Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/05/2024, 01:31
Static task
static1
Behavioral task
behavioral1
Sample
2c9723cb907807689be6429979900a805806de879f12ce349edb6aada89fa7b7.exe
Resource
win10v2004-20240508-en
General
-
Target
2c9723cb907807689be6429979900a805806de879f12ce349edb6aada89fa7b7.exe
-
Size
4.1MB
-
MD5
bdbb944543ca0b14c45e039b8c4cb5fe
-
SHA1
c187fe2d6a2b6b331aebe1b4ea8786fe80e0c348
-
SHA256
2c9723cb907807689be6429979900a805806de879f12ce349edb6aada89fa7b7
-
SHA512
7550b960d9eb44ec04b95f69e4d3cfb80f4bc664feb8ebae66e2737219a156494d062fa1f5fb81cc88dcb56e792505768852a0a1b72b98b4af2e4d7603ed70ba
-
SSDEEP
98304:yf+oTi6061rsx4yGF2uQjPQS21lHMnsqkLrDDcuTdH2a0g7PFmM:Bos8riuQnYS21lsngzdH/0gf
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2708 netsh.exe -
resource yara_rule behavioral2/files/0x000200000002aa11-202.dat upx behavioral2/files/0x000200000002aa11-204.dat upx behavioral2/files/0x000200000002aa11-206.dat upx behavioral2/memory/3648-209-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1980-207-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/3648-205-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1980-213-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1980-221-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3900 sc.exe -
pid Process 3876 powershell.exe 1536 powershell.exe 4712 powershell.exe 1400 powershell.exe 2716 powershell.exe 2052 powershell.exe 2232 powershell.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 996 schtasks.exe 4516 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c9723cb907807689be6429979900a805806de879f12ce349edb6aada89fa7b7.exe"C:\Users\Admin\AppData\Local\Temp\2c9723cb907807689be6429979900a805806de879f12ce349edb6aada89fa7b7.exe"1⤵PID:4616
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
PID:2052
-
-
C:\Users\Admin\AppData\Local\Temp\2c9723cb907807689be6429979900a805806de879f12ce349edb6aada89fa7b7.exe"C:\Users\Admin\AppData\Local\Temp\2c9723cb907807689be6429979900a805806de879f12ce349edb6aada89fa7b7.exe"2⤵PID:4204
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:2232
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵PID:1464
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:2708
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:3876
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:1536
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵PID:2452
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:4712
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:996
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:1248
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:1400
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:2716
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵PID:1896
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
PID:4516
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"4⤵PID:3648
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)5⤵PID:1232
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵
- Launches sc.exe
PID:3900
-
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:1980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD522af67d216af5392520509457cfe98a5
SHA15fc6b54c98883df45b8e299f599414b7206421de
SHA256f0efa513d4cea3aa19acac194db239aa3ae1c27894bb86769bc48b5be71f0aea
SHA5120a3d370638995a08dbc3821f03e0519d604e328d230eb5fcf4013321a38f5db10a2a81d1ab8a5f57a2c237f5479a38ac37c4eff314c6c7e71f9ea47e6ad87d6c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD54d71688896d1c60073fe670652d81f71
SHA1ce3d53cedfcdabc314388770933d9488583b6dff
SHA256850e30bbecbdb7d92e69c41c3fa724f0c7a61175c2f812e3cf6008f1e2f4e08a
SHA512cd553b68e4ae2a9185c322e4e31a7de5f4e74f71cfcde7bbfa36cb9ed66a2ceadd833193da46befbc88ba3fdf1bf99864c98a46e5c6ec54106889c659c7e6c5d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD51f1171fcc801136b033dcf25a488d779
SHA162c0990b8b323cef61b364b7f7fbcaaadc34fea7
SHA2567a35935087dc85e9640ac81b7ac307dd40b50402e10731cc6d9084736c842215
SHA51282ed6e2598462c8abce5e0238e4a909a61b3d06abf583b3b8983956f893f5cde0b11cc23fa1aea9a96c2479aa66fcde4d155c64b8d93ab2bbbc904030040da67
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5becca73b6d2c0e9b44dd575724cca585
SHA13f305778a725e0f6a0d4330039e8e57cb99f5f2e
SHA256ffa02af1c0ca95dea57d445f1640dc37ee9f9b38d0f37e20c3bb3595ad51d5ef
SHA512679cf24bef22cad46fdafd5941bb70027cc6999944d0a99fc1de51f3ba8c750092cd0ba92015fdac4ed9157f7b4577f2b3ab2edd03acb8f951cd95edd366e432
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD53a3f4df509b0d44fcd91cd070c97ff20
SHA16912345f8292828939a9f3e6e2b4a2b632aa9c49
SHA25601f4722bcd9c05a89e2b6e8667c168c04785da3fe0bbaa135e042f07091b1c81
SHA5128196985a8adca5ed65ab27b3337ca61ab4918ae3bb33f68aec7616d3d22fe1a389b7fc506f0059beae927560003876712ab3f8d329816eaeca4ee45c14fffd95
-
Filesize
2.1MB
MD54fa18ade770cfeb20b0090773092630c
SHA1b5b95d85b4f991ba8b11aeef1f59afef0604f6f4
SHA2565bcede8d7748ce77dbda7f45c20244297de1ad5ad2ba8c68a27e625ed2ee6996
SHA5129d882302a8934c534d8c80596a0019a5929040c8bf8349f7df8862410a969252b22b1a522a7dc40d808a63c171a5590ee05673f7b1c9de983dc100d3aa90c9e3
-
Filesize
3.1MB
MD597e3c6462e560f915035542c5d952245
SHA1ae1305ec86e18282b4a44d213e3770538586c4cb
SHA256837b705d648e32349d8b9965d7b9fe70fda4d609ed2405068105400e7af61018
SHA512228d5832cc6315c4818dbd1738936f1a532bf9afb9fd387028c9826e394bb9c2a41f6b008b763afe77652c0f4dbae13ca4a0a4636ef4892ad6f453e298dbaa37
-
Filesize
448KB
MD5eac3c94e166a4ac3e7d3dbf26d505ebb
SHA1c231e723ad6077f9b6bd12c5e7bd3fd208f7fa45
SHA256662eb9030b85d481e53772eb13a1b747a62bc68a862e0e4ba90f4e6acb3fe124
SHA512b5b0f2d3205ebf43593ae73318cc078b5eafed92be6c8d113cf0e7dbef9f84da759301393b9528ac7f11b2f82dd8a190ad5c2b9066c84afbc1c9fb775fcff1a0
-
Filesize
1.1MB
MD5248a61a204c1dc1cc38ebd8db338d650
SHA19d3acde5c07ef9802d35ae6c4dbc8f11b3412835
SHA256f7a04d671eb3cad2e5070c750d75e0ba67b3d2059bedb8a506c78dbd1dace9b3
SHA51237357d6df075269ea6019f97f0c00165d58109aa03112d31db00f8fd56c7c52259f1886489363579c72ff5ff83df791c078b5874deaa5a985992cad142d14961
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec