Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
24/02/2022, 22:57
Static task
static1
Behavioral task
behavioral1
Sample
2.exe
Resource
win7-20220223-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
2.exe
Resource
win10v2004-en-20220112
0 signatures
0 seconds
General
-
Target
2.exe
-
Size
36KB
-
MD5
4d85e1d2cff1f97e149e345a19928ad9
-
SHA1
2c1c6df0d80940bed3576ba89bd8b0f29654bb17
-
SHA256
7c70ee2493d0ccc41cf42d9ef1f478d235bb09fa98eb1e991d7f4bccac818bf0
-
SHA512
d0afa20c1cf1fbdb197dc846e862478fa156b1331b4b4cf1e96520c7981c87de2c25c0dbdebcf6749212c56f70443b3792a133e1261210cf1298358535221f1f
Score
10/10
Malware Config
Extracted
Family
buer
C2
https://gstatiknetiplist.cc/
https://gstatiknetiplist.com/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\responder.exe\"" responder.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\responder.exe\"" secinit.exe -
Buer Loader 3 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral2/files/0x000a00000001e7b1-130.dat buer behavioral2/files/0x000a00000001e7b1-131.dat buer behavioral2/memory/2252-133-0x0000000002C40000-0x0000000002C4C000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 4024 responder.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: secinit.exe File opened (read-only) \??\Q: secinit.exe File opened (read-only) \??\X: secinit.exe File opened (read-only) \??\I: secinit.exe File opened (read-only) \??\J: secinit.exe File opened (read-only) \??\K: secinit.exe File opened (read-only) \??\R: secinit.exe File opened (read-only) \??\S: secinit.exe File opened (read-only) \??\T: secinit.exe File opened (read-only) \??\Z: secinit.exe File opened (read-only) \??\G: secinit.exe File opened (read-only) \??\L: secinit.exe File opened (read-only) \??\O: secinit.exe File opened (read-only) \??\N: secinit.exe File opened (read-only) \??\V: secinit.exe File opened (read-only) \??\W: secinit.exe File opened (read-only) \??\E: secinit.exe File opened (read-only) \??\F: secinit.exe File opened (read-only) \??\M: secinit.exe File opened (read-only) \??\U: secinit.exe File opened (read-only) \??\Y: secinit.exe File opened (read-only) \??\A: secinit.exe File opened (read-only) \??\B: secinit.exe File opened (read-only) \??\H: secinit.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2252 secinit.exe 2252 secinit.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1800 wrote to memory of 4024 1800 2.exe 72 PID 1800 wrote to memory of 4024 1800 2.exe 72 PID 1800 wrote to memory of 4024 1800 2.exe 72 PID 4024 wrote to memory of 2252 4024 responder.exe 73 PID 4024 wrote to memory of 2252 4024 responder.exe 73 PID 4024 wrote to memory of 2252 4024 responder.exe 73 PID 4024 wrote to memory of 2252 4024 responder.exe 73 PID 4024 wrote to memory of 2252 4024 responder.exe 73 PID 4024 wrote to memory of 2252 4024 responder.exe 73 PID 4024 wrote to memory of 2252 4024 responder.exe 73 PID 4024 wrote to memory of 2252 4024 responder.exe 73 PID 4024 wrote to memory of 2252 4024 responder.exe 73 PID 4024 wrote to memory of 2252 4024 responder.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\ProgramData\ErrorResponder\responder.exeC:\ProgramData\ErrorResponder\responder.exe "C:\Users\Admin\AppData\Local\Temp\2.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\responder.exe3⤵
- Modifies WinLogon for persistence
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:2252
-
-