Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
4265208s -
max time network
263s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
17/01/2022, 14:09
Static task
static1
Behavioral task
behavioral1
Sample
nine.exe
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
nine.exe
Resource
win10v2004-en-20220112
0 signatures
0 seconds
General
-
Target
nine.exe
-
Size
210KB
-
MD5
4440d9bb248b6ecb966eef7af0ec276c
-
SHA1
dba8eb889861da4252bc2aca9794062a87fb6056
-
SHA256
93e7ecd77057b7388f80a012e15977613f6fa01bda350e684facdce6fee8e1da
-
SHA512
95abb7d39550c8b4b775d98e859e10eca7aa22193becd8656632b87689388c094ce872bf2aa0f24732d965b03ffa65f99e48774941c58779802e501d9bb610d6
Score
10/10
Malware Config
Signatures
-
DiamondFox
DiamondFox is a multipurpose botnet with many capabilities.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 3900 created 3404 3900 WerFault.exe 52 -
DiamondFox payload 3 IoCs
Detects DiamondFox payload in file/memory.
resource yara_rule behavioral2/memory/3404-131-0x00000000001C0000-0x00000000001D8000-memory.dmp diamondfox behavioral2/memory/3404-134-0x0000000000400000-0x0000000001A9E000-memory.dmp diamondfox behavioral2/memory/1548-159-0x0000000000400000-0x0000000001A9E000-memory.dmp diamondfox -
Executes dropped EXE 1 IoCs
pid Process 1548 SearchIndexer.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 904 3404 WerFault.exe 52 -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotification.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotification.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2292 powershell.exe 2292 powershell.exe 904 WerFault.exe 904 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeShutdownPrivilege 1160 MusNotification.exe Token: SeCreatePagefilePrivilege 1160 MusNotification.exe Token: SeDebugPrivilege 2292 powershell.exe Token: SeRestorePrivilege 904 WerFault.exe Token: SeBackupPrivilege 904 WerFault.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3404 nine.exe 1548 SearchIndexer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3404 wrote to memory of 2292 3404 nine.exe 58 PID 3404 wrote to memory of 2292 3404 nine.exe 58 PID 3404 wrote to memory of 2292 3404 nine.exe 58 PID 3900 wrote to memory of 3404 3900 WerFault.exe 52 PID 3900 wrote to memory of 3404 3900 WerFault.exe 52 PID 2292 wrote to memory of 1548 2292 powershell.exe 66 PID 2292 wrote to memory of 1548 2292 powershell.exe 66 PID 2292 wrote to memory of 1548 2292 powershell.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\nine.exe"C:\Users\Admin\AppData\Local\Temp\nine.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Copy-Item -Path 'C:\Users\Admin\AppData\Local\Temp\nine.exe' -Destination 'C:\Users\Admin\AppData\Local\xerasr\SearchIndexer.exe';Start-Sleep -s 60;Start-Process 'C:\Users\Admin\AppData\Local\xerasr\SearchIndexer.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\xerasr\SearchIndexer.exe"C:\Users\Admin\AppData\Local\xerasr\SearchIndexer.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1548
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3404 -s 4802⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:904
-
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe1⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:1160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3404 -ip 34041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:3900