Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
28/11/2021, 21:11
Static task
static1
Behavioral task
behavioral1
Sample
61feca446ab393ad4a1ccbb92623ee847b08862ef4b6cac5ff2b0c0976abc6b5.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
61feca446ab393ad4a1ccbb92623ee847b08862ef4b6cac5ff2b0c0976abc6b5.exe
Resource
win10-en-20211014
General
-
Target
61feca446ab393ad4a1ccbb92623ee847b08862ef4b6cac5ff2b0c0976abc6b5.exe
-
Size
657KB
-
MD5
ef93f30fe316bfdaacd4076b59b6e804
-
SHA1
0bfe39ff3250d91c890b50895b4612f3eac5bf4a
-
SHA256
61feca446ab393ad4a1ccbb92623ee847b08862ef4b6cac5ff2b0c0976abc6b5
-
SHA512
ad033691cc215c13ee2fb18adc82f3f90dfe0b51088588c630955436d36980d570acae0d45500e073e71cf556b37c20a40e6505983a2026fbe6a03ecb40d9b49
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\a988e82d31897fcba6f8\\gennt.exe\"" gennt.exe -
Buer Loader 1 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral2/memory/3532-121-0x0000000000540000-0x000000000068A000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 3532 gennt.exe -
Deletes itself 1 IoCs
pid Process 3532 gennt.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: gennt.exe File opened (read-only) \??\J: gennt.exe File opened (read-only) \??\K: gennt.exe File opened (read-only) \??\M: gennt.exe File opened (read-only) \??\Q: gennt.exe File opened (read-only) \??\T: gennt.exe File opened (read-only) \??\O: gennt.exe File opened (read-only) \??\R: gennt.exe File opened (read-only) \??\S: gennt.exe File opened (read-only) \??\A: gennt.exe File opened (read-only) \??\B: gennt.exe File opened (read-only) \??\F: gennt.exe File opened (read-only) \??\H: gennt.exe File opened (read-only) \??\I: gennt.exe File opened (read-only) \??\V: gennt.exe File opened (read-only) \??\P: gennt.exe File opened (read-only) \??\Z: gennt.exe File opened (read-only) \??\W: gennt.exe File opened (read-only) \??\Y: gennt.exe File opened (read-only) \??\E: gennt.exe File opened (read-only) \??\G: gennt.exe File opened (read-only) \??\L: gennt.exe File opened (read-only) \??\N: gennt.exe File opened (read-only) \??\U: gennt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2880 1344 WerFault.exe 72 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 3532 gennt.exe 3532 gennt.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 2880 WerFault.exe Token: SeBackupPrivilege 2880 WerFault.exe Token: SeDebugPrivilege 2880 WerFault.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2816 wrote to memory of 3532 2816 61feca446ab393ad4a1ccbb92623ee847b08862ef4b6cac5ff2b0c0976abc6b5.exe 71 PID 2816 wrote to memory of 3532 2816 61feca446ab393ad4a1ccbb92623ee847b08862ef4b6cac5ff2b0c0976abc6b5.exe 71 PID 2816 wrote to memory of 3532 2816 61feca446ab393ad4a1ccbb92623ee847b08862ef4b6cac5ff2b0c0976abc6b5.exe 71 PID 3532 wrote to memory of 1344 3532 gennt.exe 72 PID 3532 wrote to memory of 1344 3532 gennt.exe 72 PID 3532 wrote to memory of 1344 3532 gennt.exe 72 PID 3532 wrote to memory of 1344 3532 gennt.exe 72 PID 3532 wrote to memory of 1344 3532 gennt.exe 72 PID 3532 wrote to memory of 1344 3532 gennt.exe 72 PID 3532 wrote to memory of 1344 3532 gennt.exe 72 PID 3532 wrote to memory of 1344 3532 gennt.exe 72 PID 3532 wrote to memory of 1344 3532 gennt.exe 72 PID 3532 wrote to memory of 3628 3532 gennt.exe 75 PID 3532 wrote to memory of 3628 3532 gennt.exe 75 PID 3532 wrote to memory of 3628 3532 gennt.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\61feca446ab393ad4a1ccbb92623ee847b08862ef4b6cac5ff2b0c0976abc6b5.exe"C:\Users\Admin\AppData\Local\Temp\61feca446ab393ad4a1ccbb92623ee847b08862ef4b6cac5ff2b0c0976abc6b5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\ProgramData\a988e82d31897fcba6f8\gennt.exeC:\ProgramData\a988e82d31897fcba6f8\gennt.exe "C:\Users\Admin\AppData\Local\Temp\61feca446ab393ad4a1ccbb92623ee847b08862ef4b6cac5ff2b0c0976abc6b5.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Deletes itself
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\a988e82d31897fcba6f8\gennt.exe3⤵PID:1344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 6724⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" powershell.exe -Command "& {Add-MpPreference -ExclusionPath C:\ProgramData\a988e82d31897fcba6f8}"3⤵PID:3628
-
-