Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 00:23

General

  • Target

    e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe

  • Size

    1.8MB

  • MD5

    306c2d16a6c39850c1a960ecd5fd2e60

  • SHA1

    9ad230d95a9ae4c42cc800e710fd0d6dc0abc208

  • SHA256

    e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066

  • SHA512

    458c70d255edae4928bb0c7773a63e647375cbcfb3e8cd058013aa59d0ca2b5db16a9a064aab30f948b24e6426a49dd20e0c6add6d6492382a41d35ff6a5bc58

  • SSDEEP

    49152:jbLKdkfIKSF6L1yEcTad4UNNnm6pGz8YGzw:jb0aLcad4q/Gz8b

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 12 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe
    "C:\Users\Admin\AppData\Local\Temp\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\fj54hoyo\fj54hoyo.cmdline"
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:3048
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2AA9.tmp" "c:\Windows\System32\CSCB74EE3F736364759A3B8EEE04376DE5.TMP"
        3⤵
          PID:1260
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\NsSkgSAIjN.bat"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1936
        • C:\Windows\system32\chcp.com
          chcp 65001
          3⤵
            PID:2384
          • C:\Windows\system32\PING.EXE
            ping -n 10 localhost
            3⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2224
          • C:\Users\Admin\AppData\Local\Temp\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe
            "C:\Users\Admin\AppData\Local\Temp\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe"
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1864
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Documents\explorer.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2660
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Users\All Users\Documents\explorer.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2548
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Documents\explorer.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2620
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\Windows\RemotePackages\audiodg.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1576
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Windows\RemotePackages\audiodg.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:916
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 11 /tr "'C:\Windows\RemotePackages\audiodg.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1500
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\System.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2888
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2816
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\System.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2780
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 12 /tr "'C:\Windows\Offline Web Pages\spoolsv.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2940
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\Offline Web Pages\spoolsv.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1784
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\Windows\Offline Web Pages\spoolsv.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2928
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066Ne" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:600
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N" /sc ONLOGON /tr "'C:\Users\All Users\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2336
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066Ne" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1532
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066Ne" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\AppData\Local\Temp\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1464
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2344
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066Ne" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\AppData\Local\Temp\e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066N.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:532

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\NsSkgSAIjN.bat

        Filesize

        231B

        MD5

        2a83eb3c4d971fa9aa46734ea7fea27e

        SHA1

        5513e6929e845f783951db8b58a438559283ae22

        SHA256

        2baea4437908f500387b6a50fb601740495f4ec3b4301978d86eb2c4ea05e21a

        SHA512

        f0f79a13ee3f8564b900eb7576886f05907642ec3c0923adea53f0c17c31cfd06fc2f1d9cf2ea36b27613351b382a73e38f101878ad13594552c5860dc596aaa

      • C:\Users\Admin\AppData\Local\Temp\RES2AA9.tmp

        Filesize

        1KB

        MD5

        f386a762a332c6785583783083a3f637

        SHA1

        c24f52bb296129b9f7934b33a427a42561250cf2

        SHA256

        6ff98a1879070a8eb945fce6da63398fbc08308824960c920596af6be8b6a782

        SHA512

        677f5c17d532aa50f27510bb4adbf01ca98da93781d5e5b8092b44c56ef3d7a6fb5e55e7168c2a36a24ed16dcc7bdb94c5a694aedc08b6c4744d91b7ff568a39

      • C:\Users\Public\Documents\explorer.exe

        Filesize

        1.8MB

        MD5

        306c2d16a6c39850c1a960ecd5fd2e60

        SHA1

        9ad230d95a9ae4c42cc800e710fd0d6dc0abc208

        SHA256

        e4a6245e60801b7f7feecad929014dd3c0d389672a73545947b99cf86b366066

        SHA512

        458c70d255edae4928bb0c7773a63e647375cbcfb3e8cd058013aa59d0ca2b5db16a9a064aab30f948b24e6426a49dd20e0c6add6d6492382a41d35ff6a5bc58

      • \??\c:\Users\Admin\AppData\Local\Temp\fj54hoyo\fj54hoyo.0.cs

        Filesize

        373B

        MD5

        29a90b74742e0846ae62fa1295b96739

        SHA1

        6b378419b51e42fcef7426e9e03d14c953c1bf74

        SHA256

        bb7e538c1adb21b6768f738da28a364355250dfd220f706feccd8f739bec41c6

        SHA512

        719db194683f7e566b1b74d182665508e9fbd1d962c42f1e7fe5d8e47268b9b9cccb5c3c28a4fc728b3ddb6976c48d1041de2b1d2ce6ee67ad448fb9dbf326ee

      • \??\c:\Users\Admin\AppData\Local\Temp\fj54hoyo\fj54hoyo.cmdline

        Filesize

        235B

        MD5

        80f123d5f6c4037afb4c1b7507a8d228

        SHA1

        2c7bb0cda4737adf4697017931f05cabd536d1e9

        SHA256

        105f6c57c3951e34345292ca70add36dcdc76120b7d1bae1d8260389ca0498b3

        SHA512

        42ffec3aeadab3b912f1ff6dcf0f305ab45548b23265fe4b0545f0cc0add77676fe8ed52a97fe2d7bf58ccec262e97ac06bf0334d06685729d619f1cf4d96835

      • \??\c:\Windows\System32\CSCB74EE3F736364759A3B8EEE04376DE5.TMP

        Filesize

        1KB

        MD5

        028d4cd290ab6fe13d6fecce144a32cc

        SHA1

        e1d9531cb2e6bc9cab285b1f19e5d627257a3394

        SHA256

        3f42f68eb3df49cf836fbb0019b8206af735e22f3d528e7b122fa9b2541fdde3

        SHA512

        2f99d37a56444831298f8efaef425e5dadec938ac459bfc0cdaf3708ef8662f12bd8d687a58fc1dd6bbdac6c806214b65a21489a24d3160c1e8575968e3caa6e

      • memory/1864-52-0x0000000000070000-0x000000000024E000-memory.dmp

        Filesize

        1.9MB

      • memory/2212-4-0x000007FEF6000000-0x000007FEF69EC000-memory.dmp

        Filesize

        9.9MB

      • memory/2212-3-0x000007FEF6000000-0x000007FEF69EC000-memory.dmp

        Filesize

        9.9MB

      • memory/2212-13-0x0000000000310000-0x0000000000318000-memory.dmp

        Filesize

        32KB

      • memory/2212-7-0x000007FEF6000000-0x000007FEF69EC000-memory.dmp

        Filesize

        9.9MB

      • memory/2212-16-0x000007FEF6000000-0x000007FEF69EC000-memory.dmp

        Filesize

        9.9MB

      • memory/2212-6-0x0000000000300000-0x000000000030E000-memory.dmp

        Filesize

        56KB

      • memory/2212-28-0x000007FEF6000000-0x000007FEF69EC000-memory.dmp

        Filesize

        9.9MB

      • memory/2212-29-0x000007FEF6000000-0x000007FEF69EC000-memory.dmp

        Filesize

        9.9MB

      • memory/2212-11-0x0000000000560000-0x0000000000578000-memory.dmp

        Filesize

        96KB

      • memory/2212-30-0x000007FEF6000000-0x000007FEF69EC000-memory.dmp

        Filesize

        9.9MB

      • memory/2212-15-0x0000000000320000-0x000000000032C000-memory.dmp

        Filesize

        48KB

      • memory/2212-0-0x000007FEF6003000-0x000007FEF6004000-memory.dmp

        Filesize

        4KB

      • memory/2212-2-0x000007FEF6000000-0x000007FEF69EC000-memory.dmp

        Filesize

        9.9MB

      • memory/2212-43-0x000007FEF6003000-0x000007FEF6004000-memory.dmp

        Filesize

        4KB

      • memory/2212-44-0x000007FEF6000000-0x000007FEF69EC000-memory.dmp

        Filesize

        9.9MB

      • memory/2212-45-0x000007FEF6000000-0x000007FEF69EC000-memory.dmp

        Filesize

        9.9MB

      • memory/2212-50-0x000007FEF6000000-0x000007FEF69EC000-memory.dmp

        Filesize

        9.9MB

      • memory/2212-1-0x00000000008F0000-0x0000000000ACE000-memory.dmp

        Filesize

        1.9MB

      • memory/2212-9-0x0000000000540000-0x000000000055C000-memory.dmp

        Filesize

        112KB