Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/01/2025, 06:08
Behavioral task
behavioral1
Sample
6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe
Resource
win7-20240903-en
General
-
Target
6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe
-
Size
257KB
-
MD5
c30f9465054f33e6dea1a2ba5cb206e7
-
SHA1
6c2609663a7aa38f738b0104785ab1ba469af013
-
SHA256
6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53
-
SHA512
181eee666cc26508697e50843ccf55e3c46dad0598b1f493d44f1c6dde8ca84df1d77eaecea0f289386a570d49e9aa2c6daa4b3f617659b092912a22adb6dc0d
-
SSDEEP
6144:floZM+rIkd8g+EtXHkv/iD4u76SecjfUx1gevPehab8e1mZRXLijK7so:doZtL+EP8u76SecjfUx1gevPeIqRWjKL
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral1/memory/2532-1-0x0000000000120000-0x0000000000166000-memory.dmp family_umbral -
Umbral family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2824 powershell.exe 2884 powershell.exe 2600 powershell.exe 640 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe -
Deletes itself 1 IoCs
pid Process 2288 cmd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 discord.com 10 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2288 cmd.exe 2372 PING.EXE -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 2936 wmic.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2372 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 2824 powershell.exe 2884 powershell.exe 2600 powershell.exe 1288 powershell.exe 640 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe Token: SeIncreaseQuotaPrivilege 2324 wmic.exe Token: SeSecurityPrivilege 2324 wmic.exe Token: SeTakeOwnershipPrivilege 2324 wmic.exe Token: SeLoadDriverPrivilege 2324 wmic.exe Token: SeSystemProfilePrivilege 2324 wmic.exe Token: SeSystemtimePrivilege 2324 wmic.exe Token: SeProfSingleProcessPrivilege 2324 wmic.exe Token: SeIncBasePriorityPrivilege 2324 wmic.exe Token: SeCreatePagefilePrivilege 2324 wmic.exe Token: SeBackupPrivilege 2324 wmic.exe Token: SeRestorePrivilege 2324 wmic.exe Token: SeShutdownPrivilege 2324 wmic.exe Token: SeDebugPrivilege 2324 wmic.exe Token: SeSystemEnvironmentPrivilege 2324 wmic.exe Token: SeRemoteShutdownPrivilege 2324 wmic.exe Token: SeUndockPrivilege 2324 wmic.exe Token: SeManageVolumePrivilege 2324 wmic.exe Token: 33 2324 wmic.exe Token: 34 2324 wmic.exe Token: 35 2324 wmic.exe Token: SeIncreaseQuotaPrivilege 2324 wmic.exe Token: SeSecurityPrivilege 2324 wmic.exe Token: SeTakeOwnershipPrivilege 2324 wmic.exe Token: SeLoadDriverPrivilege 2324 wmic.exe Token: SeSystemProfilePrivilege 2324 wmic.exe Token: SeSystemtimePrivilege 2324 wmic.exe Token: SeProfSingleProcessPrivilege 2324 wmic.exe Token: SeIncBasePriorityPrivilege 2324 wmic.exe Token: SeCreatePagefilePrivilege 2324 wmic.exe Token: SeBackupPrivilege 2324 wmic.exe Token: SeRestorePrivilege 2324 wmic.exe Token: SeShutdownPrivilege 2324 wmic.exe Token: SeDebugPrivilege 2324 wmic.exe Token: SeSystemEnvironmentPrivilege 2324 wmic.exe Token: SeRemoteShutdownPrivilege 2324 wmic.exe Token: SeUndockPrivilege 2324 wmic.exe Token: SeManageVolumePrivilege 2324 wmic.exe Token: 33 2324 wmic.exe Token: 34 2324 wmic.exe Token: 35 2324 wmic.exe Token: SeDebugPrivilege 2824 powershell.exe Token: SeDebugPrivilege 2884 powershell.exe Token: SeDebugPrivilege 2600 powershell.exe Token: SeDebugPrivilege 1288 powershell.exe Token: SeIncreaseQuotaPrivilege 1684 wmic.exe Token: SeSecurityPrivilege 1684 wmic.exe Token: SeTakeOwnershipPrivilege 1684 wmic.exe Token: SeLoadDriverPrivilege 1684 wmic.exe Token: SeSystemProfilePrivilege 1684 wmic.exe Token: SeSystemtimePrivilege 1684 wmic.exe Token: SeProfSingleProcessPrivilege 1684 wmic.exe Token: SeIncBasePriorityPrivilege 1684 wmic.exe Token: SeCreatePagefilePrivilege 1684 wmic.exe Token: SeBackupPrivilege 1684 wmic.exe Token: SeRestorePrivilege 1684 wmic.exe Token: SeShutdownPrivilege 1684 wmic.exe Token: SeDebugPrivilege 1684 wmic.exe Token: SeSystemEnvironmentPrivilege 1684 wmic.exe Token: SeRemoteShutdownPrivilege 1684 wmic.exe Token: SeUndockPrivilege 1684 wmic.exe Token: SeManageVolumePrivilege 1684 wmic.exe Token: 33 1684 wmic.exe Token: 34 1684 wmic.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2324 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 30 PID 2532 wrote to memory of 2324 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 30 PID 2532 wrote to memory of 2324 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 30 PID 2532 wrote to memory of 2756 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 33 PID 2532 wrote to memory of 2756 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 33 PID 2532 wrote to memory of 2756 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 33 PID 2532 wrote to memory of 2824 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 35 PID 2532 wrote to memory of 2824 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 35 PID 2532 wrote to memory of 2824 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 35 PID 2532 wrote to memory of 2884 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 37 PID 2532 wrote to memory of 2884 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 37 PID 2532 wrote to memory of 2884 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 37 PID 2532 wrote to memory of 2600 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 39 PID 2532 wrote to memory of 2600 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 39 PID 2532 wrote to memory of 2600 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 39 PID 2532 wrote to memory of 1288 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 41 PID 2532 wrote to memory of 1288 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 41 PID 2532 wrote to memory of 1288 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 41 PID 2532 wrote to memory of 1684 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 43 PID 2532 wrote to memory of 1684 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 43 PID 2532 wrote to memory of 1684 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 43 PID 2532 wrote to memory of 1756 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 45 PID 2532 wrote to memory of 1756 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 45 PID 2532 wrote to memory of 1756 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 45 PID 2532 wrote to memory of 1936 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 47 PID 2532 wrote to memory of 1936 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 47 PID 2532 wrote to memory of 1936 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 47 PID 2532 wrote to memory of 640 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 49 PID 2532 wrote to memory of 640 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 49 PID 2532 wrote to memory of 640 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 49 PID 2532 wrote to memory of 2936 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 51 PID 2532 wrote to memory of 2936 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 51 PID 2532 wrote to memory of 2936 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 51 PID 2532 wrote to memory of 2288 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 53 PID 2532 wrote to memory of 2288 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 53 PID 2532 wrote to memory of 2288 2532 6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe 53 PID 2288 wrote to memory of 2372 2288 cmd.exe 55 PID 2288 wrote to memory of 2372 2288 cmd.exe 55 PID 2288 wrote to memory of 2372 2288 cmd.exe 55 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2756 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe"C:\Users\Admin\AppData\Local\Temp\6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe"1⤵
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
C:\Windows\system32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe"2⤵
- Views/modifies file attributes
PID:2756
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 22⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1288
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory2⤵PID:1756
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵PID:1936
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:640
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name2⤵
- Detects videocard installed
PID:2936
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\6a856e121efd06bea72dbf93e24570e3c08e9859795e8234492254559f9aff53.exe" && pause2⤵
- Deletes itself
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\system32\PING.EXEping localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2372
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD545b76c15282bdb0032340b2d036a809b
SHA126a14d724fc58b744b1adbc9fade44aff0458bf0
SHA256f1723882957cbe42b9efbbfdfb7bb3fa6ce546049261a0e436fca88dda11ef36
SHA5122713c513bfb4884d564f702d424d523019c7957508a6051b3e652adc6e229f73c456cec75581c742c37f6eaa258ff9cad032e3a6f5c63f94646db965007392c8