Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 08:07
Static task
static1
Behavioral task
behavioral1
Sample
Inv 070324.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Inv 070324.exe
Resource
win10v2004-20240419-en
General
-
Target
Inv 070324.exe
-
Size
755KB
-
MD5
4e96cb7f48fc8c4ac06a1cf484e85e4d
-
SHA1
0d6fff464505680dd3e58b360cb0b13e5c55c3de
-
SHA256
d1277cf74db30d16884abaf7a0f487374f63aba610e1a966da28e71a421db7ab
-
SHA512
fc85a23f5acebc843a256b39a84b9a5cb6893c942f9abf72aa27c3429a5a3c5c209bc4f9ca20126fbc4041aeb35ff16ff120ae345558aad1e9cfe080fbe389a5
-
SSDEEP
12288:Oo6giAEfDdJ19MN8oKhKSDOM03nkRjQ5XBS7jLJHrsSU2iVDbiIXBYx9fIkR:0gRE7dJ1GRZXkNUS3LtrsSMVDbiIRG9n
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2544 powershell.exe 2548 powershell.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1540 set thread context of 2356 1540 Inv 070324.exe 35 PID 2356 set thread context of 1188 2356 RegSvcs.exe 21 PID 2356 set thread context of 2280 2356 RegSvcs.exe 38 PID 2280 set thread context of 1188 2280 setupugc.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2708 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 1540 Inv 070324.exe 1540 Inv 070324.exe 1540 Inv 070324.exe 1540 Inv 070324.exe 2548 powershell.exe 2544 powershell.exe 1540 Inv 070324.exe 2356 RegSvcs.exe 2356 RegSvcs.exe 2356 RegSvcs.exe 2356 RegSvcs.exe 2356 RegSvcs.exe 2356 RegSvcs.exe 2356 RegSvcs.exe 2356 RegSvcs.exe 2280 setupugc.exe 2280 setupugc.exe 2280 setupugc.exe 2280 setupugc.exe 2280 setupugc.exe 2280 setupugc.exe 2280 setupugc.exe 2280 setupugc.exe 2280 setupugc.exe 2280 setupugc.exe 2280 setupugc.exe 2280 setupugc.exe 2280 setupugc.exe 2280 setupugc.exe 2280 setupugc.exe 2280 setupugc.exe 2280 setupugc.exe 2280 setupugc.exe 2280 setupugc.exe 2280 setupugc.exe 2280 setupugc.exe 2280 setupugc.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2356 RegSvcs.exe 1188 Explorer.EXE 1188 Explorer.EXE 2280 setupugc.exe 2280 setupugc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1540 Inv 070324.exe Token: SeDebugPrivilege 2548 powershell.exe Token: SeDebugPrivilege 2544 powershell.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2544 1540 Inv 070324.exe 28 PID 1540 wrote to memory of 2544 1540 Inv 070324.exe 28 PID 1540 wrote to memory of 2544 1540 Inv 070324.exe 28 PID 1540 wrote to memory of 2544 1540 Inv 070324.exe 28 PID 1540 wrote to memory of 2548 1540 Inv 070324.exe 30 PID 1540 wrote to memory of 2548 1540 Inv 070324.exe 30 PID 1540 wrote to memory of 2548 1540 Inv 070324.exe 30 PID 1540 wrote to memory of 2548 1540 Inv 070324.exe 30 PID 1540 wrote to memory of 2708 1540 Inv 070324.exe 32 PID 1540 wrote to memory of 2708 1540 Inv 070324.exe 32 PID 1540 wrote to memory of 2708 1540 Inv 070324.exe 32 PID 1540 wrote to memory of 2708 1540 Inv 070324.exe 32 PID 1540 wrote to memory of 2408 1540 Inv 070324.exe 34 PID 1540 wrote to memory of 2408 1540 Inv 070324.exe 34 PID 1540 wrote to memory of 2408 1540 Inv 070324.exe 34 PID 1540 wrote to memory of 2408 1540 Inv 070324.exe 34 PID 1540 wrote to memory of 2408 1540 Inv 070324.exe 34 PID 1540 wrote to memory of 2408 1540 Inv 070324.exe 34 PID 1540 wrote to memory of 2408 1540 Inv 070324.exe 34 PID 1540 wrote to memory of 2356 1540 Inv 070324.exe 35 PID 1540 wrote to memory of 2356 1540 Inv 070324.exe 35 PID 1540 wrote to memory of 2356 1540 Inv 070324.exe 35 PID 1540 wrote to memory of 2356 1540 Inv 070324.exe 35 PID 1540 wrote to memory of 2356 1540 Inv 070324.exe 35 PID 1540 wrote to memory of 2356 1540 Inv 070324.exe 35 PID 1540 wrote to memory of 2356 1540 Inv 070324.exe 35 PID 1540 wrote to memory of 2356 1540 Inv 070324.exe 35 PID 1540 wrote to memory of 2356 1540 Inv 070324.exe 35 PID 1540 wrote to memory of 2356 1540 Inv 070324.exe 35 PID 1188 wrote to memory of 2280 1188 Explorer.EXE 38 PID 1188 wrote to memory of 2280 1188 Explorer.EXE 38 PID 1188 wrote to memory of 2280 1188 Explorer.EXE 38 PID 1188 wrote to memory of 2280 1188 Explorer.EXE 38 PID 1188 wrote to memory of 2280 1188 Explorer.EXE 38 PID 1188 wrote to memory of 2280 1188 Explorer.EXE 38 PID 1188 wrote to memory of 2280 1188 Explorer.EXE 38
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\Inv 070324.exe"C:\Users\Admin\AppData\Local\Temp\Inv 070324.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Inv 070324.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\nrknGm.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2548
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nrknGm" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4E8D.tmp"3⤵
- Creates scheduled task(s)
PID:2708
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:2408
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2356
-
-
-
C:\Windows\SysWOW64\setupugc.exe"C:\Windows\SysWOW64\setupugc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57f51b11b2e0649accaa59e342484c14b
SHA18d7bc3bb060a9632423d1004ab7bffdbdfa11d8d
SHA2565f2b905e78692824353ee1558db301e9864dcdf5daf0f2a649a5e525f9f32e84
SHA512a616d27e57745b0305611bf6d3351b81e407b51ec2060b717eddaf5dede006d1b7d6a73cef9c6b8f20b55292c0f89045693b221796afca2eff10713d2f82b732
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD555400835c4b853790ac348ad4fa8d83b
SHA17beab4df58cb7d77caae5c2c21b1f825afcca7f9
SHA25693d077d9850a80e1f5386bc753ec08857808210c92ca798b79ac99bebb3f7e9e
SHA512ea6599f00e2113af86d0c153be9ef41c5f083a9f14c8ad5705168e741ae57e50eee646378facd1112970e8bf6ea195da860a930868e3bd2690d4e874aa809fd3