Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 18:21
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20241010-en
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
cebfba08c10315f1861ac9470097cb62
-
SHA1
61fed68ff181a53942b9d44bc334d80412cec67e
-
SHA256
22694b738ce9d320755f0a5d0bb381568d75e3b463cf0fbe9578052b7177d7fd
-
SHA512
e81e4285b9f7c2345a24acb70b92935d97bfe5621d64b7ce0f7ea275cdedbfc8d9f0528ba572503207489ef6f045de9efaf26bcc0655501d1ccc460168a41b11
-
SSDEEP
49152:mvzI22SsaNYfdPBldt698dBcjHLgsndp7LoGdqTHHB72eh2NT:mvM22SsaNYfdPBldt6+dBcjHcsH
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.10.126:59006
8338883e-e167-4933-893d-9116970a5a7e
-
encryption_key
FFFB8904E2A834B666E9B38240430975448158C8
-
install_name
pcimprover.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Microsoft-Imrpover
-
subdirectory
find
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/2860-1-0x00000000012B0000-0x00000000015D4000-memory.dmp family_quasar behavioral1/files/0x002f000000018bd7-6.dat family_quasar behavioral1/memory/3060-9-0x0000000000CC0000-0x0000000000FE4000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 3060 pcimprover.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\find\pcimprover.exe Client-built.exe File opened for modification C:\Program Files\find\pcimprover.exe Client-built.exe File opened for modification C:\Program Files\find Client-built.exe File opened for modification C:\Program Files\find\pcimprover.exe pcimprover.exe File opened for modification C:\Program Files\find pcimprover.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2912 schtasks.exe 2924 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2860 Client-built.exe Token: SeDebugPrivilege 3060 pcimprover.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3060 pcimprover.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3060 pcimprover.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3060 pcimprover.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2912 2860 Client-built.exe 30 PID 2860 wrote to memory of 2912 2860 Client-built.exe 30 PID 2860 wrote to memory of 2912 2860 Client-built.exe 30 PID 2860 wrote to memory of 3060 2860 Client-built.exe 32 PID 2860 wrote to memory of 3060 2860 Client-built.exe 32 PID 2860 wrote to memory of 3060 2860 Client-built.exe 32 PID 3060 wrote to memory of 2924 3060 pcimprover.exe 33 PID 3060 wrote to memory of 2924 3060 pcimprover.exe 33 PID 3060 wrote to memory of 2924 3060 pcimprover.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Microsoft-Imrpover" /sc ONLOGON /tr "C:\Program Files\find\pcimprover.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2912
-
-
C:\Program Files\find\pcimprover.exe"C:\Program Files\find\pcimprover.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Microsoft-Imrpover" /sc ONLOGON /tr "C:\Program Files\find\pcimprover.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2924
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5cebfba08c10315f1861ac9470097cb62
SHA161fed68ff181a53942b9d44bc334d80412cec67e
SHA25622694b738ce9d320755f0a5d0bb381568d75e3b463cf0fbe9578052b7177d7fd
SHA512e81e4285b9f7c2345a24acb70b92935d97bfe5621d64b7ce0f7ea275cdedbfc8d9f0528ba572503207489ef6f045de9efaf26bcc0655501d1ccc460168a41b11