Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 15:22
Static task
static1
Behavioral task
behavioral1
Sample
668ef0cbbba392e41123ff053035c5754b0106c7aa447d8be8462e1687af2ab3.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
668ef0cbbba392e41123ff053035c5754b0106c7aa447d8be8462e1687af2ab3.exe
Resource
win10v2004-20240508-en
General
-
Target
668ef0cbbba392e41123ff053035c5754b0106c7aa447d8be8462e1687af2ab3.exe
-
Size
3.9MB
-
MD5
198445ccfde3c7d3008fcdc4d0f4ea96
-
SHA1
c28cbcd5d5a5c95d4e85664cde0b4272f98dcf1d
-
SHA256
668ef0cbbba392e41123ff053035c5754b0106c7aa447d8be8462e1687af2ab3
-
SHA512
35faa63ac38843e2532741406ca44275020d2b4d2ee8fea0a9a23399318e3f2022691b2be110d6e4b921599d76c2d3eb21d40849c01a4df595e40d9e4cd795a5
-
SSDEEP
49152:IBJBZDwpx4hvBLbw/T6aFOcyZhEKkD4J5Q6cCVneVJRZY+NOvC250KUfn1Y7ZvKV:y/5wpa8T6aFZA4LCoJRNbD1YVuOnE
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2740 HyperportwinSession.exe 2668 winlogon.exe -
Loads dropped DLL 2 IoCs
pid Process 2748 cmd.exe 2748 cmd.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\microsoft shared\DW\services.exe HyperportwinSession.exe File created C:\Program Files (x86)\Common Files\microsoft shared\DW\c5b4cb5e9653cc HyperportwinSession.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe 2740 HyperportwinSession.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2668 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2740 HyperportwinSession.exe Token: SeDebugPrivilege 2668 winlogon.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2012 2180 668ef0cbbba392e41123ff053035c5754b0106c7aa447d8be8462e1687af2ab3.exe 28 PID 2180 wrote to memory of 2012 2180 668ef0cbbba392e41123ff053035c5754b0106c7aa447d8be8462e1687af2ab3.exe 28 PID 2180 wrote to memory of 2012 2180 668ef0cbbba392e41123ff053035c5754b0106c7aa447d8be8462e1687af2ab3.exe 28 PID 2180 wrote to memory of 2012 2180 668ef0cbbba392e41123ff053035c5754b0106c7aa447d8be8462e1687af2ab3.exe 28 PID 2012 wrote to memory of 2748 2012 WScript.exe 29 PID 2012 wrote to memory of 2748 2012 WScript.exe 29 PID 2012 wrote to memory of 2748 2012 WScript.exe 29 PID 2012 wrote to memory of 2748 2012 WScript.exe 29 PID 2748 wrote to memory of 2740 2748 cmd.exe 31 PID 2748 wrote to memory of 2740 2748 cmd.exe 31 PID 2748 wrote to memory of 2740 2748 cmd.exe 31 PID 2748 wrote to memory of 2740 2748 cmd.exe 31 PID 2740 wrote to memory of 548 2740 HyperportwinSession.exe 32 PID 2740 wrote to memory of 548 2740 HyperportwinSession.exe 32 PID 2740 wrote to memory of 548 2740 HyperportwinSession.exe 32 PID 548 wrote to memory of 1100 548 cmd.exe 34 PID 548 wrote to memory of 1100 548 cmd.exe 34 PID 548 wrote to memory of 1100 548 cmd.exe 34 PID 548 wrote to memory of 1520 548 cmd.exe 35 PID 548 wrote to memory of 1520 548 cmd.exe 35 PID 548 wrote to memory of 1520 548 cmd.exe 35 PID 548 wrote to memory of 2668 548 cmd.exe 36 PID 548 wrote to memory of 2668 548 cmd.exe 36 PID 548 wrote to memory of 2668 548 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\668ef0cbbba392e41123ff053035c5754b0106c7aa447d8be8462e1687af2ab3.exe"C:\Users\Admin\AppData\Local\Temp\668ef0cbbba392e41123ff053035c5754b0106c7aa447d8be8462e1687af2ab3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ComproviderintobrokerNet\NWVATf5YrTd8g96j7TYVg4ALh0T0CEgN16rZ6pCUCuA0.vbe"2⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ComproviderintobrokerNet\PDQ7LoGhnqrW1weWu8.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\ComproviderintobrokerNet\HyperportwinSession.exe"C:\ComproviderintobrokerNet/HyperportwinSession.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\UzxQkhZflt.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:1100
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:1520
-
-
C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\winlogon.exe"C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\winlogon.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD521e3c4d0fb2808d93061a24051b1cd1d
SHA17e9e8dcf0502aa11ff27312ad275bdc58f7ff840
SHA256616b81d389a5914d515a375e2c1fcdcb2ddb8ac1e28c5d01c9a006b7ea458b27
SHA5120853119735fc5e2fe4fac068bfbb52ad80457adcaefae179fbe4fd2a1c1bbe6589e61f881ec6bb9e42cd88b63b200883305c5a12702df72ec2102a81428399b6
-
Filesize
221B
MD5d656a1b6958129671674c11c642c97ed
SHA1000e73d933503c7fcccffbe8b53abb56db7fe32f
SHA2569e156bb87dcd429b33b01284272931d40cadb5b084ea7999c820d9443b1a828b
SHA512e40fda724d71820e11e9398ff15b9f97fd550344a6767009f6310534e09504d56b9206dd2abf81b65417282e8406e845e2857d887fe450346a023e01cce30ee7
-
Filesize
100B
MD5494988d014dee882cd6df819ea7a5c38
SHA1543c33f979b255564b93b5965f4c783548bcaee5
SHA256500780e72faf5d90928affb6cb2e285cfa9f9a025fb289243c3eb7ee7aac7c41
SHA512fb732fb2ee57635635f85b72b2bffdea3e4c25aece684d20f575858adc22e3efc5146b4d866cdac6d0f0c23e02672d3eba0ab3b8637876e1cb2c6510b69450b7
-
Filesize
264B
MD533690cd3890d179054a284aa2187fc53
SHA1dd02658a2b7726aac672802fd3cc207972400d27
SHA2561520e5d36f18eb874e68cd5d10d2adf458b1a38e0b3ef3b2be44dba3df1e34b0
SHA5128e41d71e7db8446a07219ecea4b057c6d6e10effe7fcc3147d1668868f5669ad88ad9985701c530b5f2ae0fdad35c35f4dd2dd9e69becc7b41876d600475d7a8