Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
174s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
02/08/2021, 09:22
Static task
static1
Behavioral task
behavioral1
Sample
93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe
Resource
win10v20210408
General
-
Target
93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe
-
Size
204KB
-
MD5
27f49c4608311a736ef96673b2300531
-
SHA1
da24c13d479932796e992c1f42e979e637e476d0
-
SHA256
93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e
-
SHA512
8a698f8ac861e5545141e36faf35e91123cdb9ddaa2f7d8923ca4d80cf276325ccba900321b3b503473d2769c93a92ec6fa9bd2c2b3f2b3552202fdf25f7d30c
Malware Config
Extracted
plugx
rainydaysweb.com:80
rainydaysweb.com:443
rainydaysweb.com:53
dhHRYvLNaOVJXZdDsbdc
-
folder
AAM UpdatesblF
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1992 web.exe 1780 AAM Updates.exe -
Loads dropped DLL 4 IoCs
pid Process 1160 rundll32.exe 1992 web.exe 1992 web.exe 1780 AAM Updates.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run web.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\AAM UpdatesblF = "\"C:\\ProgramData\\AAM UpdatesblF\\AAM Updates.exe\" 640" web.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run web.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AAM UpdatesblF = "\"C:\\ProgramData\\AAM UpdatesblF\\AAM Updates.exe\" 640" web.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\ms-pu\PROXY AAM Updates.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ms-pu AAM Updates.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ms-pu\PROXY AAM Updates.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1780 AAM Updates.exe 1780 AAM Updates.exe 1780 AAM Updates.exe 1780 AAM Updates.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1780 AAM Updates.exe Token: SeDebugPrivilege 1780 AAM Updates.exe Token: SeTcbPrivilege 1780 AAM Updates.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1340 wrote to memory of 1160 1340 93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe 26 PID 1340 wrote to memory of 1160 1340 93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe 26 PID 1340 wrote to memory of 1160 1340 93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe 26 PID 1340 wrote to memory of 1160 1340 93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe 26 PID 1340 wrote to memory of 1160 1340 93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe 26 PID 1340 wrote to memory of 1160 1340 93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe 26 PID 1340 wrote to memory of 1160 1340 93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe 26 PID 1160 wrote to memory of 1992 1160 rundll32.exe 27 PID 1160 wrote to memory of 1992 1160 rundll32.exe 27 PID 1160 wrote to memory of 1992 1160 rundll32.exe 27 PID 1160 wrote to memory of 1992 1160 rundll32.exe 27 PID 1992 wrote to memory of 1780 1992 web.exe 28 PID 1992 wrote to memory of 1780 1992 web.exe 28 PID 1992 wrote to memory of 1780 1992 web.exe 28 PID 1992 wrote to memory of 1780 1992 web.exe 28 PID 1992 wrote to memory of 1780 1992 web.exe 28 PID 1992 wrote to memory of 1780 1992 web.exe 28 PID 1992 wrote to memory of 1780 1992 web.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe"C:\Users\Admin\AppData\Local\Temp\93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" url.dll, FileProtocolHandler C:\Users\Admin\AppData\Local\Temp\web.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\web.exe"C:\Users\Admin\AppData\Local\Temp\web.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\ProgramData\AAM UpdatesblF\AAM Updates.exe"C:\ProgramData\AAM UpdatesblF\AAM Updates.exe" 6404⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
-