Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    47s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    07/08/2024, 01:15

General

  • Target

    Document 240000807.exe

  • Size

    1009KB

  • MD5

    2fc319277fc5b4a422ee4061a9efb654

  • SHA1

    21d125d5fea94d4a12327777fe209f50588fc82f

  • SHA256

    94234a613eee42af83965884973b29b57e30ef77106535fd6b3b1efb9d7f2ae3

  • SHA512

    76a5e5db7b6b1a8556f89caa0a76511ff0f6d2d3acd62e7ae2105b6a3b479e6145b800b49ac93844a8582eb2c67337368a08887a0899da7bb83a80ad514fd6d9

  • SSDEEP

    24576:4tVbi/AS9oZaFzl37Btwo6sdKKFcLIF/gsuQ8u4k5TWkC6j:CViAS9oZCBt3dKKSy49WlWk7

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Document 240000807.exe
    "C:\Users\Admin\AppData\Local\Temp\Document 240000807.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Document 240000807.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:964
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\DUgZqfrTIHnoZO.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2856
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DUgZqfrTIHnoZO" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7733.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:3044
    • C:\Users\Admin\AppData\Local\Temp\Document 240000807.exe
      "C:\Users\Admin\AppData\Local\Temp\Document 240000807.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp7733.tmp

    Filesize

    1KB

    MD5

    7774b85f0710d669c9aa5f3b7c86b9b9

    SHA1

    37b1b95769caa1bfdcd9b50f7cece4b27596f90a

    SHA256

    6166028d4abebacfb1adf25b5d24554118c7f622eed28dfd4339ba611250879e

    SHA512

    50c6607eb541cf11b728c6bf20529073c83f774949054b7f825d6c099ffeb8f2ca1020a617a56aba37406c1f7355d04b79c10750e402bc76bd3921b256e435ba

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    cdec421f6c227791f301de1a68ffb34f

    SHA1

    9dd89a5db99eb3da87dd3662a3c17657910c0122

    SHA256

    a676731df4c815835b6d45b911b081317712bcfe33cb53c1f4c3874e7c11eb5a

    SHA512

    2a91e6e1707ce7f10220d081467aa69cce103bedd137777022de12b49929080a5b55bf7c0697a9887552757233032a04477c4298390f260ab5260a1c971f2f41

  • memory/1184-35-0x0000000074A80000-0x000000007516E000-memory.dmp

    Filesize

    6.9MB

  • memory/1184-1-0x0000000000E80000-0x0000000000F80000-memory.dmp

    Filesize

    1024KB

  • memory/1184-2-0x0000000004380000-0x0000000004470000-memory.dmp

    Filesize

    960KB

  • memory/1184-3-0x0000000074A80000-0x000000007516E000-memory.dmp

    Filesize

    6.9MB

  • memory/1184-4-0x0000000000960000-0x0000000000978000-memory.dmp

    Filesize

    96KB

  • memory/1184-5-0x00000000009E0000-0x00000000009EE000-memory.dmp

    Filesize

    56KB

  • memory/1184-6-0x0000000000A00000-0x0000000000A16000-memory.dmp

    Filesize

    88KB

  • memory/1184-7-0x0000000005E00000-0x0000000005E96000-memory.dmp

    Filesize

    600KB

  • memory/1184-0-0x0000000074A8E000-0x0000000074A8F000-memory.dmp

    Filesize

    4KB

  • memory/1792-20-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/1792-32-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1792-30-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/1792-28-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/1792-26-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/1792-24-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/1792-33-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/1792-23-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/1792-34-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB