Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 14:19
Static task
static1
Behavioral task
behavioral1
Sample
e25d6621a38cc9d1dd2428d1886a5080ceec742e8c22fe754e31f6d81eaad44e.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
e25d6621a38cc9d1dd2428d1886a5080ceec742e8c22fe754e31f6d81eaad44e.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
rigsombudsmndenes/Vildspors/Tjenestefries/Abrased.ps1
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
rigsombudsmndenes/Vildspors/Tjenestefries/Abrased.ps1
Resource
win10v2004-20240412-en
General
-
Target
rigsombudsmndenes/Vildspors/Tjenestefries/Abrased.ps1
-
Size
43KB
-
MD5
bdc6750fa9e7f3f0e0967e682d730c3f
-
SHA1
592f466b066cd59938eef2c53b9e41942d7cacce
-
SHA256
3bf087d329e163f4300a66e02e102e45f58d39a13acf1a116ecb946233d69aa6
-
SHA512
529621f4d8213bf2bcf9199c9b4add2c3c77461c8e1b75bc37aa1512590eb58af681f741489d023493fbb2043ba6ca4d00d6b9bab18d9e59ef3e1c8ea6ffc7eb
-
SSDEEP
768:nXMWOJ+6hgfLifOQ7BFUMVqF+vNTg5aXSohz/5OcLxjqvtiXl/B7YRDY1KrvY3oV:n8zM6gSbLqFENTdioh9OcL1+i1UbQ4uO
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1736 powershell.exe 1736 powershell.exe 1736 powershell.exe 1736 powershell.exe 1736 powershell.exe 1736 powershell.exe 1736 powershell.exe 1736 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2676 explorer.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 1736 powershell.exe Token: SeShutdownPrivilege 2676 explorer.exe Token: SeShutdownPrivilege 2676 explorer.exe Token: SeShutdownPrivilege 2676 explorer.exe Token: SeShutdownPrivilege 2676 explorer.exe Token: SeShutdownPrivilege 2676 explorer.exe Token: SeShutdownPrivilege 2676 explorer.exe Token: SeShutdownPrivilege 2676 explorer.exe Token: SeShutdownPrivilege 2676 explorer.exe Token: SeShutdownPrivilege 2676 explorer.exe Token: SeShutdownPrivilege 2676 explorer.exe Token: SeShutdownPrivilege 2676 explorer.exe Token: SeShutdownPrivilege 2676 explorer.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe 2676 explorer.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2808 1736 powershell.exe 32 PID 1736 wrote to memory of 2808 1736 powershell.exe 32 PID 1736 wrote to memory of 2808 1736 powershell.exe 32 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\rigsombudsmndenes\Vildspors\Tjenestefries\Abrased.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "1736" "1076"2⤵PID:2808
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bd4486a32e418685a7003700f82279cf
SHA15d620751fa22a8109c8324dd1e64ce0c9fbdaa24
SHA256261a5a9bb80412c51f8cfee80a9a4f9110bc7e717ffa9a37a1f44323e4cecb95
SHA5120d54f334eaa73a6e936e555507f4c3776a4ceb50092f91302a2d7a545d077b61bc6a7e90da076fbf3084e7360f9fe14f20706f79fa28218ac47b5f67471b1785