137ed
SHA256e670675995c3226ba441974d93ff122619b9b4a925d406a0320e202eecb2772e
SHA512be94ac569ef788bac1d7fd2028d3383b0cdb48fa193fbfee7ef02208144aba5ffdf0e754dc45b6cb2103a53f342d48720cb2504a632e1e852d9e2abf1120e2bd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD539de7986597313a0ea4ddc787e6955df
SHA158eff0efbd7a088300b1c4914d50879568d6740f
SHA2565e13855f7ed989913584ad41107b80c3e6c77a674dd0a09c4775eed01a7cbc9e
SHA5129830dc42bfc595df5f3da66d8f25a99e3c602960bd10cceca0909953da863d2229a4401fcae9c69062f68d5349b7800cd0a55f6209543cee56aad9d2eaf8b48e
-
Filesize
2.6MB
MD5e7634067c1219da664e2c13a622988bf
SHA1b354b3912ec59fefecdaa660af50c679b136b6ca
SHA256e1f51b61149b811c5029caaa39ddf54faa18fcd18bbcf432155ad324fbc0fdb7
SHA512b61ea1448ec13e88c66e043c0f99d95a2626e631841bec0b0e2e1dd6cbbcb8f8587d414f3ad32794ccdadf7c763910ed844220684f3edc71109f47fe4353c944
-
Filesize
18.9MB
MD5afef9be7dd9d6e0d0bc24d4dcb3f272d
SHA1bb0ed5132135310fe3951923a14f9b2abd6380b8
SHA256d3259805f71977ddf700e7b060260cb1a66e3e5371f04d04a47b652701505441
SHA5126127102e4e99684677297d090eb51b4a5300988bf1af7b666d9a1ff5f6e911e68bc509584dd32b6b07614f572e9af62dae93a4b4bf58a1e9c8a65bb0b6c8f3ae
-
Filesize
5.3MB
MD563552c60caeefe5f2d0e4028b3cc65d3
SHA1dbed3040d53495a6afda01bfb8399376792eb48c
SHA25664e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab
SHA512caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0
-
Filesize
393KB
MD59dbdd43a2e0b032604943c252eaf634a
SHA19584dc66f3c1cce4210fdf827a1b4e2bb22263af
SHA25633c53cd5265502e7b62432dba0e1b5ed702b5007cc79973ccd1e71b2acc01e86
SHA512b7b20b06dac952a96eda254bad29966fe7a4f827912beb0bc66d5af5b302d7c0282d70c1b01ff782507dd03a1d58706f05cb157521c7f2887a43085ffe5f94d1