Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 13:07
Static task
static1
Behavioral task
behavioral1
Sample
PO JSC_109117.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PO JSC_109117.exe
Resource
win10v2004-20240412-en
General
-
Target
PO JSC_109117.exe
-
Size
113KB
-
MD5
2222a02624129789dd29c05a6478ba5b
-
SHA1
9518b4926893cf093bb012d691ec6ea0f4f66785
-
SHA256
a35a4d58e12b7c68d26502cee706e06a7e2145eaf3bcf3a1c1ea2668c4da8dc4
-
SHA512
0385ae956f75896a5e76241ef470d582b757bb8197e487c6bc6acd5a525abeb47be68bfd217d439223a937015f5229ae0af3950c891744c68c6c65f66483ef22
-
SSDEEP
384:4rYOf8QD8PJoDpsPNupo0C/K4vL3/ca3PphQUZUx7V9G9rv6vF4bWQ5lDRolLL4f:4cU8QD8vPNuSJhvL3V/bQH7aFWEO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1688 cmd.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2740 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2712 timeout.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 PO JSC_109117.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 PO JSC_109117.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 PO JSC_109117.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 PO JSC_109117.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 PO JSC_109117.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1668 PO JSC_109117.exe 1668 PO JSC_109117.exe 1668 PO JSC_109117.exe 1668 PO JSC_109117.exe 1668 PO JSC_109117.exe 1668 PO JSC_109117.exe 1668 PO JSC_109117.exe 1668 PO JSC_109117.exe 1668 PO JSC_109117.exe 1668 PO JSC_109117.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1668 PO JSC_109117.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2872 1668 PO JSC_109117.exe 28 PID 1668 wrote to memory of 2872 1668 PO JSC_109117.exe 28 PID 1668 wrote to memory of 2872 1668 PO JSC_109117.exe 28 PID 2872 wrote to memory of 2560 2872 cmd.exe 30 PID 2872 wrote to memory of 2560 2872 cmd.exe 30 PID 2872 wrote to memory of 2560 2872 cmd.exe 30 PID 1668 wrote to memory of 2580 1668 PO JSC_109117.exe 31 PID 1668 wrote to memory of 2580 1668 PO JSC_109117.exe 31 PID 1668 wrote to memory of 2580 1668 PO JSC_109117.exe 31 PID 2580 wrote to memory of 2740 2580 cmd.exe 33 PID 2580 wrote to memory of 2740 2580 cmd.exe 33 PID 2580 wrote to memory of 2740 2580 cmd.exe 33 PID 1668 wrote to memory of 2528 1668 PO JSC_109117.exe 34 PID 1668 wrote to memory of 2528 1668 PO JSC_109117.exe 34 PID 1668 wrote to memory of 2528 1668 PO JSC_109117.exe 34 PID 1668 wrote to memory of 2528 1668 PO JSC_109117.exe 34 PID 1668 wrote to memory of 2528 1668 PO JSC_109117.exe 34 PID 1668 wrote to memory of 2528 1668 PO JSC_109117.exe 34 PID 1668 wrote to memory of 2528 1668 PO JSC_109117.exe 34 PID 1668 wrote to memory of 2572 1668 PO JSC_109117.exe 35 PID 1668 wrote to memory of 2572 1668 PO JSC_109117.exe 35 PID 1668 wrote to memory of 2572 1668 PO JSC_109117.exe 35 PID 1668 wrote to memory of 2572 1668 PO JSC_109117.exe 35 PID 1668 wrote to memory of 2572 1668 PO JSC_109117.exe 35 PID 1668 wrote to memory of 2572 1668 PO JSC_109117.exe 35 PID 1668 wrote to memory of 2572 1668 PO JSC_109117.exe 35 PID 1668 wrote to memory of 3020 1668 PO JSC_109117.exe 36 PID 1668 wrote to memory of 3020 1668 PO JSC_109117.exe 36 PID 1668 wrote to memory of 3020 1668 PO JSC_109117.exe 36 PID 1668 wrote to memory of 3020 1668 PO JSC_109117.exe 36 PID 1668 wrote to memory of 3020 1668 PO JSC_109117.exe 36 PID 1668 wrote to memory of 3020 1668 PO JSC_109117.exe 36 PID 1668 wrote to memory of 3020 1668 PO JSC_109117.exe 36 PID 1668 wrote to memory of 2972 1668 PO JSC_109117.exe 37 PID 1668 wrote to memory of 2972 1668 PO JSC_109117.exe 37 PID 1668 wrote to memory of 2972 1668 PO JSC_109117.exe 37 PID 1668 wrote to memory of 2972 1668 PO JSC_109117.exe 37 PID 1668 wrote to memory of 2972 1668 PO JSC_109117.exe 37 PID 1668 wrote to memory of 2972 1668 PO JSC_109117.exe 37 PID 1668 wrote to memory of 2972 1668 PO JSC_109117.exe 37 PID 1668 wrote to memory of 1956 1668 PO JSC_109117.exe 38 PID 1668 wrote to memory of 1956 1668 PO JSC_109117.exe 38 PID 1668 wrote to memory of 1956 1668 PO JSC_109117.exe 38 PID 1668 wrote to memory of 1956 1668 PO JSC_109117.exe 38 PID 1668 wrote to memory of 1956 1668 PO JSC_109117.exe 38 PID 1668 wrote to memory of 1956 1668 PO JSC_109117.exe 38 PID 1668 wrote to memory of 1956 1668 PO JSC_109117.exe 38 PID 1668 wrote to memory of 1688 1668 PO JSC_109117.exe 39 PID 1668 wrote to memory of 1688 1668 PO JSC_109117.exe 39 PID 1668 wrote to memory of 1688 1668 PO JSC_109117.exe 39 PID 1688 wrote to memory of 2712 1688 cmd.exe 41 PID 1688 wrote to memory of 2712 1688 cmd.exe 41 PID 1688 wrote to memory of 2712 1688 cmd.exe 41 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO JSC_109117.exe"C:\Users\Admin\AppData\Local\Temp\PO JSC_109117.exe"1⤵
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\system32\cmd.exe"cmd.exe" /C schtasks /Query /TN "Exply Interface Helpers"2⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\system32\schtasks.exeschtasks /Query /TN "Exply Interface Helpers"3⤵PID:2560
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C schtasks /Create /SC HOURLY /MO 1 /TN "Exply Interface Helpers" /TR "\"C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\PO JSC_109117.exe\" \"ContainImplementation\"" /F2⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\system32\schtasks.exeschtasks /Create /SC HOURLY /MO 1 /TN "Exply Interface Helpers" /TR "\"C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\PO JSC_109117.exe\" \"ContainImplementation\"" /F3⤵
- Creates scheduled task(s)
PID:2740
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2528
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2572
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:3020
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2972
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1956
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\DelegateInterface.bat""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\system32\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:2712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
92B
MD5034dbacbf21c73caf5b87a6d8e38ad3e
SHA1500af40c134e39a5ecaf343dde74ef7c0fef5465
SHA2563f26df189ac7974c5d6559d539d9fbfe22edc974c665740a3e4bf9cddcad8aa9
SHA5127917b33fdaa8de336dbd360538ddaad13ab8ba74e8d17c6647ebb70747ac5be1978f446c6cb223b9378b8f6ec1966edfe6c9638c54ecafaac6a995174d2ecd38
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a