Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

05/09/2021, 20:33

210905-zbxjmshgf2 10

05/09/2021, 19:15

210905-xx8gxschcr 10

Analysis

  • max time kernel
    1199s
  • max time network
    996s
  • platform
    windows7_x64
  • resource
    win7-en
  • submitted
    05/09/2021, 20:33

General

  • Target

    SecuriteInfo.com.Trojan.GenericKD.46929464.6664.11196.exe

  • Size

    188KB

  • MD5

    590459b833a0d6846c570d35e7f3344d

  • SHA1

    b095954830b51651520990b275220bf50cc89a4b

  • SHA256

    57b2efd438bf6c7eb64a4a2d454f215361e2f96ac4bd50284b89c64742bc307a

  • SHA512

    cac850af0eefa7d3aede5556f9b1d9ed0c70aebfd5518ac80a5966f7900cea32a76534ea303e6def62b1ec78a942622359be01562d7dbb9e44a7c74a2bac20c7

Score
10/10

Malware Config

Signatures

  • Buer

    Buer is a new modular loader first seen in August 2019.

  • Executes dropped EXE 20 IoCs
  • Loads dropped DLL 21 IoCs
  • Obfuscated with Agile.Net obfuscator 21 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46929464.6664.11196.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46929464.6664.11196.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1076
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN Windows\Framework\MicrosoftSecurityEssentials /XML "C:\ProgramData\BC100BA15203137C9F10\task"
      2⤵
      • Creates scheduled task(s)
      PID:1720
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {78B61454-0668-4532-A0B1-ECAB56C48B8C} S-1-5-21-1669990088-476967504-438132596-1000:KJUCCLUP\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1068
    • C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1904
    • C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1628
    • C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1760
    • C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1648
    • C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1292
    • C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1424
    • C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1196
    • C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1512
    • C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:840
    • C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:780
    • C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:1660
    • C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:1292
    • C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:1916
    • C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:1552
    • C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:1548
    • C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:912
    • C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:1924
    • C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:1472
    • C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      C:\ProgramData\BC100BA15203137C9F10\moduleName.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:320

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/320-199-0x000007FEF3710000-0x000007FEF383C000-memory.dmp

    Filesize

    1.2MB

  • memory/320-200-0x000000001B070000-0x000000001B072000-memory.dmp

    Filesize

    8KB

  • memory/320-196-0x0000000001060000-0x0000000001061000-memory.dmp

    Filesize

    4KB

  • memory/780-137-0x000000001AEC0000-0x000000001AEC2000-memory.dmp

    Filesize

    8KB

  • memory/780-136-0x000007FEF6180000-0x000007FEF62AC000-memory.dmp

    Filesize

    1.2MB

  • memory/780-133-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/840-129-0x000007FEF3710000-0x000007FEF383C000-memory.dmp

    Filesize

    1.2MB

  • memory/840-130-0x000000001AC50000-0x000000001AC52000-memory.dmp

    Filesize

    8KB

  • memory/912-178-0x000007FEF6180000-0x000007FEF62AC000-memory.dmp

    Filesize

    1.2MB

  • memory/912-179-0x0000000000B20000-0x0000000000B22000-memory.dmp

    Filesize

    8KB

  • memory/1068-67-0x0000000000500000-0x0000000000502000-memory.dmp

    Filesize

    8KB

  • memory/1068-62-0x0000000000180000-0x0000000000181000-memory.dmp

    Filesize

    4KB

  • memory/1076-54-0x000000001AD90000-0x000000001AD92000-memory.dmp

    Filesize

    8KB

  • memory/1076-52-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/1076-56-0x000007FEF5CD0000-0x000007FEF5DFC000-memory.dmp

    Filesize

    1.2MB

  • memory/1196-116-0x000000001AE90000-0x000000001AE92000-memory.dmp

    Filesize

    8KB

  • memory/1196-115-0x000007FEF3710000-0x000007FEF383C000-memory.dmp

    Filesize

    1.2MB

  • memory/1292-102-0x000007FEF3710000-0x000007FEF383C000-memory.dmp

    Filesize

    1.2MB

  • memory/1292-101-0x000000001A770000-0x000000001A772000-memory.dmp

    Filesize

    8KB

  • memory/1292-147-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/1292-150-0x000007FEF6180000-0x000007FEF62AC000-memory.dmp

    Filesize

    1.2MB

  • memory/1292-151-0x000000001A8D0000-0x000000001A8D2000-memory.dmp

    Filesize

    8KB

  • memory/1424-105-0x00000000011C0000-0x00000000011C1000-memory.dmp

    Filesize

    4KB

  • memory/1424-109-0x000000001ACE0000-0x000000001ACE2000-memory.dmp

    Filesize

    8KB

  • memory/1472-193-0x000000001AC90000-0x000000001AC92000-memory.dmp

    Filesize

    8KB

  • memory/1472-192-0x000007FEF6180000-0x000007FEF62AC000-memory.dmp

    Filesize

    1.2MB

  • memory/1472-189-0x00000000001F0000-0x00000000001F1000-memory.dmp

    Filesize

    4KB

  • memory/1512-123-0x0000000000680000-0x0000000000682000-memory.dmp

    Filesize

    8KB

  • memory/1548-172-0x000000001AB60000-0x000000001AB62000-memory.dmp

    Filesize

    8KB

  • memory/1548-171-0x000007FEF3710000-0x000007FEF383C000-memory.dmp

    Filesize

    1.2MB

  • memory/1548-168-0x0000000001300000-0x0000000001301000-memory.dmp

    Filesize

    4KB

  • memory/1552-164-0x000007FEF6180000-0x000007FEF62AC000-memory.dmp

    Filesize

    1.2MB

  • memory/1552-161-0x0000000000A30000-0x0000000000A31000-memory.dmp

    Filesize

    4KB

  • memory/1552-165-0x000000001AC80000-0x000000001AC82000-memory.dmp

    Filesize

    8KB

  • memory/1628-77-0x0000000000C60000-0x0000000000C61000-memory.dmp

    Filesize

    4KB

  • memory/1628-81-0x0000000002150000-0x0000000002152000-memory.dmp

    Filesize

    8KB

  • memory/1648-95-0x000000001ACC0000-0x000000001ACC2000-memory.dmp

    Filesize

    8KB

  • memory/1660-144-0x000000001ACF0000-0x000000001ACF2000-memory.dmp

    Filesize

    8KB

  • memory/1660-143-0x000007FEF3710000-0x000007FEF383C000-memory.dmp

    Filesize

    1.2MB

  • memory/1660-140-0x0000000000EF0000-0x0000000000EF1000-memory.dmp

    Filesize

    4KB

  • memory/1760-88-0x000000001AD60000-0x000000001AD62000-memory.dmp

    Filesize

    8KB

  • memory/1760-87-0x000007FEF3710000-0x000007FEF383C000-memory.dmp

    Filesize

    1.2MB

  • memory/1760-84-0x0000000000E50000-0x0000000000E51000-memory.dmp

    Filesize

    4KB

  • memory/1904-74-0x000000001B0C0000-0x000000001B0C2000-memory.dmp

    Filesize

    8KB

  • memory/1904-70-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/1904-73-0x000007FEF3710000-0x000007FEF383C000-memory.dmp

    Filesize

    1.2MB

  • memory/1916-158-0x000000001AD60000-0x000000001AD62000-memory.dmp

    Filesize

    8KB

  • memory/1916-157-0x000007FEF3710000-0x000007FEF383C000-memory.dmp

    Filesize

    1.2MB

  • memory/1916-154-0x0000000000910000-0x0000000000911000-memory.dmp

    Filesize

    4KB

  • memory/1924-186-0x0000000000370000-0x0000000000372000-memory.dmp

    Filesize

    8KB

  • memory/1924-185-0x000007FEF3710000-0x000007FEF383C000-memory.dmp

    Filesize

    1.2MB