Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01/02/2022, 09:23
Static task
static1
Behavioral task
behavioral1
Sample
b95fe75736d19887ae4e3516c5cd9c7fa7caf763a138794f9aaecdee8d37f0b0.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
b95fe75736d19887ae4e3516c5cd9c7fa7caf763a138794f9aaecdee8d37f0b0.exe
Resource
win10v2004-en-20220113
General
-
Target
b95fe75736d19887ae4e3516c5cd9c7fa7caf763a138794f9aaecdee8d37f0b0.exe
-
Size
207KB
-
MD5
dd5ecbbdd7c8ca66d7b3f8d524855e9c
-
SHA1
2d46c394a5c4722e7fccfd3bc92636b5a0b6fbec
-
SHA256
b95fe75736d19887ae4e3516c5cd9c7fa7caf763a138794f9aaecdee8d37f0b0
-
SHA512
964d717a45c287d9b7e06d6bd21272021071f8fdfb835f5c79f2b422b3e3035bc37722a5fcb4ae830bb9a9eeea656fa0cf734de87c60da89fd5593265470eb8e
Malware Config
Extracted
buer
https://mesoplano.com/
https://banusle.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\2fad3ebd5b830f1d2237\\gennt.exe\"" gennt.exe -
Buer Loader 3 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral1/memory/1864-59-0x0000000000290000-0x000000000029C000-memory.dmp buer behavioral1/memory/652-72-0x00000000001E0000-0x00000000001EC000-memory.dmp buer behavioral1/memory/1736-77-0x0000000000240000-0x000000000024C000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 652 gennt.exe -
Deletes itself 1 IoCs
pid Process 652 gennt.exe -
Loads dropped DLL 2 IoCs
pid Process 1864 b95fe75736d19887ae4e3516c5cd9c7fa7caf763a138794f9aaecdee8d37f0b0.exe 1864 b95fe75736d19887ae4e3516c5cd9c7fa7caf763a138794f9aaecdee8d37f0b0.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: gennt.exe File opened (read-only) \??\V: gennt.exe File opened (read-only) \??\A: gennt.exe File opened (read-only) \??\B: gennt.exe File opened (read-only) \??\F: gennt.exe File opened (read-only) \??\K: gennt.exe File opened (read-only) \??\L: gennt.exe File opened (read-only) \??\T: gennt.exe File opened (read-only) \??\H: gennt.exe File opened (read-only) \??\M: gennt.exe File opened (read-only) \??\N: gennt.exe File opened (read-only) \??\W: gennt.exe File opened (read-only) \??\X: gennt.exe File opened (read-only) \??\I: gennt.exe File opened (read-only) \??\O: gennt.exe File opened (read-only) \??\Q: gennt.exe File opened (read-only) \??\R: gennt.exe File opened (read-only) \??\Z: gennt.exe File opened (read-only) \??\E: gennt.exe File opened (read-only) \??\G: gennt.exe File opened (read-only) \??\J: gennt.exe File opened (read-only) \??\P: gennt.exe File opened (read-only) \??\S: gennt.exe File opened (read-only) \??\Y: gennt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 652 gennt.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1864 wrote to memory of 652 1864 b95fe75736d19887ae4e3516c5cd9c7fa7caf763a138794f9aaecdee8d37f0b0.exe 27 PID 1864 wrote to memory of 652 1864 b95fe75736d19887ae4e3516c5cd9c7fa7caf763a138794f9aaecdee8d37f0b0.exe 27 PID 1864 wrote to memory of 652 1864 b95fe75736d19887ae4e3516c5cd9c7fa7caf763a138794f9aaecdee8d37f0b0.exe 27 PID 1864 wrote to memory of 652 1864 b95fe75736d19887ae4e3516c5cd9c7fa7caf763a138794f9aaecdee8d37f0b0.exe 27 PID 652 wrote to memory of 1736 652 gennt.exe 28 PID 652 wrote to memory of 1736 652 gennt.exe 28 PID 652 wrote to memory of 1736 652 gennt.exe 28 PID 652 wrote to memory of 1736 652 gennt.exe 28 PID 652 wrote to memory of 1736 652 gennt.exe 28 PID 652 wrote to memory of 1736 652 gennt.exe 28 PID 652 wrote to memory of 1736 652 gennt.exe 28 PID 652 wrote to memory of 1736 652 gennt.exe 28 PID 652 wrote to memory of 1736 652 gennt.exe 28 PID 652 wrote to memory of 1736 652 gennt.exe 28 PID 652 wrote to memory of 1432 652 gennt.exe 31 PID 652 wrote to memory of 1432 652 gennt.exe 31 PID 652 wrote to memory of 1432 652 gennt.exe 31 PID 652 wrote to memory of 1432 652 gennt.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b95fe75736d19887ae4e3516c5cd9c7fa7caf763a138794f9aaecdee8d37f0b0.exe"C:\Users\Admin\AppData\Local\Temp\b95fe75736d19887ae4e3516c5cd9c7fa7caf763a138794f9aaecdee8d37f0b0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\ProgramData\2fad3ebd5b830f1d2237\gennt.exeC:\ProgramData\2fad3ebd5b830f1d2237\gennt.exe "C:\Users\Admin\AppData\Local\Temp\b95fe75736d19887ae4e3516c5cd9c7fa7caf763a138794f9aaecdee8d37f0b0.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Deletes itself
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\2fad3ebd5b830f1d2237\gennt.exe3⤵PID:1736
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" powershell.exe -Command "& {Add-MpPreference -ExclusionPath C:\ProgramData\2fad3ebd5b830f1d2237}"3⤵PID:1432
-
-