Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:10

General

  • Target

    4175909fcd35882461a1cfd784f7c967.exe

  • Size

    17.7MB

  • MD5

    4175909fcd35882461a1cfd784f7c967

  • SHA1

    97c039024a434f8605ca06df16ee7355fd380e0d

  • SHA256

    34a347012a452bb37b3da0cead9eaf007ec0e82a26b90ee1155ca8135bccd537

  • SHA512

    ccf29163313a378c4d908e1ac400afc6299e5a2046b206f0eed46ccd0779f9bcb2a0162bb86db64504c71cfeb76df056dca621a4e1f267e28258ce5c10721c57

  • SSDEEP

    393216:8YGbY6iHonlQCe88BYdY3SHFPJXFODKSblmnTCAc:87Y2CCe4dAmFOmSJme5

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4175909fcd35882461a1cfd784f7c967.exe
    "C:\Users\Admin\AppData\Local\Temp\4175909fcd35882461a1cfd784f7c967.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1372
    • C:\Windows\system32\schtasks.exe
      "schtasks.exe" /create /tn KMSAuto-AActtive-API /tr "C:\ProgramData\KMSAuto\AActtive.exe" /st 06:21 /du 23:59 /sc daily /ri 1 /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2956
    • C:\ProgramData\KMSAuto\AActtive.exe
      "C:\ProgramData\KMSAuto\AActtive.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2944
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp2CAC.tmp.bat""
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1196
      • C:\Windows\system32\timeout.exe
        timeout 6
        3⤵
        • Delays execution with timeout.exe
        PID:864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\KMSAuto\AActtive.exe

    Filesize

    18.4MB

    MD5

    4c0e8fb9c3865c1a7d3016ab390d0a89

    SHA1

    32931213df0c5398a24e08e726c47177eb261131

    SHA256

    06e77a59ceaee2ab4cdd113cd6437fc97188939fe7eaafc336b4c674801de804

    SHA512

    f3fb4adaa533ee65bce59ac873b973c0c04e8c9eec34ce0aa986b60fdea698781d9f62ddd495a19a74f3d2ecaa63f118627cf446a35428bfe79d8890a33f07b8

  • C:\Users\Admin\AppData\Local\Temp\tmp2CAC.tmp.bat

    Filesize

    184B

    MD5

    f73718f5f33033095695d42b80ad870f

    SHA1

    2289541327d077f9af87f489395ffa7286ab86e3

    SHA256

    e1a89be99d749ba5f50911fc989c326c7058ab263b3633349e0356118001eff5

    SHA512

    2c8d978109665f6f64c0272f6ba4e66d7231ad9d2262ef0dab3bee31568dfd8d140f50b775d766f1f8c1459af0490bffcd375006e9ad602ee09e25ce29430fc9

  • memory/1372-3-0x000007FEF5FD0000-0x000007FEF69BC000-memory.dmp

    Filesize

    9.9MB

  • memory/1372-0-0x000007FEF5FD3000-0x000007FEF5FD4000-memory.dmp

    Filesize

    4KB

  • memory/1372-4-0x000007FEF5FD3000-0x000007FEF5FD4000-memory.dmp

    Filesize

    4KB

  • memory/1372-5-0x000007FEF5FD0000-0x000007FEF69BC000-memory.dmp

    Filesize

    9.9MB

  • memory/1372-2-0x0000000000240000-0x000000000024E000-memory.dmp

    Filesize

    56KB

  • memory/1372-1-0x0000000000AB0000-0x0000000000AF2000-memory.dmp

    Filesize

    264KB

  • memory/1372-23-0x000007FEF5FD0000-0x000007FEF69BC000-memory.dmp

    Filesize

    9.9MB

  • memory/2944-14-0x000007FEF5FD0000-0x000007FEF69BC000-memory.dmp

    Filesize

    9.9MB

  • memory/2944-13-0x00000000003B0000-0x00000000003F2000-memory.dmp

    Filesize

    264KB

  • memory/2944-22-0x000007FEF5FD0000-0x000007FEF69BC000-memory.dmp

    Filesize

    9.9MB

  • memory/2944-25-0x000007FEF5FD0000-0x000007FEF69BC000-memory.dmp

    Filesize

    9.9MB

  • memory/2944-26-0x000007FEF5FD0000-0x000007FEF69BC000-memory.dmp

    Filesize

    9.9MB