Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
99s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/05/2024, 07:14
Static task
static1
Behavioral task
behavioral1
Sample
b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe
Resource
win10v2004-20240508-en
General
-
Target
b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe
-
Size
978KB
-
MD5
1299c227f71353022f7ed366f9efb219
-
SHA1
b8437949812bd190d66b656cdf99625243e0740f
-
SHA256
b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3
-
SHA512
0e5276521830eab912247cead3adb5465cd2ad9fdb784999f189c8c854c541f6a671a3bfdce7880fd6c7b4e232c22cb57cfb288a3c71957ee858f1c354c5e26d
-
SSDEEP
24576:fpBWNjpkskxRDqaCgqxR+0B1ONqvtad0uFb0LbsC1H+imSe9:RBWNjpkskxRDqaCgqX+0B1ONqvtY0uqW
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5044 powershell.exe 2856 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1972 set thread context of 4136 1972 b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1232 4136 WerFault.exe 89 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1220 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2856 powershell.exe 5044 powershell.exe 2856 powershell.exe 5044 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2856 powershell.exe Token: SeDebugPrivilege 5044 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2856 1972 b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe 83 PID 1972 wrote to memory of 2856 1972 b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe 83 PID 1972 wrote to memory of 2856 1972 b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe 83 PID 1972 wrote to memory of 5044 1972 b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe 85 PID 1972 wrote to memory of 5044 1972 b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe 85 PID 1972 wrote to memory of 5044 1972 b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe 85 PID 1972 wrote to memory of 1220 1972 b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe 87 PID 1972 wrote to memory of 1220 1972 b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe 87 PID 1972 wrote to memory of 1220 1972 b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe 87 PID 1972 wrote to memory of 4136 1972 b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe 89 PID 1972 wrote to memory of 4136 1972 b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe 89 PID 1972 wrote to memory of 4136 1972 b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe 89 PID 1972 wrote to memory of 4136 1972 b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe 89 PID 1972 wrote to memory of 4136 1972 b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe 89 PID 1972 wrote to memory of 4136 1972 b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe 89 PID 1972 wrote to memory of 4136 1972 b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe 89 PID 1972 wrote to memory of 4136 1972 b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe 89 PID 1972 wrote to memory of 4136 1972 b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe 89 PID 1972 wrote to memory of 4136 1972 b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe 89 PID 1972 wrote to memory of 4136 1972 b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe 89 PID 1972 wrote to memory of 4136 1972 b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe"C:\Users\Admin\AppData\Local\Temp\b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\jGiHPUkzfFmtq.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5044
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jGiHPUkzfFmtq" /XML "C:\Users\Admin\AppData\Local\Temp\tmp755F.tmp"2⤵
- Creates scheduled task(s)
PID:1220
-
-
C:\Users\Admin\AppData\Local\Temp\b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe"C:\Users\Admin\AppData\Local\Temp\b2ae69e681c120901c4f5f839125d81b53eabd3f22c0a50547604c15d43a33f3.exe"2⤵PID:4136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 5923⤵
- Program crash
PID:1232
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4136 -ip 41361⤵PID:2864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
Filesize
18KB
MD5b21c731165ed269111b6abb1efc1994b
SHA118fb19f7c90538af5066886a27a3c460739a7ad6
SHA256dc16eb4683297547a7c2989ed4e258b6d739602f5c88dfd691023cfca6fa4251
SHA512748e482479c77b5ce43345cdad821d6465304305b6a0eb7f7f377ce25d0a4cd89d424c88b69f653d5b388704b4b9485e13b690760809ffcd77eeb982f2f724a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD52347aa57b3664dc789260aa2c9af8b48
SHA155156c74b8592a72307d891c9ba537b576cac0af
SHA256d532b9face5a2ad416c5ca2d1597a41af1f935fac6358161f8c9f61036d85d24
SHA51209e64da2a02b0091821d08c5953164f815e23bd986c23cadde6d64d137eb0a35ed42ed7b29e8654e94a6d923eeb89ca4db31df7485a0e85e7a31038ecb22c56a