Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 15:21
Static task
static1
Behavioral task
behavioral1
Sample
fe102286866ca9377249551ec2794b4564fb00f5cf21b4c9992040b3b13b2c77N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe102286866ca9377249551ec2794b4564fb00f5cf21b4c9992040b3b13b2c77N.exe
Resource
win10v2004-20240802-en
General
-
Target
fe102286866ca9377249551ec2794b4564fb00f5cf21b4c9992040b3b13b2c77N.exe
-
Size
6.7MB
-
MD5
608fe9a6d6ef81a885f55a989f45b710
-
SHA1
e9e60dd64b66f324ce953554179f3d3c5544f0ca
-
SHA256
fe102286866ca9377249551ec2794b4564fb00f5cf21b4c9992040b3b13b2c77
-
SHA512
670067a4211326eaa995d3f3817ec4dbf0075b042882d46de1aa9ec98794fa1acf722c2cf81111df1fb41afca292c70a6324be389f17f304bfe85a94a3177393
-
SSDEEP
196608:HC7vgxkdo2BI5dUCz8PtxCvFSRPwdUCFqP6tc:H+vbdo+I4KsSCYtkiC
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 3616 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation fe102286866ca9377249551ec2794b4564fb00f5cf21b4c9992040b3b13b2c77N.exe -
Indirect Command Execution 1 TTPs 5 IoCs
Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.
pid Process 4740 forfiles.exe 988 forfiles.exe 724 forfiles.exe 732 forfiles.exe 4480 forfiles.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2364 2856 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gpupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe102286866ca9377249551ec2794b4564fb00f5cf21b4c9992040b3b13b2c77N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3616 powershell.exe 3616 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3616 powershell.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 2856 wrote to memory of 1728 2856 fe102286866ca9377249551ec2794b4564fb00f5cf21b4c9992040b3b13b2c77N.exe 82 PID 2856 wrote to memory of 1728 2856 fe102286866ca9377249551ec2794b4564fb00f5cf21b4c9992040b3b13b2c77N.exe 82 PID 2856 wrote to memory of 1728 2856 fe102286866ca9377249551ec2794b4564fb00f5cf21b4c9992040b3b13b2c77N.exe 82 PID 1728 wrote to memory of 4740 1728 cmd.exe 84 PID 1728 wrote to memory of 4740 1728 cmd.exe 84 PID 1728 wrote to memory of 4740 1728 cmd.exe 84 PID 4740 wrote to memory of 2012 4740 forfiles.exe 85 PID 4740 wrote to memory of 2012 4740 forfiles.exe 85 PID 4740 wrote to memory of 2012 4740 forfiles.exe 85 PID 2012 wrote to memory of 3612 2012 cmd.exe 86 PID 2012 wrote to memory of 3612 2012 cmd.exe 86 PID 2012 wrote to memory of 3612 2012 cmd.exe 86 PID 1728 wrote to memory of 988 1728 cmd.exe 87 PID 1728 wrote to memory of 988 1728 cmd.exe 87 PID 1728 wrote to memory of 988 1728 cmd.exe 87 PID 988 wrote to memory of 2544 988 forfiles.exe 88 PID 988 wrote to memory of 2544 988 forfiles.exe 88 PID 988 wrote to memory of 2544 988 forfiles.exe 88 PID 2544 wrote to memory of 2708 2544 cmd.exe 89 PID 2544 wrote to memory of 2708 2544 cmd.exe 89 PID 2544 wrote to memory of 2708 2544 cmd.exe 89 PID 1728 wrote to memory of 724 1728 cmd.exe 90 PID 1728 wrote to memory of 724 1728 cmd.exe 90 PID 1728 wrote to memory of 724 1728 cmd.exe 90 PID 724 wrote to memory of 1152 724 forfiles.exe 91 PID 724 wrote to memory of 1152 724 forfiles.exe 91 PID 724 wrote to memory of 1152 724 forfiles.exe 91 PID 1152 wrote to memory of 3284 1152 cmd.exe 92 PID 1152 wrote to memory of 3284 1152 cmd.exe 92 PID 1152 wrote to memory of 3284 1152 cmd.exe 92 PID 1728 wrote to memory of 732 1728 cmd.exe 93 PID 1728 wrote to memory of 732 1728 cmd.exe 93 PID 1728 wrote to memory of 732 1728 cmd.exe 93 PID 732 wrote to memory of 4672 732 forfiles.exe 94 PID 732 wrote to memory of 4672 732 forfiles.exe 94 PID 732 wrote to memory of 4672 732 forfiles.exe 94 PID 4672 wrote to memory of 4092 4672 cmd.exe 95 PID 4672 wrote to memory of 4092 4672 cmd.exe 95 PID 4672 wrote to memory of 4092 4672 cmd.exe 95 PID 1728 wrote to memory of 4480 1728 cmd.exe 96 PID 1728 wrote to memory of 4480 1728 cmd.exe 96 PID 1728 wrote to memory of 4480 1728 cmd.exe 96 PID 4480 wrote to memory of 1148 4480 forfiles.exe 97 PID 4480 wrote to memory of 1148 4480 forfiles.exe 97 PID 4480 wrote to memory of 1148 4480 forfiles.exe 97 PID 1148 wrote to memory of 3616 1148 cmd.exe 98 PID 1148 wrote to memory of 3616 1148 cmd.exe 98 PID 1148 wrote to memory of 3616 1148 cmd.exe 98 PID 3616 wrote to memory of 232 3616 powershell.exe 99 PID 3616 wrote to memory of 232 3616 powershell.exe 99 PID 3616 wrote to memory of 232 3616 powershell.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe102286866ca9377249551ec2794b4564fb00f5cf21b4c9992040b3b13b2c77N.exe"C:\Users\Admin\AppData\Local\Temp\fe102286866ca9377249551ec2794b4564fb00f5cf21b4c9992040b3b13b2c77N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 64⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2012 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 65⤵
- System Location Discovery: System Language Discovery
PID:3612
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 64⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 65⤵
- System Location Discovery: System Language Discovery
PID:2708
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 64⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1152 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 65⤵
- System Location Discovery: System Language Discovery
PID:3284
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 64⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4672 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 65⤵
- System Location Discovery: System Language Discovery
PID:4092
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force6⤵
- System Location Discovery: System Language Discovery
PID:232
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 6802⤵
- Program crash
PID:2364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2856 -ip 28561⤵PID:764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82