Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
10s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
06/05/2021, 14:10
Static task
static1
Behavioral task
behavioral1
Sample
AnnualReport.exe
Resource
win7v20210408
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
AnnualReport.exe
Resource
win10v20210408
0 signatures
0 seconds
General
-
Target
AnnualReport.exe
-
Size
3.1MB
-
MD5
7908cc9996b7423c766157d8119df254
-
SHA1
7974b277a69b8c811734a6ad30f3ad1f523d3503
-
SHA256
6b665a866997d39ba17c6b687693c71b4d4a622d016ad7e0c37bc735524858be
-
SHA512
8fc36eeef99a7e3df702672bc0f19077324cda0a17af0c75818d9f11c44c7c51d2d8b51290775ef22aedfb809a1b718a9593cf4777334d8b44d37a75e07c5554
Malware Config
Extracted
Family
buer
C2
https://itofficemasword.com/
Signatures
-
Buer Loader 4 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral1/memory/1304-61-0x0000000000390000-0x00000000003F0000-memory.dmp buer behavioral1/memory/1304-64-0x0000000040000000-0x000000004005E000-memory.dmp buer behavioral1/memory/1304-68-0x00000000002A0000-0x00000000002FD000-memory.dmp buer behavioral1/memory/1540-71-0x0000000002600000-0x000000000324A000-memory.dmp buer -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: AnnualReport.exe File opened (read-only) \??\M: AnnualReport.exe File opened (read-only) \??\N: AnnualReport.exe File opened (read-only) \??\Q: AnnualReport.exe File opened (read-only) \??\R: AnnualReport.exe File opened (read-only) \??\T: AnnualReport.exe File opened (read-only) \??\B: AnnualReport.exe File opened (read-only) \??\H: AnnualReport.exe File opened (read-only) \??\V: AnnualReport.exe File opened (read-only) \??\Y: AnnualReport.exe File opened (read-only) \??\K: AnnualReport.exe File opened (read-only) \??\W: AnnualReport.exe File opened (read-only) \??\S: AnnualReport.exe File opened (read-only) \??\U: AnnualReport.exe File opened (read-only) \??\Z: AnnualReport.exe File opened (read-only) \??\E: AnnualReport.exe File opened (read-only) \??\G: AnnualReport.exe File opened (read-only) \??\I: AnnualReport.exe File opened (read-only) \??\L: AnnualReport.exe File opened (read-only) \??\O: AnnualReport.exe File opened (read-only) \??\P: AnnualReport.exe File opened (read-only) \??\X: AnnualReport.exe File opened (read-only) \??\A: AnnualReport.exe File opened (read-only) \??\F: AnnualReport.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1540 powershell.exe 1540 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1540 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1304 AnnualReport.exe 1304 AnnualReport.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1304 wrote to memory of 1540 1304 AnnualReport.exe 29 PID 1304 wrote to memory of 1540 1304 AnnualReport.exe 29 PID 1304 wrote to memory of 1540 1304 AnnualReport.exe 29 PID 1304 wrote to memory of 1540 1304 AnnualReport.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\AnnualReport.exe"C:\Users\Admin\AppData\Local\Temp\AnnualReport.exe"1⤵
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "& {Add-MpPreference -ExclusionPath C:\ProgramData\1a4307bd1553d0aa04b9}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1540
-