Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 14:02
Static task
static1
Behavioral task
behavioral1
Sample
490a5522aeaf111abdbe2eaf8dec0ffd81a687c395dad12ddcb8a6616c7c7478.exe
Resource
win7-20240221-en
General
-
Target
490a5522aeaf111abdbe2eaf8dec0ffd81a687c395dad12ddcb8a6616c7c7478.exe
-
Size
5.1MB
-
MD5
3f7e36fa14bafefea46398ba14dd7e75
-
SHA1
856e0d0bcfb5f69fc9cf389a87aad6261b984e2b
-
SHA256
490a5522aeaf111abdbe2eaf8dec0ffd81a687c395dad12ddcb8a6616c7c7478
-
SHA512
9e107931cb63ce707e292c559b19be032820ae394fb89eae6747f9ae7328f8257017b4c70ead2fe5a2dba4b3ca7e178ac98e1e09f275400671aa4890535baa0c
-
SSDEEP
98304:M42JF1gJgj2q/g+8/sT09So2jrgKpW1KySLIfJKGh6G28VVEtXpSKrhwxMH+rt6v:+vil+8/s14/VsIfoB8VV8XHrSz6v
Malware Config
Signatures
-
XMRig Miner payload 16 IoCs
resource yara_rule behavioral1/memory/2836-35-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2836-40-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2836-38-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2836-36-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2836-41-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2836-39-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2836-42-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2836-43-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2836-44-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2836-46-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2836-47-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2836-45-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2836-48-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2836-50-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2836-49-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/2836-51-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2528 powershell.exe 1832 powershell.exe -
Creates new service(s) 2 TTPs
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts 490a5522aeaf111abdbe2eaf8dec0ffd81a687c395dad12ddcb8a6616c7c7478.exe File created C:\Windows\system32\drivers\etc\hosts updater.exe -
Executes dropped EXE 2 IoCs
pid Process 480 Process not Found 2276 updater.exe -
Loads dropped DLL 1 IoCs
pid Process 480 Process not Found -
resource yara_rule behavioral1/memory/2836-30-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2836-34-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2836-35-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2836-40-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2836-38-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2836-36-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2836-41-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2836-39-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2836-33-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2836-32-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2836-31-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2836-42-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2836-43-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2836-44-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2836-46-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2836-47-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2836-45-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2836-48-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2836-50-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2836-49-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/2836-51-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe 490a5522aeaf111abdbe2eaf8dec0ffd81a687c395dad12ddcb8a6616c7c7478.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe updater.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2276 set thread context of 1256 2276 updater.exe 82 PID 2276 set thread context of 2836 2276 updater.exe 84 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\wusa.lock wusa.exe File created C:\Windows\wusa.lock wusa.exe -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2828 sc.exe 2764 sc.exe 2728 sc.exe 2580 sc.exe 1880 sc.exe 472 sc.exe 2124 sc.exe 2772 sc.exe 1824 sc.exe 1692 sc.exe 2760 sc.exe 2596 sc.exe 2708 sc.exe 2496 sc.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = a0e98fba07b1da01 powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1700 490a5522aeaf111abdbe2eaf8dec0ffd81a687c395dad12ddcb8a6616c7c7478.exe 1832 powershell.exe 1700 490a5522aeaf111abdbe2eaf8dec0ffd81a687c395dad12ddcb8a6616c7c7478.exe 1700 490a5522aeaf111abdbe2eaf8dec0ffd81a687c395dad12ddcb8a6616c7c7478.exe 1700 490a5522aeaf111abdbe2eaf8dec0ffd81a687c395dad12ddcb8a6616c7c7478.exe 1700 490a5522aeaf111abdbe2eaf8dec0ffd81a687c395dad12ddcb8a6616c7c7478.exe 1700 490a5522aeaf111abdbe2eaf8dec0ffd81a687c395dad12ddcb8a6616c7c7478.exe 1700 490a5522aeaf111abdbe2eaf8dec0ffd81a687c395dad12ddcb8a6616c7c7478.exe 1700 490a5522aeaf111abdbe2eaf8dec0ffd81a687c395dad12ddcb8a6616c7c7478.exe 1700 490a5522aeaf111abdbe2eaf8dec0ffd81a687c395dad12ddcb8a6616c7c7478.exe 1700 490a5522aeaf111abdbe2eaf8dec0ffd81a687c395dad12ddcb8a6616c7c7478.exe 1700 490a5522aeaf111abdbe2eaf8dec0ffd81a687c395dad12ddcb8a6616c7c7478.exe 1700 490a5522aeaf111abdbe2eaf8dec0ffd81a687c395dad12ddcb8a6616c7c7478.exe 1700 490a5522aeaf111abdbe2eaf8dec0ffd81a687c395dad12ddcb8a6616c7c7478.exe 1700 490a5522aeaf111abdbe2eaf8dec0ffd81a687c395dad12ddcb8a6616c7c7478.exe 1700 490a5522aeaf111abdbe2eaf8dec0ffd81a687c395dad12ddcb8a6616c7c7478.exe 2276 updater.exe 2528 powershell.exe 2276 updater.exe 2276 updater.exe 2276 updater.exe 2276 updater.exe 2276 updater.exe 2276 updater.exe 2276 updater.exe 2276 updater.exe 2276 updater.exe 2276 updater.exe 2276 updater.exe 2276 updater.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 1832 powershell.exe Token: SeShutdownPrivilege 2476 powercfg.exe Token: SeShutdownPrivilege 2468 powercfg.exe Token: SeShutdownPrivilege 2524 powercfg.exe Token: SeShutdownPrivilege 2504 powercfg.exe Token: SeDebugPrivilege 2528 powershell.exe Token: SeShutdownPrivilege 1552 powercfg.exe Token: SeShutdownPrivilege 1532 powercfg.exe Token: SeShutdownPrivilege 1568 powercfg.exe Token: SeShutdownPrivilege 1528 powercfg.exe Token: SeLockMemoryPrivilege 2836 explorer.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2256 2688 cmd.exe 34 PID 2688 wrote to memory of 2256 2688 cmd.exe 34 PID 2688 wrote to memory of 2256 2688 cmd.exe 34 PID 1988 wrote to memory of 1628 1988 cmd.exe 67 PID 1988 wrote to memory of 1628 1988 cmd.exe 67 PID 1988 wrote to memory of 1628 1988 cmd.exe 67 PID 2276 wrote to memory of 1256 2276 updater.exe 82 PID 2276 wrote to memory of 1256 2276 updater.exe 82 PID 2276 wrote to memory of 1256 2276 updater.exe 82 PID 2276 wrote to memory of 1256 2276 updater.exe 82 PID 2276 wrote to memory of 1256 2276 updater.exe 82 PID 2276 wrote to memory of 1256 2276 updater.exe 82 PID 2276 wrote to memory of 1256 2276 updater.exe 82 PID 2276 wrote to memory of 1256 2276 updater.exe 82 PID 2276 wrote to memory of 1256 2276 updater.exe 82 PID 2276 wrote to memory of 2836 2276 updater.exe 84 PID 2276 wrote to memory of 2836 2276 updater.exe 84 PID 2276 wrote to memory of 2836 2276 updater.exe 84 PID 2276 wrote to memory of 2836 2276 updater.exe 84 PID 2276 wrote to memory of 2836 2276 updater.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\490a5522aeaf111abdbe2eaf8dec0ffd81a687c395dad12ddcb8a6616c7c7478.exe"C:\Users\Admin\AppData\Local\Temp\490a5522aeaf111abdbe2eaf8dec0ffd81a687c395dad12ddcb8a6616c7c7478.exe"1⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1700 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵
- Drops file in Windows directory
PID:2256
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:2828
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:2760
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:2772
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:2596
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:2764
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"2⤵
- Launches sc.exe
PID:2580
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"2⤵
- Launches sc.exe
PID:2708
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:2496
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"2⤵
- Launches sc.exe
PID:1880
-
-
C:\ProgramData\Google\Chrome\updater.exeC:\ProgramData\Google\Chrome\updater.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵
- Drops file in Windows directory
PID:1628
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:472
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:1692
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:1824
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:2124
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:2728
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:1256
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD52b19df2da3af86adf584efbddd0d31c0
SHA1f1738910789e169213611c033d83bc9577373686
SHA25658868a299c5cf1167ed3fbc570a449ecd696406410b24913ddbd0f06a32595bd
SHA5124a1831f42a486a0ad2deef3d348e7220209214699504e29fdfeb2a6f7f25ad1d353158cd05778f76ef755e77ccd94ce9b4a7504039e439e4e90fa7cde589daa6
-
Filesize
5.1MB
MD53f7e36fa14bafefea46398ba14dd7e75
SHA1856e0d0bcfb5f69fc9cf389a87aad6261b984e2b
SHA256490a5522aeaf111abdbe2eaf8dec0ffd81a687c395dad12ddcb8a6616c7c7478
SHA5129e107931cb63ce707e292c559b19be032820ae394fb89eae6747f9ae7328f8257017b4c70ead2fe5a2dba4b3ca7e178ac98e1e09f275400671aa4890535baa0c