Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17/04/2024, 13:07

General

  • Target

    PO JSC_109117.exe

  • Size

    113KB

  • MD5

    2222a02624129789dd29c05a6478ba5b

  • SHA1

    9518b4926893cf093bb012d691ec6ea0f4f66785

  • SHA256

    a35a4d58e12b7c68d26502cee706e06a7e2145eaf3bcf3a1c1ea2668c4da8dc4

  • SHA512

    0385ae956f75896a5e76241ef470d582b757bb8197e487c6bc6acd5a525abeb47be68bfd217d439223a937015f5229ae0af3950c891744c68c6c65f66483ef22

  • SSDEEP

    384:4rYOf8QD8PJoDpsPNupo0C/K4vL3/ca3PphQUZUx7V9G9rv6vF4bWQ5lDRolLL4f:4cU8QD8vPNuSJhvL3V/bQH7aFWEO

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\PO JSC_109117.exe
    "C:\Users\Admin\AppData\Local\Temp\PO JSC_109117.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Windows\system32\cmd.exe
      "cmd.exe" /C schtasks /Query /TN "Exply Interface Helpers"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\Windows\system32\schtasks.exe
        schtasks /Query /TN "Exply Interface Helpers"
        3⤵
          PID:2560
      • C:\Windows\system32\cmd.exe
        "cmd.exe" /C schtasks /Create /SC HOURLY /MO 1 /TN "Exply Interface Helpers" /TR "\"C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\PO JSC_109117.exe\" \"ContainImplementation\"" /F
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2580
        • C:\Windows\system32\schtasks.exe
          schtasks /Create /SC HOURLY /MO 1 /TN "Exply Interface Helpers" /TR "\"C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\PO JSC_109117.exe\" \"ContainImplementation\"" /F
          3⤵
          • Creates scheduled task(s)
          PID:2740
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        2⤵
          PID:2528
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          2⤵
            PID:2572
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            2⤵
              PID:3020
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              2⤵
                PID:2972
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                2⤵
                  PID:1956
                • C:\Windows\system32\cmd.exe
                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\DelegateInterface.bat""
                  2⤵
                  • Deletes itself
                  • Suspicious use of WriteProcessMemory
                  PID:1688
                  • C:\Windows\system32\timeout.exe
                    timeout /t 5
                    3⤵
                    • Delays execution with timeout.exe
                    PID:2712

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                Filesize

                68KB

                MD5

                29f65ba8e88c063813cc50a4ea544e93

                SHA1

                05a7040d5c127e68c25d81cc51271ffb8bef3568

                SHA256

                1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

                SHA512

                e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

              • C:\Users\Admin\AppData\Local\Temp\DelegateInterface.bat

                Filesize

                92B

                MD5

                034dbacbf21c73caf5b87a6d8e38ad3e

                SHA1

                500af40c134e39a5ecaf343dde74ef7c0fef5465

                SHA256

                3f26df189ac7974c5d6559d539d9fbfe22edc974c665740a3e4bf9cddcad8aa9

                SHA512

                7917b33fdaa8de336dbd360538ddaad13ab8ba74e8d17c6647ebb70747ac5be1978f446c6cb223b9378b8f6ec1966edfe6c9638c54ecafaac6a995174d2ecd38

              • C:\Users\Admin\AppData\Local\Temp\Tar27E2.tmp

                Filesize

                177KB

                MD5

                435a9ac180383f9fa094131b173a2f7b

                SHA1

                76944ea657a9db94f9a4bef38f88c46ed4166983

                SHA256

                67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

                SHA512

                1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

              • memory/1668-0-0x0000000000A70000-0x0000000000A92000-memory.dmp

                Filesize

                136KB

              • memory/1668-3-0x000007FEF5AC0000-0x000007FEF64AC000-memory.dmp

                Filesize

                9.9MB

              • memory/1668-4-0x000000001B400000-0x000000001B480000-memory.dmp

                Filesize

                512KB

              • memory/1668-42-0x00000000004B0000-0x00000000004C2000-memory.dmp

                Filesize

                72KB

              • memory/1668-43-0x00000000004C0000-0x00000000004C8000-memory.dmp

                Filesize

                32KB

              • memory/1668-52-0x000007FEF5AC0000-0x000007FEF64AC000-memory.dmp

                Filesize

                9.9MB