Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

17/04/2024, 12:37

240417-pths4afc45 8

17/04/2024, 12:37

240417-ptg7kafc43 8

17/04/2024, 12:36

240417-ptcbbafc34 8

17/04/2024, 12:36

240417-ptbpsafc29 8

17/04/2024, 12:36

240417-pta39afc28 8

16/04/2024, 13:44

240416-q1vxnsda7z 8

Analysis

  • max time kernel
    599s
  • max time network
    600s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17/04/2024, 12:36

General

  • Target

    64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe

  • Size

    5.3MB

  • MD5

    63552c60caeefe5f2d0e4028b3cc65d3

  • SHA1

    dbed3040d53495a6afda01bfb8399376792eb48c

  • SHA256

    64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab

  • SHA512

    caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0

  • SSDEEP

    98304:vwrOjNr08jQxkFg97Nw76XgfqCPa1AQy2cmw:YC5r0wQxKg97Nw76XgyC6

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 9 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
    "C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2616
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2492
    • C:\Windows\system32\schtasks.exe
      schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
      2⤵
      • Creates scheduled task(s)
      PID:332
    • C:\Windows\System\svchost.exe
      "C:\Windows\System\svchost.exe" formal
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1556
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1948
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1996
      • C:\Users\Admin\AppData\Local\Temp\~tl4A2.tmp
        C:\Users\Admin\AppData\Local\Temp\~tl4A2.tmp
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3016
        • C:\Windows\system32\netsh.exe
          netsh int ipv4 set dynamicport tcp start=1025 num=64511
          4⤵
            PID:1264
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:1552
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:2800
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2200
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1512
          • C:\Windows\system32\schtasks.exe
            schtasks /delete /TN "Timer"
            4⤵
              PID:2584
            • C:\Windows\system32\schtasks.exe
              schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
              4⤵
              • Creates scheduled task(s)
              PID:2868
            • C:\Windows\System\svchost.exe
              "C:\Windows\System\svchost.exe" formal
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2028
              • C:\Windows\system32\netsh.exe
                netsh int ipv4 set dynamicport tcp start=1025 num=64511
                5⤵
                  PID:2164
                • C:\Windows\System32\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                  5⤵
                  • Modifies Windows Firewall
                  PID:2428
                • C:\Windows\System32\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                  5⤵
                  • Modifies Windows Firewall
                  PID:2008
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1800
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2680
                • C:\Users\Admin\AppData\Local\Temp\~tlEDE8.tmp
                  C:\Users\Admin\AppData\Local\Temp\~tlEDE8.tmp
                  5⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1796
                  • C:\Windows\system32\netsh.exe
                    netsh int ipv4 set dynamicport tcp start=1025 num=64511
                    6⤵
                      PID:940
                    • C:\Windows\System32\netsh.exe
                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                      6⤵
                      • Modifies Windows Firewall
                      PID:1116
                    • C:\Windows\System32\netsh.exe
                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                      6⤵
                      • Modifies Windows Firewall
                      PID:1740
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                      6⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2056
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                      6⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2104
          • C:\Windows\system32\taskeng.exe
            taskeng.exe {1414C764-EBFE-4B6F-9CD0-AE4F9ECF2721} S-1-5-18:NT AUTHORITY\System:Service:
            1⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2932
            • \??\c:\windows\system\svchost.exe
              c:\windows\system\svchost.exe
              2⤵
              • Executes dropped EXE
              PID:336

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\~tl4A2.tmp

            Filesize

            385KB

            MD5

            e802c96760e48c5139995ffb2d891f90

            SHA1

            bba3d278c0eb1094a26e5d2f4c099ad685371578

            SHA256

            cb82ea45a37f8f79d10726a7c165aa5b392b68d5ac954141129c1762a539722c

            SHA512

            97300ac501be6b6ea3ac1915361dd472824fe612801cab8561a02c7df071b1534190d2d5ef872d89d24c8c915b88101e7315f948f53215c2538d661181e3a5f0

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

            Filesize

            7KB

            MD5

            9fca60c74a8e56016ce08f803922f4ae

            SHA1

            c512e26bf02b6dcf2ab35cf17a943e528da137ed

            SHA256

            e670675995c3226ba441974d93ff122619b9b4a925d406a0320e202eecb2772e

            SHA512

            be94ac569ef788bac1d7fd2028d3383b0cdb48fa193fbfee7ef02208144aba5ffdf0e754dc45b6cb2103a53f342d48720cb2504a632e1e852d9e2abf1120e2bd

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

            Filesize

            7KB

            MD5

            39de7986597313a0ea4ddc787e6955df

            SHA1

            58eff0efbd7a088300b1c4914d50879568d6740f

            SHA256

            5e13855f7ed989913584ad41107b80c3e6c77a674dd0a09c4775eed01a7cbc9e

            SHA512

            9830dc42bfc595df5f3da66d8f25a99e3c602960bd10cceca0909953da863d2229a4401fcae9c69062f68d5349b7800cd0a55f6209543cee56aad9d2eaf8b48e

          • C:\Users\Admin\AppData\Roaming\tor\cached-microdesc-consensus.tmp

            Filesize

            2.6MB

            MD5

            e7634067c1219da664e2c13a622988bf

            SHA1

            b354b3912ec59fefecdaa660af50c679b136b6ca

            SHA256

            e1f51b61149b811c5029caaa39ddf54faa18fcd18bbcf432155ad324fbc0fdb7

            SHA512

            b61ea1448ec13e88c66e043c0f99d95a2626e631841bec0b0e2e1dd6cbbcb8f8587d414f3ad32794ccdadf7c763910ed844220684f3edc71109f47fe4353c944

          • C:\Users\Admin\AppData\Roaming\tor\cached-microdescs.new

            Filesize

            18.9MB

            MD5

            afef9be7dd9d6e0d0bc24d4dcb3f272d

            SHA1

            bb0ed5132135310fe3951923a14f9b2abd6380b8

            SHA256

            d3259805f71977ddf700e7b060260cb1a66e3e5371f04d04a47b652701505441

            SHA512

            6127102e4e99684677297d090eb51b4a5300988bf1af7b666d9a1ff5f6e911e68bc509584dd32b6b07614f572e9af62dae93a4b4bf58a1e9c8a65bb0b6c8f3ae

          • C:\Windows\system\svchost.exe

            Filesize

            5.3MB

            MD5

            63552c60caeefe5f2d0e4028b3cc65d3

            SHA1

            dbed3040d53495a6afda01bfb8399376792eb48c

            SHA256

            64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab

            SHA512

            caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0

          • \Users\Admin\AppData\Local\Temp\~tlEDE8.tmp

            Filesize

            393KB

            MD5

            9dbdd43a2e0b032604943c252eaf634a

            SHA1

            9584dc66f3c1cce4210fdf827a1b4e2bb22263af

            SHA256

            33c53cd5265502e7b62432dba0e1b5ed702b5007cc79973ccd1e71b2acc01e86

            SHA512

            b7b20b06dac952a96eda254bad29966fe7a4f827912beb0bc66d5af5b302d7c0282d70c1b01ff782507dd03a1d58706f05cb157521c7f2887a43085ffe5f94d1

          • memory/336-163-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/336-162-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/1512-208-0x000007FEF55D0000-0x000007FEF5F6D000-memory.dmp

            Filesize

            9.6MB

          • memory/1512-207-0x0000000002C70000-0x0000000002CF0000-memory.dmp

            Filesize

            512KB

          • memory/1512-201-0x000007FEF55D0000-0x000007FEF5F6D000-memory.dmp

            Filesize

            9.6MB

          • memory/1512-206-0x0000000002C70000-0x0000000002CF0000-memory.dmp

            Filesize

            512KB

          • memory/1512-205-0x000007FEF55D0000-0x000007FEF5F6D000-memory.dmp

            Filesize

            9.6MB

          • memory/1512-203-0x0000000002C70000-0x0000000002CF0000-memory.dmp

            Filesize

            512KB

          • memory/1512-199-0x0000000002C70000-0x0000000002CF0000-memory.dmp

            Filesize

            512KB

          • memory/1556-177-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/1556-47-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/1556-73-0x0000000010000000-0x00000000104FC000-memory.dmp

            Filesize

            5.0MB

          • memory/1556-88-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/1800-243-0x0000000002EBB000-0x0000000002F22000-memory.dmp

            Filesize

            412KB

          • memory/1800-238-0x000007FEF4F00000-0x000007FEF589D000-memory.dmp

            Filesize

            9.6MB

          • memory/1800-239-0x0000000002EB0000-0x0000000002F30000-memory.dmp

            Filesize

            512KB

          • memory/1800-241-0x0000000002EB4000-0x0000000002EB7000-memory.dmp

            Filesize

            12KB

          • memory/1800-232-0x0000000002EB0000-0x0000000002F30000-memory.dmp

            Filesize

            512KB

          • memory/1800-231-0x000007FEF4F00000-0x000007FEF589D000-memory.dmp

            Filesize

            9.6MB

          • memory/1948-59-0x000000001B730000-0x000000001BA12000-memory.dmp

            Filesize

            2.9MB

          • memory/1948-61-0x000007FEF4E50000-0x000007FEF57ED000-memory.dmp

            Filesize

            9.6MB

          • memory/1948-60-0x0000000001DA0000-0x0000000001DA8000-memory.dmp

            Filesize

            32KB

          • memory/1948-62-0x000007FEF4E50000-0x000007FEF57ED000-memory.dmp

            Filesize

            9.6MB

          • memory/1948-63-0x0000000002E10000-0x0000000002E90000-memory.dmp

            Filesize

            512KB

          • memory/1948-70-0x0000000002E1B000-0x0000000002E82000-memory.dmp

            Filesize

            412KB

          • memory/1948-68-0x000007FEF4E50000-0x000007FEF57ED000-memory.dmp

            Filesize

            9.6MB

          • memory/1996-67-0x0000000002910000-0x0000000002990000-memory.dmp

            Filesize

            512KB

          • memory/1996-69-0x0000000002910000-0x0000000002990000-memory.dmp

            Filesize

            512KB

          • memory/1996-71-0x0000000002910000-0x0000000002990000-memory.dmp

            Filesize

            512KB

          • memory/1996-72-0x000007FEF4E50000-0x000007FEF57ED000-memory.dmp

            Filesize

            9.6MB

          • memory/1996-66-0x000007FEF4E50000-0x000007FEF57ED000-memory.dmp

            Filesize

            9.6MB

          • memory/1996-65-0x0000000002910000-0x0000000002990000-memory.dmp

            Filesize

            512KB

          • memory/1996-64-0x000007FEF4E50000-0x000007FEF57ED000-memory.dmp

            Filesize

            9.6MB

          • memory/2028-221-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/2164-6-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/2164-0-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/2164-5-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/2164-41-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/2164-3-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/2200-204-0x000007FEF55D0000-0x000007FEF5F6D000-memory.dmp

            Filesize

            9.6MB

          • memory/2200-200-0x0000000002884000-0x0000000002887000-memory.dmp

            Filesize

            12KB

          • memory/2200-202-0x000000000288B000-0x00000000028F2000-memory.dmp

            Filesize

            412KB

          • memory/2200-189-0x0000000001DA0000-0x0000000001DA8000-memory.dmp

            Filesize

            32KB

          • memory/2200-190-0x000007FEF55D0000-0x000007FEF5F6D000-memory.dmp

            Filesize

            9.6MB

          • memory/2200-188-0x000000001B6B0000-0x000000001B992000-memory.dmp

            Filesize

            2.9MB

          • memory/2200-191-0x0000000002880000-0x0000000002900000-memory.dmp

            Filesize

            512KB

          • memory/2200-192-0x000007FEF55D0000-0x000007FEF5F6D000-memory.dmp

            Filesize

            9.6MB

          • memory/2200-194-0x0000000002880000-0x0000000002900000-memory.dmp

            Filesize

            512KB

          • memory/2492-21-0x0000000002874000-0x0000000002877000-memory.dmp

            Filesize

            12KB

          • memory/2492-23-0x000007FEF57F0000-0x000007FEF618D000-memory.dmp

            Filesize

            9.6MB

          • memory/2492-19-0x0000000002870000-0x00000000028F0000-memory.dmp

            Filesize

            512KB

          • memory/2492-24-0x000000000287B000-0x00000000028E2000-memory.dmp

            Filesize

            412KB

          • memory/2492-18-0x000007FEF57F0000-0x000007FEF618D000-memory.dmp

            Filesize

            9.6MB

          • memory/2492-20-0x000007FEF57F0000-0x000007FEF618D000-memory.dmp

            Filesize

            9.6MB

          • memory/2616-25-0x0000000002CE0000-0x0000000002D60000-memory.dmp

            Filesize

            512KB

          • memory/2616-22-0x000007FEF57F0000-0x000007FEF618D000-memory.dmp

            Filesize

            9.6MB

          • memory/2616-43-0x0000000002CE0000-0x0000000002D60000-memory.dmp

            Filesize

            512KB

          • memory/2616-28-0x0000000002CE0000-0x0000000002D60000-memory.dmp

            Filesize

            512KB

          • memory/2616-27-0x000007FEF57F0000-0x000007FEF618D000-memory.dmp

            Filesize

            9.6MB

          • memory/2616-26-0x0000000002CE0000-0x0000000002D60000-memory.dmp

            Filesize

            512KB

          • memory/2616-17-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

            Filesize

            32KB

          • memory/2616-29-0x0000000002CE0000-0x0000000002D60000-memory.dmp

            Filesize

            512KB

          • memory/2616-16-0x000000001B620000-0x000000001B902000-memory.dmp

            Filesize

            2.9MB

          • memory/2680-240-0x0000000002DD0000-0x0000000002E50000-memory.dmp

            Filesize

            512KB

          • memory/2680-242-0x000007FEF4F00000-0x000007FEF589D000-memory.dmp

            Filesize

            9.6MB

          • memory/2680-244-0x0000000002DD0000-0x0000000002E50000-memory.dmp

            Filesize

            512KB

          • memory/3016-224-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/3016-179-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/3016-180-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/3016-187-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB