Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
89s -
max time network
87s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 21:08
Behavioral task
behavioral1
Sample
880291d677d6775c4d808db72a161db0N.exe
Resource
win7-20240903-en
General
-
Target
880291d677d6775c4d808db72a161db0N.exe
-
Size
229KB
-
MD5
880291d677d6775c4d808db72a161db0
-
SHA1
5455b1a4cc2efeef61a63109a34c0730a759cae4
-
SHA256
07e766e52bb7e049cf15d5f7a5d7e5600760920a6fdf0817da956572267f6002
-
SHA512
9bb8a742960e14ebbc50e247cc96ce3cf721e45fe19afe98e1fa8820aad8c9af96291445c778d06c6916763c54b0f5e3e05d7187cceb1a96b8ff9fba9e3c927f
-
SSDEEP
6144:lloZM9rIkd8g+EtXHkv/iD4ruwiJX8Qf3+nJUg172b8e1mei:noZOL+EP8ruwiJX8Qf3+nJUg1uY
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral1/memory/2960-1-0x0000000000070000-0x00000000000B0000-memory.dmp family_umbral -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2360 powershell.exe 1348 powershell.exe 1864 powershell.exe 940 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts 880291d677d6775c4d808db72a161db0N.exe -
Deletes itself 1 IoCs
pid Process 2320 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 11 discord.com 12 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ip-api.com -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2320 cmd.exe 2172 PING.EXE -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 376 wmic.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2172 PING.EXE -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2360 powershell.exe 1348 powershell.exe 1864 powershell.exe 2868 powershell.exe 940 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2960 880291d677d6775c4d808db72a161db0N.exe Token: SeDebugPrivilege 2360 powershell.exe Token: SeDebugPrivilege 1348 powershell.exe Token: SeDebugPrivilege 1864 powershell.exe Token: SeDebugPrivilege 2868 powershell.exe Token: SeIncreaseQuotaPrivilege 2272 wmic.exe Token: SeSecurityPrivilege 2272 wmic.exe Token: SeTakeOwnershipPrivilege 2272 wmic.exe Token: SeLoadDriverPrivilege 2272 wmic.exe Token: SeSystemProfilePrivilege 2272 wmic.exe Token: SeSystemtimePrivilege 2272 wmic.exe Token: SeProfSingleProcessPrivilege 2272 wmic.exe Token: SeIncBasePriorityPrivilege 2272 wmic.exe Token: SeCreatePagefilePrivilege 2272 wmic.exe Token: SeBackupPrivilege 2272 wmic.exe Token: SeRestorePrivilege 2272 wmic.exe Token: SeShutdownPrivilege 2272 wmic.exe Token: SeDebugPrivilege 2272 wmic.exe Token: SeSystemEnvironmentPrivilege 2272 wmic.exe Token: SeRemoteShutdownPrivilege 2272 wmic.exe Token: SeUndockPrivilege 2272 wmic.exe Token: SeManageVolumePrivilege 2272 wmic.exe Token: 33 2272 wmic.exe Token: 34 2272 wmic.exe Token: 35 2272 wmic.exe Token: SeIncreaseQuotaPrivilege 2272 wmic.exe Token: SeSecurityPrivilege 2272 wmic.exe Token: SeTakeOwnershipPrivilege 2272 wmic.exe Token: SeLoadDriverPrivilege 2272 wmic.exe Token: SeSystemProfilePrivilege 2272 wmic.exe Token: SeSystemtimePrivilege 2272 wmic.exe Token: SeProfSingleProcessPrivilege 2272 wmic.exe Token: SeIncBasePriorityPrivilege 2272 wmic.exe Token: SeCreatePagefilePrivilege 2272 wmic.exe Token: SeBackupPrivilege 2272 wmic.exe Token: SeRestorePrivilege 2272 wmic.exe Token: SeShutdownPrivilege 2272 wmic.exe Token: SeDebugPrivilege 2272 wmic.exe Token: SeSystemEnvironmentPrivilege 2272 wmic.exe Token: SeRemoteShutdownPrivilege 2272 wmic.exe Token: SeUndockPrivilege 2272 wmic.exe Token: SeManageVolumePrivilege 2272 wmic.exe Token: 33 2272 wmic.exe Token: 34 2272 wmic.exe Token: 35 2272 wmic.exe Token: SeIncreaseQuotaPrivilege 448 wmic.exe Token: SeSecurityPrivilege 448 wmic.exe Token: SeTakeOwnershipPrivilege 448 wmic.exe Token: SeLoadDriverPrivilege 448 wmic.exe Token: SeSystemProfilePrivilege 448 wmic.exe Token: SeSystemtimePrivilege 448 wmic.exe Token: SeProfSingleProcessPrivilege 448 wmic.exe Token: SeIncBasePriorityPrivilege 448 wmic.exe Token: SeCreatePagefilePrivilege 448 wmic.exe Token: SeBackupPrivilege 448 wmic.exe Token: SeRestorePrivilege 448 wmic.exe Token: SeShutdownPrivilege 448 wmic.exe Token: SeDebugPrivilege 448 wmic.exe Token: SeSystemEnvironmentPrivilege 448 wmic.exe Token: SeRemoteShutdownPrivilege 448 wmic.exe Token: SeUndockPrivilege 448 wmic.exe Token: SeManageVolumePrivilege 448 wmic.exe Token: 33 448 wmic.exe Token: 34 448 wmic.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2680 2960 880291d677d6775c4d808db72a161db0N.exe 31 PID 2960 wrote to memory of 2680 2960 880291d677d6775c4d808db72a161db0N.exe 31 PID 2960 wrote to memory of 2680 2960 880291d677d6775c4d808db72a161db0N.exe 31 PID 2960 wrote to memory of 2360 2960 880291d677d6775c4d808db72a161db0N.exe 33 PID 2960 wrote to memory of 2360 2960 880291d677d6775c4d808db72a161db0N.exe 33 PID 2960 wrote to memory of 2360 2960 880291d677d6775c4d808db72a161db0N.exe 33 PID 2960 wrote to memory of 1348 2960 880291d677d6775c4d808db72a161db0N.exe 35 PID 2960 wrote to memory of 1348 2960 880291d677d6775c4d808db72a161db0N.exe 35 PID 2960 wrote to memory of 1348 2960 880291d677d6775c4d808db72a161db0N.exe 35 PID 2960 wrote to memory of 1864 2960 880291d677d6775c4d808db72a161db0N.exe 37 PID 2960 wrote to memory of 1864 2960 880291d677d6775c4d808db72a161db0N.exe 37 PID 2960 wrote to memory of 1864 2960 880291d677d6775c4d808db72a161db0N.exe 37 PID 2960 wrote to memory of 2868 2960 880291d677d6775c4d808db72a161db0N.exe 39 PID 2960 wrote to memory of 2868 2960 880291d677d6775c4d808db72a161db0N.exe 39 PID 2960 wrote to memory of 2868 2960 880291d677d6775c4d808db72a161db0N.exe 39 PID 2960 wrote to memory of 2272 2960 880291d677d6775c4d808db72a161db0N.exe 41 PID 2960 wrote to memory of 2272 2960 880291d677d6775c4d808db72a161db0N.exe 41 PID 2960 wrote to memory of 2272 2960 880291d677d6775c4d808db72a161db0N.exe 41 PID 2960 wrote to memory of 448 2960 880291d677d6775c4d808db72a161db0N.exe 44 PID 2960 wrote to memory of 448 2960 880291d677d6775c4d808db72a161db0N.exe 44 PID 2960 wrote to memory of 448 2960 880291d677d6775c4d808db72a161db0N.exe 44 PID 2960 wrote to memory of 3068 2960 880291d677d6775c4d808db72a161db0N.exe 46 PID 2960 wrote to memory of 3068 2960 880291d677d6775c4d808db72a161db0N.exe 46 PID 2960 wrote to memory of 3068 2960 880291d677d6775c4d808db72a161db0N.exe 46 PID 2960 wrote to memory of 940 2960 880291d677d6775c4d808db72a161db0N.exe 48 PID 2960 wrote to memory of 940 2960 880291d677d6775c4d808db72a161db0N.exe 48 PID 2960 wrote to memory of 940 2960 880291d677d6775c4d808db72a161db0N.exe 48 PID 2960 wrote to memory of 376 2960 880291d677d6775c4d808db72a161db0N.exe 50 PID 2960 wrote to memory of 376 2960 880291d677d6775c4d808db72a161db0N.exe 50 PID 2960 wrote to memory of 376 2960 880291d677d6775c4d808db72a161db0N.exe 50 PID 2960 wrote to memory of 2320 2960 880291d677d6775c4d808db72a161db0N.exe 52 PID 2960 wrote to memory of 2320 2960 880291d677d6775c4d808db72a161db0N.exe 52 PID 2960 wrote to memory of 2320 2960 880291d677d6775c4d808db72a161db0N.exe 52 PID 2320 wrote to memory of 2172 2320 cmd.exe 54 PID 2320 wrote to memory of 2172 2320 cmd.exe 54 PID 2320 wrote to memory of 2172 2320 cmd.exe 54 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2680 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\880291d677d6775c4d808db72a161db0N.exe"C:\Users\Admin\AppData\Local\Temp\880291d677d6775c4d808db72a161db0N.exe"1⤵
- Drops file in Drivers directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\system32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\880291d677d6775c4d808db72a161db0N.exe"2⤵
- Views/modifies file attributes
PID:2680
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\880291d677d6775c4d808db72a161db0N.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 22⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1348
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory2⤵
- Suspicious use of AdjustPrivilegeToken
PID:448
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵PID:3068
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:940
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name2⤵
- Detects videocard installed
PID:376
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\880291d677d6775c4d808db72a161db0N.exe" && pause2⤵
- Deletes itself
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\system32\PING.EXEping localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2172
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD58a501c839429bf1a7602832e10315f87
SHA14b3113ee2e3b0e829129c60ec649fa5d402ed824
SHA256dbba462c617334f4266ac9fb14797bf7291dc50b4e4e8915ba190376b179d0d8
SHA512327b5ef5c28871ae41f5eb46ce8a4a85754c06f523a60fb69c278c76388bb7de0e66c567aeae3dc555a9f5d1ebab6d6e60fbdd1d77f3fc692e1b4614ee2d02f9