Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23/01/2025, 19:29
Behavioral task
behavioral1
Sample
06a66efa39b3258602d8d6f6742452f2efb8befce6320b58e6ea5e8b9e30d86f.exe
Resource
win7-20240729-en
General
-
Target
06a66efa39b3258602d8d6f6742452f2efb8befce6320b58e6ea5e8b9e30d86f.exe
-
Size
803KB
-
MD5
4d70c4f7594371493e4372f4c5cc2c49
-
SHA1
019f726fc46d6ce1a73cd87a46e2d565bf8271eb
-
SHA256
06a66efa39b3258602d8d6f6742452f2efb8befce6320b58e6ea5e8b9e30d86f
-
SHA512
685661f913b2d348929de9981575d343bee7a0c9beb152df09f24fb44d8260b787815fa13039a08059daf2073f898f6f51459141589689dab45fe52851ab1934
-
SSDEEP
24576:bkGvM/P1U4bBTOKr26GU5OYsnXgxvrQrAnuIwE:b2/P1UOtOKC6GrYsgxTQTID
Malware Config
Signatures
-
Imminent family
-
Executes dropped EXE 3 IoCs
pid Process 2164 refsutil.exe 2428 refsutil.exe 2160 refsutil.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1956-13-0x0000000001140000-0x00000000012C8000-memory.dmp autoit_exe behavioral1/memory/2164-34-0x0000000000310000-0x0000000000498000-memory.dmp autoit_exe behavioral1/memory/2428-50-0x00000000002F0000-0x0000000000478000-memory.dmp autoit_exe behavioral1/memory/2160-65-0x0000000000810000-0x0000000000998000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1956 set thread context of 2704 1956 06a66efa39b3258602d8d6f6742452f2efb8befce6320b58e6ea5e8b9e30d86f.exe 29 PID 2164 set thread context of 2876 2164 refsutil.exe 38 PID 2428 set thread context of 1212 2428 refsutil.exe 42 PID 2160 set thread context of 2336 2160 refsutil.exe 48 -
resource yara_rule behavioral1/memory/1956-0-0x0000000001140000-0x00000000012C8000-memory.dmp upx behavioral1/memory/1956-13-0x0000000001140000-0x00000000012C8000-memory.dmp upx behavioral1/files/0x000700000001933b-20.dat upx behavioral1/memory/2164-22-0x0000000000310000-0x0000000000498000-memory.dmp upx behavioral1/memory/2164-34-0x0000000000310000-0x0000000000498000-memory.dmp upx behavioral1/memory/2428-38-0x00000000002F0000-0x0000000000478000-memory.dmp upx behavioral1/memory/2428-50-0x00000000002F0000-0x0000000000478000-memory.dmp upx behavioral1/memory/2160-54-0x0000000000810000-0x0000000000998000-memory.dmp upx behavioral1/memory/2160-65-0x0000000000810000-0x0000000000998000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language refsutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language refsutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06a66efa39b3258602d8d6f6742452f2efb8befce6320b58e6ea5e8b9e30d86f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language refsutil.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1944 schtasks.exe 772 schtasks.exe 476 schtasks.exe 2244 schtasks.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2704 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2704 RegAsm.exe Token: 33 2704 RegAsm.exe Token: SeIncBasePriorityPrivilege 2704 RegAsm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2704 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2704 1956 06a66efa39b3258602d8d6f6742452f2efb8befce6320b58e6ea5e8b9e30d86f.exe 29 PID 1956 wrote to memory of 2704 1956 06a66efa39b3258602d8d6f6742452f2efb8befce6320b58e6ea5e8b9e30d86f.exe 29 PID 1956 wrote to memory of 2704 1956 06a66efa39b3258602d8d6f6742452f2efb8befce6320b58e6ea5e8b9e30d86f.exe 29 PID 1956 wrote to memory of 2704 1956 06a66efa39b3258602d8d6f6742452f2efb8befce6320b58e6ea5e8b9e30d86f.exe 29 PID 1956 wrote to memory of 2704 1956 06a66efa39b3258602d8d6f6742452f2efb8befce6320b58e6ea5e8b9e30d86f.exe 29 PID 1956 wrote to memory of 2704 1956 06a66efa39b3258602d8d6f6742452f2efb8befce6320b58e6ea5e8b9e30d86f.exe 29 PID 1956 wrote to memory of 2704 1956 06a66efa39b3258602d8d6f6742452f2efb8befce6320b58e6ea5e8b9e30d86f.exe 29 PID 1956 wrote to memory of 2704 1956 06a66efa39b3258602d8d6f6742452f2efb8befce6320b58e6ea5e8b9e30d86f.exe 29 PID 1956 wrote to memory of 2704 1956 06a66efa39b3258602d8d6f6742452f2efb8befce6320b58e6ea5e8b9e30d86f.exe 29 PID 1956 wrote to memory of 2244 1956 06a66efa39b3258602d8d6f6742452f2efb8befce6320b58e6ea5e8b9e30d86f.exe 30 PID 1956 wrote to memory of 2244 1956 06a66efa39b3258602d8d6f6742452f2efb8befce6320b58e6ea5e8b9e30d86f.exe 30 PID 1956 wrote to memory of 2244 1956 06a66efa39b3258602d8d6f6742452f2efb8befce6320b58e6ea5e8b9e30d86f.exe 30 PID 1956 wrote to memory of 2244 1956 06a66efa39b3258602d8d6f6742452f2efb8befce6320b58e6ea5e8b9e30d86f.exe 30 PID 2376 wrote to memory of 2164 2376 taskeng.exe 37 PID 2376 wrote to memory of 2164 2376 taskeng.exe 37 PID 2376 wrote to memory of 2164 2376 taskeng.exe 37 PID 2376 wrote to memory of 2164 2376 taskeng.exe 37 PID 2164 wrote to memory of 2876 2164 refsutil.exe 38 PID 2164 wrote to memory of 2876 2164 refsutil.exe 38 PID 2164 wrote to memory of 2876 2164 refsutil.exe 38 PID 2164 wrote to memory of 2876 2164 refsutil.exe 38 PID 2164 wrote to memory of 2876 2164 refsutil.exe 38 PID 2164 wrote to memory of 2876 2164 refsutil.exe 38 PID 2164 wrote to memory of 2876 2164 refsutil.exe 38 PID 2164 wrote to memory of 2876 2164 refsutil.exe 38 PID 2164 wrote to memory of 2876 2164 refsutil.exe 38 PID 2164 wrote to memory of 1944 2164 refsutil.exe 39 PID 2164 wrote to memory of 1944 2164 refsutil.exe 39 PID 2164 wrote to memory of 1944 2164 refsutil.exe 39 PID 2164 wrote to memory of 1944 2164 refsutil.exe 39 PID 2376 wrote to memory of 2428 2376 taskeng.exe 41 PID 2376 wrote to memory of 2428 2376 taskeng.exe 41 PID 2376 wrote to memory of 2428 2376 taskeng.exe 41 PID 2376 wrote to memory of 2428 2376 taskeng.exe 41 PID 2428 wrote to memory of 1212 2428 refsutil.exe 42 PID 2428 wrote to memory of 1212 2428 refsutil.exe 42 PID 2428 wrote to memory of 1212 2428 refsutil.exe 42 PID 2428 wrote to memory of 1212 2428 refsutil.exe 42 PID 2428 wrote to memory of 1212 2428 refsutil.exe 42 PID 2428 wrote to memory of 1212 2428 refsutil.exe 42 PID 2428 wrote to memory of 1212 2428 refsutil.exe 42 PID 2428 wrote to memory of 1212 2428 refsutil.exe 42 PID 2428 wrote to memory of 1212 2428 refsutil.exe 42 PID 2428 wrote to memory of 772 2428 refsutil.exe 43 PID 2428 wrote to memory of 772 2428 refsutil.exe 43 PID 2428 wrote to memory of 772 2428 refsutil.exe 43 PID 2428 wrote to memory of 772 2428 refsutil.exe 43 PID 2376 wrote to memory of 2160 2376 taskeng.exe 47 PID 2376 wrote to memory of 2160 2376 taskeng.exe 47 PID 2376 wrote to memory of 2160 2376 taskeng.exe 47 PID 2376 wrote to memory of 2160 2376 taskeng.exe 47 PID 2160 wrote to memory of 2336 2160 refsutil.exe 48 PID 2160 wrote to memory of 2336 2160 refsutil.exe 48 PID 2160 wrote to memory of 2336 2160 refsutil.exe 48 PID 2160 wrote to memory of 2336 2160 refsutil.exe 48 PID 2160 wrote to memory of 2336 2160 refsutil.exe 48 PID 2160 wrote to memory of 2336 2160 refsutil.exe 48 PID 2160 wrote to memory of 2336 2160 refsutil.exe 48 PID 2160 wrote to memory of 2336 2160 refsutil.exe 48 PID 2160 wrote to memory of 2336 2160 refsutil.exe 48 PID 2160 wrote to memory of 476 2160 refsutil.exe 49 PID 2160 wrote to memory of 476 2160 refsutil.exe 49 PID 2160 wrote to memory of 476 2160 refsutil.exe 49 PID 2160 wrote to memory of 476 2160 refsutil.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\06a66efa39b3258602d8d6f6742452f2efb8befce6320b58e6ea5e8b9e30d86f.exe"C:\Users\Admin\AppData\Local\Temp\06a66efa39b3258602d8d6f6742452f2efb8befce6320b58e6ea5e8b9e30d86f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2704
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn NgcIso /tr "C:\Users\Admin\advpack\refsutil.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2244
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2080
-
C:\Windows\system32\taskeng.exetaskeng.exe {4E5A68ED-09CF-4FFF-BA05-84A547967D98} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\advpack\refsutil.exeC:\Users\Admin\advpack\refsutil.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2876
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn NgcIso /tr "C:\Users\Admin\advpack\refsutil.exe" /sc minute /mo 1 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1944
-
-
-
C:\Users\Admin\advpack\refsutil.exeC:\Users\Admin\advpack\refsutil.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1212
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn NgcIso /tr "C:\Users\Admin\advpack\refsutil.exe" /sc minute /mo 1 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:772
-
-
-
C:\Users\Admin\advpack\refsutil.exeC:\Users\Admin\advpack\refsutil.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2336
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn NgcIso /tr "C:\Users\Admin\advpack\refsutil.exe" /sc minute /mo 1 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:476
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
803KB
MD5d9fa547570dda4beb3a7aae54d2eea06
SHA1099164d4ce81b31fe371c43334ddc242bb4fea20
SHA25634291f762c3189a662d5c4124f68e7b0487d120529000ee14aec1f565d93699d
SHA51293a7d954495efc2081c093d30c89afab242c67ecc8ce2f822102ef7013f0158a076032f48d23882bf63e4502b40937b0f331a0634143efa38caa2cf06af2441d