Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/11/2024, 08:39
Static task
static1
Behavioral task
behavioral1
Sample
55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe
Resource
win7-20240903-en
General
-
Target
55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe
-
Size
6.5MB
-
MD5
68dd83d9287f59924c7fa3beb7ed02d0
-
SHA1
e20cd6b358f8ae07ca51568db3a18a7a527fcccb
-
SHA256
55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903
-
SHA512
c962de504308ed0de7cc4f5964abe7618e96d4ccd87402bc2e86b5903a47562af1e5952e8eac4dc8e0b0ed4a5dd26082ac724e5928e860acbdd1d01ccf9e2f3f
-
SSDEEP
196608:zR668aaELtR668aaELPR668aaELZR668aaEL:zp8aawp8aayp8aa8p8aa
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1364 powershell.exe 2500 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2760 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 2500 powershell.exe 1364 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe Token: SeDebugPrivilege 2500 powershell.exe Token: SeDebugPrivilege 1364 powershell.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2080 wrote to memory of 1364 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 31 PID 2080 wrote to memory of 1364 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 31 PID 2080 wrote to memory of 1364 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 31 PID 2080 wrote to memory of 1364 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 31 PID 2080 wrote to memory of 2500 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 33 PID 2080 wrote to memory of 2500 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 33 PID 2080 wrote to memory of 2500 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 33 PID 2080 wrote to memory of 2500 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 33 PID 2080 wrote to memory of 2760 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 34 PID 2080 wrote to memory of 2760 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 34 PID 2080 wrote to memory of 2760 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 34 PID 2080 wrote to memory of 2760 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 34 PID 2080 wrote to memory of 2252 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 37 PID 2080 wrote to memory of 2252 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 37 PID 2080 wrote to memory of 2252 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 37 PID 2080 wrote to memory of 2252 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 37 PID 2080 wrote to memory of 2636 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 38 PID 2080 wrote to memory of 2636 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 38 PID 2080 wrote to memory of 2636 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 38 PID 2080 wrote to memory of 2636 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 38 PID 2080 wrote to memory of 2840 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 39 PID 2080 wrote to memory of 2840 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 39 PID 2080 wrote to memory of 2840 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 39 PID 2080 wrote to memory of 2840 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 39 PID 2080 wrote to memory of 2632 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 40 PID 2080 wrote to memory of 2632 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 40 PID 2080 wrote to memory of 2632 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 40 PID 2080 wrote to memory of 2632 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 40 PID 2080 wrote to memory of 1536 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 41 PID 2080 wrote to memory of 1536 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 41 PID 2080 wrote to memory of 1536 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 41 PID 2080 wrote to memory of 1536 2080 55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe"C:\Users\Admin\AppData\Local\Temp\55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1364
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\BLznCuyzwk.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BLznCuyzwk" /XML "C:\Users\Admin\AppData\Local\Temp\tmp17E4.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2760
-
-
C:\Users\Admin\AppData\Local\Temp\55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe"C:\Users\Admin\AppData\Local\Temp\55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe"2⤵PID:2252
-
-
C:\Users\Admin\AppData\Local\Temp\55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe"C:\Users\Admin\AppData\Local\Temp\55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe"2⤵PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe"C:\Users\Admin\AppData\Local\Temp\55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe"2⤵PID:2840
-
-
C:\Users\Admin\AppData\Local\Temp\55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe"C:\Users\Admin\AppData\Local\Temp\55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe"2⤵PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe"C:\Users\Admin\AppData\Local\Temp\55e6b37884aefead44fa7aef72a71797e3eb0f1070815bbf3c6a46e5e8fd2903N.exe"2⤵PID:1536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57daa0e3c6f21a9f3adbbe29b2692c23f
SHA152b57abdd1d42e34ebf28fa2f2320e4789770e16
SHA25606d73eb702e143cda4be2bd2a2d84482d3982dcf9f143fb6373cca16b8ab35d2
SHA5125d81a3a9bfbfe5a2761b2bfe334e3b5545cd347654e00f8ec8b9a3e5d1f2b127daaa71bf02785274165f3653c7f9a03dc1f2616b02290195fd1642b16f7ee475
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD560dd799bdf5d26bc79ab279474e47271
SHA148b380f7f9e113b26f8b2d3ff9f4b56ba1403c0d
SHA256c20f1e27ecb95556d89fa3873045d538ca4918af61ebd376865ea80bbf53cd69
SHA512cdefd5cba26e02f92f55f0bb882c0ee7c6606badfb089715cfe81f34ba95cb0f0164612200885d1df09e94c3b29af5100b4515a2d82e4e4ae549853c19f8405a