Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    102s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:10

General

  • Target

    4189a83a9b95038e6e32f05b4c69f3b4.exe

  • Size

    54KB

  • MD5

    4189a83a9b95038e6e32f05b4c69f3b4

  • SHA1

    516c5997c8102be91f6ed419e808864e0381de86

  • SHA256

    2f0fa7dd79cc0a033d55dc62043f188fdcefb4ce7aab2e1ee649d877c2321381

  • SHA512

    53c34bf3919d5cb549a403ae4e20f171e3a744e416ebbfa017413c02d3332b93e261249d5336e73abbd213af37f294b0790e49092913c6d3d556e7d9b4597ec2

  • SSDEEP

    1536:FOpwLVcvsG+yiZodvTlhJX3eye5IybOCoDGbfV:F4wLyvky6opTTt33MSN6rV

Malware Config

Signatures

  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 9 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Modifies firewall policy service 3 TTPs 6 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Identifies Xen via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Disables Task Manager via registry modification
  • Disables use of System Restore points 1 TTPs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Modifies Security services 2 TTPs 1 IoCs

    Modifies the startup behavior of a security service.

  • Drops file in Windows directory 1 IoCs
  • Hide Artifacts: Ignore Process Interrupts 1 TTPs 2 IoCs

    Command interpreters often include specific commands/flags that ignore errors and other hangups.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 1 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Disables Windows logging functionality 2 TTPs

    Changes registry settings to disable Windows Event logging.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4189a83a9b95038e6e32f05b4c69f3b4.exe
    "C:\Users\Admin\AppData\Local\Temp\4189a83a9b95038e6e32f05b4c69f3b4.exe"
    1⤵
    • Modifies Windows Defender DisableAntiSpyware settings
    • Modifies Windows Defender Real-time Protection settings
    • Modifies Windows Defender notification settings
    • Modifies firewall policy service
    • Modifies security service
    • UAC bypass
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Identifies Xen via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Drops startup file
    • Checks whether UAC is enabled
    • Modifies Security services
    • Drops file in Windows directory
    • Event Triggered Execution: Netsh Helper DLL
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:5488
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "Remove-Item -Path 'C:\Users\Admin\AppData\Local\Temp\4189a83a9b95038e6e32f05b4c69f3b4.exe' -Force -ErrorAction SilentlyContinue"
      2⤵
      • Hide Artifacts: Ignore Process Interrupts
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:772
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "Remove-Item -Path 'C:\Users\Admin\AppData\Local\Temp\4189a83a9b95038e6e32f05b4c69f3b4.exe' -Force -ErrorAction SilentlyContinue"
      2⤵
      • Deletes itself
      • Hide Artifacts: Ignore Process Interrupts
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    6cf293cb4d80be23433eecf74ddb5503

    SHA1

    24fe4752df102c2ef492954d6b046cb5512ad408

    SHA256

    b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

    SHA512

    0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    64B

    MD5

    fe30b606ae25715904a7239addbdbeda

    SHA1

    0f34427208737f08e3e935bce5e1e4181bcd5cff

    SHA256

    2e90f96ebb05fddd81e4bfcafb2c8db5efd2cf825887cefefeab70a1ca387761

    SHA512

    99ae531501b53eb6ccdc16ed7d0e684e6aa8886dafa0e83008749e60f5f0eba2f442429c68c1e9a9b870abe0068e0b8b65bb6b80483749e4ba3622d7649fc338

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_s42ljtht.4qk.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/772-13-0x00007FFA2E940000-0x00007FFA2F401000-memory.dmp

    Filesize

    10.8MB

  • memory/772-14-0x00007FFA2E940000-0x00007FFA2F401000-memory.dmp

    Filesize

    10.8MB

  • memory/772-15-0x00007FFA2E940000-0x00007FFA2F401000-memory.dmp

    Filesize

    10.8MB

  • memory/772-27-0x00007FFA2E940000-0x00007FFA2F401000-memory.dmp

    Filesize

    10.8MB

  • memory/5488-0-0x00007FFA2E943000-0x00007FFA2E945000-memory.dmp

    Filesize

    8KB

  • memory/5488-1-0x0000000000030000-0x0000000000044000-memory.dmp

    Filesize

    80KB

  • memory/5488-11-0x00000000021D0000-0x00000000021F2000-memory.dmp

    Filesize

    136KB

  • memory/5488-12-0x00007FFA2E940000-0x00007FFA2F401000-memory.dmp

    Filesize

    10.8MB

  • memory/5488-32-0x00007FFA2E940000-0x00007FFA2F401000-memory.dmp

    Filesize

    10.8MB