Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
156s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
02/08/2021, 09:22
Static task
static1
Behavioral task
behavioral1
Sample
93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe
Resource
win10v20210408
General
-
Target
93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe
-
Size
204KB
-
MD5
27f49c4608311a736ef96673b2300531
-
SHA1
da24c13d479932796e992c1f42e979e637e476d0
-
SHA256
93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e
-
SHA512
8a698f8ac861e5545141e36faf35e91123cdb9ddaa2f7d8923ca4d80cf276325ccba900321b3b503473d2769c93a92ec6fa9bd2c2b3f2b3552202fdf25f7d30c
Malware Config
Extracted
plugx
rainydaysweb.com:80
rainydaysweb.com:443
rainydaysweb.com:53
dhHRYvLNaOVJXZdDsbdc
-
folder
AAM UpdatesblF
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 768 web.exe 3064 AAM Updates.exe -
Loads dropped DLL 2 IoCs
pid Process 768 web.exe 3064 AAM Updates.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run web.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AAM UpdatesblF = "\"C:\\ProgramData\\AAM UpdatesblF\\AAM Updates.exe\" 719" web.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run web.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\AAM UpdatesblF = "\"C:\\ProgramData\\AAM UpdatesblF\\AAM Updates.exe\" 719" web.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\ms-pu\PROXY AAM Updates.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ms-pu AAM Updates.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ms-pu\PROXY AAM Updates.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3064 AAM Updates.exe 3064 AAM Updates.exe 3064 AAM Updates.exe 3064 AAM Updates.exe 3064 AAM Updates.exe 3064 AAM Updates.exe 3064 AAM Updates.exe 3064 AAM Updates.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3064 AAM Updates.exe Token: SeDebugPrivilege 3064 AAM Updates.exe Token: SeTcbPrivilege 3064 AAM Updates.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 628 wrote to memory of 3480 628 93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe 75 PID 628 wrote to memory of 3480 628 93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe 75 PID 628 wrote to memory of 3480 628 93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe 75 PID 3480 wrote to memory of 768 3480 rundll32.exe 76 PID 3480 wrote to memory of 768 3480 rundll32.exe 76 PID 3480 wrote to memory of 768 3480 rundll32.exe 76 PID 768 wrote to memory of 3064 768 web.exe 77 PID 768 wrote to memory of 3064 768 web.exe 77 PID 768 wrote to memory of 3064 768 web.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe"C:\Users\Admin\AppData\Local\Temp\93d33626886e97abf4087f5445b2a02738ea21d8624b3f015625cd646e9d986e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" url.dll, FileProtocolHandler C:\Users\Admin\AppData\Local\Temp\web.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\web.exe"C:\Users\Admin\AppData\Local\Temp\web.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:768 -
C:\ProgramData\AAM UpdatesblF\AAM Updates.exe"C:\ProgramData\AAM UpdatesblF\AAM Updates.exe" 7194⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
-