Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 19:13

General

  • Target

    ab3233851d7f29ea66074a9a50a59540N.exe

  • Size

    330KB

  • MD5

    ab3233851d7f29ea66074a9a50a59540

  • SHA1

    7d5b8e5c84e0908261afa1f9f47264d2d1820724

  • SHA256

    f18dbf85ce6e20ff9639b55c4f595e76ed93888cf6a87afdad0abd5689f531cb

  • SHA512

    e27242405648634f9c572d8b67e0e62c536cf95b355a2eeecd676abcc0a993fb170d7515c298b9a0dbeed6c16b36ce502bb0d6ca2957c838624ca0385e930006

  • SSDEEP

    6144:YeC4EwZFoobUk8qp0qpgogZfpjkNaXihVP:8fhuLwflkLVP

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
  • Stops running service(s) 4 TTPs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Launches sc.exe 22 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab3233851d7f29ea66074a9a50a59540N.exe
    "C:\Users\Admin\AppData\Local\Temp\ab3233851d7f29ea66074a9a50a59540N.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Loads dropped DLL
    • Windows security modification
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" config wdfilter start=disabled
      2⤵
      • Launches sc.exe
      PID:1728
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" config WerSvc start=disabled
      2⤵
      • Launches sc.exe
      PID:2400
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c sc stop wdfilter
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1828
      • C:\Windows\system32\sc.exe
        sc stop wdfilter
        3⤵
        • Launches sc.exe
        PID:2856
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" config WinDefend start=disabled
      2⤵
      • Launches sc.exe
      PID:2740
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c sc stop WerSvc
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2724
      • C:\Windows\system32\sc.exe
        sc stop WerSvc
        3⤵
        • Launches sc.exe
        PID:2876
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" config WdNisSvc start=disabled
      2⤵
      • Launches sc.exe
      PID:2892
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c sc stop WinDefend
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\Windows\system32\sc.exe
        sc stop WinDefend
        3⤵
        • Launches sc.exe
        PID:2592
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c sc stop WdNisSvc
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Windows\system32\sc.exe
        sc stop WdNisSvc
        3⤵
        • Launches sc.exe
        PID:2608
    • C:\Windows\System32\sc.exe
      "C:\Windows\System32\sc.exe" config XblGameSave start=disabled
      2⤵
      • Launches sc.exe
      PID:2588
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c sc stop XblGameSave
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1044
      • C:\Windows\system32\sc.exe
        sc stop XblGameSave
        3⤵
        • Launches sc.exe
        PID:3064
    • C:\Users\Admin\AppData\Local\Temp\yi0atn23.bat
      "C:\Users\Admin\AppData\Local\Temp\yi0atn23.bat" ok
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:632
      • C:\Windows\System32\sc.exe
        "C:\Windows\System32\sc.exe" config wdfilter start=disabled
        3⤵
        • Launches sc.exe
        PID:2844
      • C:\Windows\System32\sc.exe
        "C:\Windows\System32\sc.exe" config WerSvc start=disabled
        3⤵
        • Launches sc.exe
        PID:2920
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c sc stop wdfilter
        3⤵
          PID:1364
          • C:\Windows\system32\sc.exe
            sc stop wdfilter
            4⤵
            • Launches sc.exe
            PID:1204
        • C:\Windows\System32\sc.exe
          "C:\Windows\System32\sc.exe" config WinDefend start=disabled
          3⤵
          • Launches sc.exe
          PID:1156
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c sc stop WerSvc
          3⤵
            PID:2112
            • C:\Windows\system32\sc.exe
              sc stop WerSvc
              4⤵
              • Launches sc.exe
              PID:264
          • C:\Windows\System32\sc.exe
            "C:\Windows\System32\sc.exe" config WdNisSvc start=disabled
            3⤵
            • Launches sc.exe
            PID:2020
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c sc stop WinDefend
            3⤵
              PID:1488
              • C:\Windows\system32\sc.exe
                sc stop WinDefend
                4⤵
                • Launches sc.exe
                PID:3004
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c sc stop WdNisSvc
              3⤵
                PID:392
                • C:\Windows\system32\sc.exe
                  sc stop WdNisSvc
                  4⤵
                  • Launches sc.exe
                  PID:1960
              • C:\Windows\System32\sc.exe
                "C:\Windows\System32\sc.exe" config XblGameSave start=disabled
                3⤵
                • Launches sc.exe
                PID:3000
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c sc stop XblGameSave
                3⤵
                  PID:1704
                  • C:\Windows\system32\sc.exe
                    sc stop XblGameSave
                    4⤵
                    • Launches sc.exe
                    PID:1612
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" New-NetQosPolicy -Name "XXXXX" -AppPathNameMatchCondition "C:\Program Files (x86)\EasyAntiCheat\EasyAntiCheat.exe" -ThrottleRateActionBitsPerSecond 8
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:564
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" New-NetQosPolicy -Name "YYYYY" -AppPathNameMatchCondition "C:\Program Files (x86)\Common Files\BattlEye\BEService.exe" -ThrottleRateActionBitsPerSecond 8
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1268
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c sc stop wdfilter
                  3⤵
                    PID:2412
                    • C:\Windows\system32\sc.exe
                      sc stop wdfilter
                      4⤵
                      • Launches sc.exe
                      PID:2416
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c sc stop faceit
                    3⤵
                      PID:1912
                      • C:\Windows\system32\sc.exe
                        sc stop faceit
                        4⤵
                        • Launches sc.exe
                        PID:3024
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\bceeda17-e57f-47a7-8c0c-1ae93f782e87.bat"
                    2⤵
                    • Deletes itself
                    • Suspicious use of WriteProcessMemory
                    PID:2932
                    • C:\Windows\system32\attrib.exe
                      attrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\ab3233851d7f29ea66074a9a50a59540N.exe"
                      3⤵
                      • Views/modifies file attributes
                      PID:2840
                    • C:\Windows\system32\reg.exe
                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "HiberbootEnabled" /t REG_DWORD /d 0 /f
                      3⤵
                        PID:1072
                      • C:\Windows\system32\timeout.exe
                        timeout /T 1
                        3⤵
                        • Delays execution with timeout.exe
                        PID:1664
                      • C:\Windows\system32\attrib.exe
                        attrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\ab3233851d7f29ea66074a9a50a59540N.exe"
                        3⤵
                        • Views/modifies file attributes
                        PID:984
                      • C:\Windows\system32\wevtutil.exe
                        wevtutil el
                        3⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1812
                      • C:\Windows\system32\attrib.exe
                        attrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\bceeda17-e57f-47a7-8c0c-1ae93f782e87.bat"
                        3⤵
                        • Views/modifies file attributes
                        PID:2024

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\bceeda17-e57f-47a7-8c0c-1ae93f782e87.bat

                    Filesize

                    652B

                    MD5

                    93a9a38bd9653e6dd2329fd018c2c27b

                    SHA1

                    d749a61afa8012e9eb0c3b0872fcb0324432342b

                    SHA256

                    71092f87a2757c4f46cc3bb87ed1b4161a6b05f67f57f82d77fbd45feb4385cd

                    SHA512

                    78ed6e29e22e19a717f6e1de1dbade25b55ec0ac394711e24cda35923fca703963a48577c5e66da559acea98eb2d6a82f4c5c5f90acf6e32e0746bb2bb5b378c

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                    Filesize

                    7KB

                    MD5

                    cbed48f10136a06a2d72ef658204c512

                    SHA1

                    60a3975ea516909ada982badc71c87bf78a17b4f

                    SHA256

                    981e7a03ea4db881fb5ac3edce3c0f726388c472981ef168d3250d10b0632901

                    SHA512

                    0f28fe94f9b75bea86435df94cd0467e1f24555958c76b99b64aa44ed3d60cdc345173eec3a86ba815a59bdef255fbd6fef78058289e7f6eeab0203b0c0e264e

                  • C:\Users\Admin\AppData\Roaming\spf\unknown.log

                    Filesize

                    263B

                    MD5

                    3c162df5e709ff6d99f82c2fb0b2fdc4

                    SHA1

                    940bd2d7bab4e6b9e8c4d7734c6f102d952338cd

                    SHA256

                    c2d77a02704db553164b2f88e714be3a8956f094fc90935ee41e10f9ac6460f0

                    SHA512

                    7994745fe5ec0bc7dda9c26129194357143d522ca77e00cfbcfc219ae00182d2d055f373a75145f8717813ef9164968f68c0a5719e32d7ab4d0732661a16241a

                  • \Users\Admin\AppData\Local\Temp\yi0atn23.bat

                    Filesize

                    331KB

                    MD5

                    2c94d2cdfda021c89fcabd7ce0d3fcb5

                    SHA1

                    f759c5b8cbaef2d6f901796dd13fe11ddba0e5a0

                    SHA256

                    ae941cc76e7254060e3f729980a9c2c35d77ed11cf7284d654300a168650b257

                    SHA512

                    bd2673a9ac9889ae79ebe8a743ce5c8079126ae8be3cdd30274ac7603ad51eb535291cf2485a982dc16cd14b27ab4d24ae801d5bc3adc338f415cdfe0f2039f8

                  • memory/564-28-0x000000001B520000-0x000000001B802000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/564-29-0x0000000001E80000-0x0000000001E88000-memory.dmp

                    Filesize

                    32KB

                  • memory/632-14-0x000000013E810000-0x000000013E84E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1268-35-0x000000001B5E0000-0x000000001B8C2000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/1268-36-0x0000000002810000-0x0000000002818000-memory.dmp

                    Filesize

                    32KB

                  • memory/2032-18-0x000007FEF5210000-0x000007FEF5BFC000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2032-2-0x000007FEF5210000-0x000007FEF5BFC000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2032-0-0x000007FEF5213000-0x000007FEF5214000-memory.dmp

                    Filesize

                    4KB

                  • memory/2032-1-0x000000013EE60000-0x000000013EE9E000-memory.dmp

                    Filesize

                    248KB