Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/06/2024, 02:11
Static task
static1
Behavioral task
behavioral1
Sample
970e42e01f0a5e0ae87a79fb209acae605eefa6c168c8008fbc9f544e405b683.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
970e42e01f0a5e0ae87a79fb209acae605eefa6c168c8008fbc9f544e405b683.exe
Resource
win10v2004-20240508-en
General
-
Target
970e42e01f0a5e0ae87a79fb209acae605eefa6c168c8008fbc9f544e405b683.exe
-
Size
819KB
-
MD5
12b9b84dad30fa72eb661f353b61e734
-
SHA1
4fd8377e65e1cafa730ddb07d99ba64774b979f8
-
SHA256
970e42e01f0a5e0ae87a79fb209acae605eefa6c168c8008fbc9f544e405b683
-
SHA512
39b7023a8174107ab77340bbec44cce8f047149acc9fa1bc520ce856433e2b5a4b2a93e45a7c406cc2387dba1b44a9258bae6236fa7b781ee7758e3ac63bbf45
-
SSDEEP
24576:7p7C3c6H8re+rb6LRFbl5KPotfdGTZdMgtY+VTQC:7pAyrOLR9l5KYfkddMgtY+VTQ
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2616 powershell.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2264 set thread context of 2416 2264 970e42e01f0a5e0ae87a79fb209acae605eefa6c168c8008fbc9f544e405b683.exe 32 PID 2416 set thread context of 1200 2416 MSBuild.exe 21 PID 2416 set thread context of 2320 2416 MSBuild.exe 35 PID 2320 set thread context of 1200 2320 bitsadmin.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2768 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2616 powershell.exe 2416 MSBuild.exe 2416 MSBuild.exe 2416 MSBuild.exe 2416 MSBuild.exe 2416 MSBuild.exe 2416 MSBuild.exe 2416 MSBuild.exe 2416 MSBuild.exe 2320 bitsadmin.exe 2320 bitsadmin.exe 2320 bitsadmin.exe 2320 bitsadmin.exe 2320 bitsadmin.exe 2320 bitsadmin.exe 2320 bitsadmin.exe 2320 bitsadmin.exe 2320 bitsadmin.exe 2320 bitsadmin.exe 2320 bitsadmin.exe 2320 bitsadmin.exe 2320 bitsadmin.exe 2320 bitsadmin.exe 2320 bitsadmin.exe 2320 bitsadmin.exe 2320 bitsadmin.exe 2320 bitsadmin.exe 2320 bitsadmin.exe 2320 bitsadmin.exe 2320 bitsadmin.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2416 MSBuild.exe 1200 Explorer.EXE 1200 Explorer.EXE 2320 bitsadmin.exe 2320 bitsadmin.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2616 powershell.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2616 2264 970e42e01f0a5e0ae87a79fb209acae605eefa6c168c8008fbc9f544e405b683.exe 28 PID 2264 wrote to memory of 2616 2264 970e42e01f0a5e0ae87a79fb209acae605eefa6c168c8008fbc9f544e405b683.exe 28 PID 2264 wrote to memory of 2616 2264 970e42e01f0a5e0ae87a79fb209acae605eefa6c168c8008fbc9f544e405b683.exe 28 PID 2264 wrote to memory of 2616 2264 970e42e01f0a5e0ae87a79fb209acae605eefa6c168c8008fbc9f544e405b683.exe 28 PID 2264 wrote to memory of 2768 2264 970e42e01f0a5e0ae87a79fb209acae605eefa6c168c8008fbc9f544e405b683.exe 30 PID 2264 wrote to memory of 2768 2264 970e42e01f0a5e0ae87a79fb209acae605eefa6c168c8008fbc9f544e405b683.exe 30 PID 2264 wrote to memory of 2768 2264 970e42e01f0a5e0ae87a79fb209acae605eefa6c168c8008fbc9f544e405b683.exe 30 PID 2264 wrote to memory of 2768 2264 970e42e01f0a5e0ae87a79fb209acae605eefa6c168c8008fbc9f544e405b683.exe 30 PID 2264 wrote to memory of 2416 2264 970e42e01f0a5e0ae87a79fb209acae605eefa6c168c8008fbc9f544e405b683.exe 32 PID 2264 wrote to memory of 2416 2264 970e42e01f0a5e0ae87a79fb209acae605eefa6c168c8008fbc9f544e405b683.exe 32 PID 2264 wrote to memory of 2416 2264 970e42e01f0a5e0ae87a79fb209acae605eefa6c168c8008fbc9f544e405b683.exe 32 PID 2264 wrote to memory of 2416 2264 970e42e01f0a5e0ae87a79fb209acae605eefa6c168c8008fbc9f544e405b683.exe 32 PID 2264 wrote to memory of 2416 2264 970e42e01f0a5e0ae87a79fb209acae605eefa6c168c8008fbc9f544e405b683.exe 32 PID 2264 wrote to memory of 2416 2264 970e42e01f0a5e0ae87a79fb209acae605eefa6c168c8008fbc9f544e405b683.exe 32 PID 2264 wrote to memory of 2416 2264 970e42e01f0a5e0ae87a79fb209acae605eefa6c168c8008fbc9f544e405b683.exe 32 PID 1200 wrote to memory of 2320 1200 Explorer.EXE 35 PID 1200 wrote to memory of 2320 1200 Explorer.EXE 35 PID 1200 wrote to memory of 2320 1200 Explorer.EXE 35 PID 1200 wrote to memory of 2320 1200 Explorer.EXE 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\970e42e01f0a5e0ae87a79fb209acae605eefa6c168c8008fbc9f544e405b683.exe"C:\Users\Admin\AppData\Local\Temp\970e42e01f0a5e0ae87a79fb209acae605eefa6c168c8008fbc9f544e405b683.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\UNuFErjY.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UNuFErjY" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3524.tmp"3⤵
- Creates scheduled task(s)
PID:2768
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2416
-
-
-
C:\Windows\SysWOW64\bitsadmin.exe"C:\Windows\SysWOW64\bitsadmin.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5aaa4b0d0d4a89aeb321eb0a3c96c60a8
SHA1a49bdec4e8565a57a1f21aa66306074b4188966e
SHA256f340d2c95d06d158de1aa7bef23bb904aa094fd357fad22566b27b0a45b04966
SHA512c4741fb61a8ceab1efd8bf146d5dce33915188d620792c9602a59de9846009940aeea99184e4a77711113986ab6799a7389290e575f0c28e808fc0189abac935