Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 12:59
Static task
static1
Behavioral task
behavioral1
Sample
Build.exe
Resource
win7-20240705-en
General
-
Target
Build.exe
-
Size
228KB
-
MD5
71ddf8513d766ad7609183f9ab38a58b
-
SHA1
a5b1ad7cd743efd65f2bc21d3f2189321397d63c
-
SHA256
fdd31714436d0feb6195b4a2affe04c143890518eb36d190af1cc930b1c57e9f
-
SHA512
9bf5ce015ba7ddad390b263a8b1d8b38de0e511ca50af408b7bbfa6a3a41869db82cbc3e9d41c60fe6e9cfb9a5e0c9aa3579e3af6673fba9ef5787293b15ce7e
-
SSDEEP
6144:RPTRtufdY7vzXpjYgV53GUEMlqJ8eFNLB+y:MG7vzZXW+4NI
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
pid Process 2372 powershell.exe 2660 powershell.exe 2592 powershell.exe 2700 powershell.exe -
Deletes itself 1 IoCs
pid Process 2696 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 discord.com 9 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2696 cmd.exe 2188 PING.EXE -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 1676 wmic.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2188 PING.EXE -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2700 powershell.exe 2372 powershell.exe 2660 powershell.exe 2664 powershell.exe 2592 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2384 Build.exe Token: SeDebugPrivilege 2700 powershell.exe Token: SeDebugPrivilege 2372 powershell.exe Token: SeDebugPrivilege 2660 powershell.exe Token: SeDebugPrivilege 2664 powershell.exe Token: SeIncreaseQuotaPrivilege 308 wmic.exe Token: SeSecurityPrivilege 308 wmic.exe Token: SeTakeOwnershipPrivilege 308 wmic.exe Token: SeLoadDriverPrivilege 308 wmic.exe Token: SeSystemProfilePrivilege 308 wmic.exe Token: SeSystemtimePrivilege 308 wmic.exe Token: SeProfSingleProcessPrivilege 308 wmic.exe Token: SeIncBasePriorityPrivilege 308 wmic.exe Token: SeCreatePagefilePrivilege 308 wmic.exe Token: SeBackupPrivilege 308 wmic.exe Token: SeRestorePrivilege 308 wmic.exe Token: SeShutdownPrivilege 308 wmic.exe Token: SeDebugPrivilege 308 wmic.exe Token: SeSystemEnvironmentPrivilege 308 wmic.exe Token: SeRemoteShutdownPrivilege 308 wmic.exe Token: SeUndockPrivilege 308 wmic.exe Token: SeManageVolumePrivilege 308 wmic.exe Token: 33 308 wmic.exe Token: 34 308 wmic.exe Token: 35 308 wmic.exe Token: SeIncreaseQuotaPrivilege 308 wmic.exe Token: SeSecurityPrivilege 308 wmic.exe Token: SeTakeOwnershipPrivilege 308 wmic.exe Token: SeLoadDriverPrivilege 308 wmic.exe Token: SeSystemProfilePrivilege 308 wmic.exe Token: SeSystemtimePrivilege 308 wmic.exe Token: SeProfSingleProcessPrivilege 308 wmic.exe Token: SeIncBasePriorityPrivilege 308 wmic.exe Token: SeCreatePagefilePrivilege 308 wmic.exe Token: SeBackupPrivilege 308 wmic.exe Token: SeRestorePrivilege 308 wmic.exe Token: SeShutdownPrivilege 308 wmic.exe Token: SeDebugPrivilege 308 wmic.exe Token: SeSystemEnvironmentPrivilege 308 wmic.exe Token: SeRemoteShutdownPrivilege 308 wmic.exe Token: SeUndockPrivilege 308 wmic.exe Token: SeManageVolumePrivilege 308 wmic.exe Token: 33 308 wmic.exe Token: 34 308 wmic.exe Token: 35 308 wmic.exe Token: SeIncreaseQuotaPrivilege 1340 wmic.exe Token: SeSecurityPrivilege 1340 wmic.exe Token: SeTakeOwnershipPrivilege 1340 wmic.exe Token: SeLoadDriverPrivilege 1340 wmic.exe Token: SeSystemProfilePrivilege 1340 wmic.exe Token: SeSystemtimePrivilege 1340 wmic.exe Token: SeProfSingleProcessPrivilege 1340 wmic.exe Token: SeIncBasePriorityPrivilege 1340 wmic.exe Token: SeCreatePagefilePrivilege 1340 wmic.exe Token: SeBackupPrivilege 1340 wmic.exe Token: SeRestorePrivilege 1340 wmic.exe Token: SeShutdownPrivilege 1340 wmic.exe Token: SeDebugPrivilege 1340 wmic.exe Token: SeSystemEnvironmentPrivilege 1340 wmic.exe Token: SeRemoteShutdownPrivilege 1340 wmic.exe Token: SeUndockPrivilege 1340 wmic.exe Token: SeManageVolumePrivilege 1340 wmic.exe Token: 33 1340 wmic.exe Token: 34 1340 wmic.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2340 2384 Build.exe 30 PID 2384 wrote to memory of 2340 2384 Build.exe 30 PID 2384 wrote to memory of 2340 2384 Build.exe 30 PID 2384 wrote to memory of 2700 2384 Build.exe 32 PID 2384 wrote to memory of 2700 2384 Build.exe 32 PID 2384 wrote to memory of 2700 2384 Build.exe 32 PID 2384 wrote to memory of 2372 2384 Build.exe 34 PID 2384 wrote to memory of 2372 2384 Build.exe 34 PID 2384 wrote to memory of 2372 2384 Build.exe 34 PID 2384 wrote to memory of 2660 2384 Build.exe 36 PID 2384 wrote to memory of 2660 2384 Build.exe 36 PID 2384 wrote to memory of 2660 2384 Build.exe 36 PID 2384 wrote to memory of 2664 2384 Build.exe 38 PID 2384 wrote to memory of 2664 2384 Build.exe 38 PID 2384 wrote to memory of 2664 2384 Build.exe 38 PID 2384 wrote to memory of 308 2384 Build.exe 40 PID 2384 wrote to memory of 308 2384 Build.exe 40 PID 2384 wrote to memory of 308 2384 Build.exe 40 PID 2384 wrote to memory of 1340 2384 Build.exe 43 PID 2384 wrote to memory of 1340 2384 Build.exe 43 PID 2384 wrote to memory of 1340 2384 Build.exe 43 PID 2384 wrote to memory of 2512 2384 Build.exe 45 PID 2384 wrote to memory of 2512 2384 Build.exe 45 PID 2384 wrote to memory of 2512 2384 Build.exe 45 PID 2384 wrote to memory of 2592 2384 Build.exe 47 PID 2384 wrote to memory of 2592 2384 Build.exe 47 PID 2384 wrote to memory of 2592 2384 Build.exe 47 PID 2384 wrote to memory of 1676 2384 Build.exe 49 PID 2384 wrote to memory of 1676 2384 Build.exe 49 PID 2384 wrote to memory of 1676 2384 Build.exe 49 PID 2384 wrote to memory of 2696 2384 Build.exe 51 PID 2384 wrote to memory of 2696 2384 Build.exe 51 PID 2384 wrote to memory of 2696 2384 Build.exe 51 PID 2696 wrote to memory of 2188 2696 cmd.exe 53 PID 2696 wrote to memory of 2188 2696 cmd.exe 53 PID 2696 wrote to memory of 2188 2696 cmd.exe 53 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2340 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Build.exe"C:\Users\Admin\AppData\Local\Temp\Build.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\system32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\Build.exe"2⤵
- Views/modifies file attributes
PID:2340
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 22⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:308
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1340
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵PID:2512
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2592
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name2⤵
- Detects videocard installed
PID:1676
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\Build.exe" && pause2⤵
- Deletes itself
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\system32\PING.EXEping localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2188
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" shell32.dll,Options_RunDLL 31⤵PID:2252
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD559899d48191d850263b607ed0b6765bd
SHA1ddef4723473b3d64ca90502def0cd18e68da50e0
SHA256c32759daaf4477e04602fb8b29da5262102d68cb256fc627586541c57c3b5661
SHA51251effd2b2bf01161dc63046b78030a2d95b4471fec2a5694ab9e36adbd049fc3933b7097fabb8c8fffda989adc906867179e23f8efaee209d3bffcd56f9c320b