Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25/04/2024, 01:43
Static task
static1
Behavioral task
behavioral1
Sample
8987f3cd89bd9f739ef4ee2495ccd81be89cf7d5f52b445c94920cfae3b0fc27.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8987f3cd89bd9f739ef4ee2495ccd81be89cf7d5f52b445c94920cfae3b0fc27.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
Entreprenren.ps1
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
Entreprenren.ps1
Resource
win10v2004-20240412-en
General
-
Target
Entreprenren.ps1
-
Size
60KB
-
MD5
030ce4392c4a8cc1b477bc3deeacb683
-
SHA1
8f36406d9572e6ccf966fb69c0934c234e0617e6
-
SHA256
7e9decd5f91e30b000266db010c2ad399bfd06f64ec43f48ca0f3bc36d69ca6c
-
SHA512
3ec59592857d073ea3f59cd5279fdd4d862ba0a102de7bb3f96db73b64af362c5f017802afe78cb5299a0185f406e4fec097c9986b74d591183ab2aba114e4f4
-
SSDEEP
1536:cwCVtHft7/anji7OG2BP79MU59/AmW1K7V:cJt7SnjHG2Bj9V3AmW85
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1640 powershell.exe 1640 powershell.exe 1640 powershell.exe 1640 powershell.exe 1640 powershell.exe 1640 powershell.exe 1640 powershell.exe 1640 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2624 explorer.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 1640 powershell.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe Token: SeShutdownPrivilege 2624 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe 2624 explorer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2556 1640 powershell.exe 29 PID 1640 wrote to memory of 2556 1640 powershell.exe 29 PID 1640 wrote to memory of 2556 1640 powershell.exe 29 PID 1640 wrote to memory of 2244 1640 powershell.exe 31 PID 1640 wrote to memory of 2244 1640 powershell.exe 31 PID 1640 wrote to memory of 2244 1640 powershell.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Entreprenren.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "set /A 1^^0"2⤵PID:2556
-
-
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "1640" "1088"2⤵PID:2244
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57c9c24f525ed1846fe30526068c4e24a
SHA118538a55580dcb143014046174d490f9f7a98760
SHA256ce05e9d59d481eefca2c4d5a81a3530eed1ede54d2ad0c95589efc73f1d20e0f
SHA5121358533808acfa3bb2e851f89f133feb8cab2f9e89ec6e376b9fbfe488137f25bcf185bee5975fde81720a9340d610407c14c55ea46a5d773c2308483682f508