Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

15/03/2022, 08:05

220315-jy3feaahdk 10

15/03/2022, 07:24

220315-h8lpzaghf8 10

Analysis

  • max time kernel
    813s
  • max time network
    1783s
  • platform
    windows7_x64
  • resource
    win7-20220310-en
  • submitted
    15/03/2022, 08:05

General

  • Target

    Restr.exe

  • Size

    252KB

  • MD5

    16959900ff34c0ba60fe2a4d9f1242c5

  • SHA1

    888148f1b31355192e26ea4fc97c91f4c4defe9e

  • SHA256

    0f4395c5cdee1c9fe28ef9a63355594f0f7a23aa41e52b8085a0bda8715da13f

  • SHA512

    a2b7a74fdc6525c5b8ecafc66706136e1e3996e28ebb3b1d8e236b120e59f8c4e85165f385365d706a8391ae2a5f30530a086c7820e26d1a6cd2f19a44da5d54

Score
10/10

Malware Config

Extracted

Family

gozi_rm3

Attributes
  • build

    300994

Signatures

  • Gozi RM3

    A heavily modified version of Gozi using RM3 loader.

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Deletes itself 1 IoCs
  • Uses Tor communications 1 TTPs

    Malware can proxy its traffic through Tor for more anonymity.

  • Drops file in System32 directory 3 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Discovers systems in the same network 1 TTPs 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Modifies Internet Explorer settings 1 TTPs 50 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 11 IoCs
  • Suspicious use of SetWindowsHookEx 44 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1368
      • C:\Users\Admin\AppData\Local\Temp\Restr.exe
        "C:\Users\Admin\AppData\Local\Temp\Restr.exe"
        2⤵
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:304
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /min forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATQBvAGQAZQBhAHIAYwBoAGkAdgBlACcAKQAuAFMA & exit" /p C:\Windows\system32 /s /m po*l.e*e
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1948
        • C:\Windows\system32\forfiles.exe
          forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATQBvAGQAZQBhAHIAYwBoAGkAdgBlACcAKQAuAFMA & exit" /p C:\Windows\system32 /s /m po*l.e*e
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1012
          • C:\Windows\system32\cmd.exe
            /k "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATQBvAGQAZQBhAHIAYwBoAGkAdgBlACcAKQAuAFMA & exit
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1120
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATQBvAGQAZQBhAHIAYwBoAGkAdgBlACcAKQAuAFMA
              5⤵
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1292
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -E JwBwAGEAcgBhAG0AKAAkAG8AdgB0AHMAbAB5ACkAOwBbAFMAeQBzAHQAZQBtAC4AQwBvAG4AdgBlAHIAdABdADoAOgBGAHIAbwBtAEIAYQBzAGUANgA0AFMAdAByAGkAbgBnACgAJABvAHYAdABzAGwAeQApACcA
                6⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1640
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -E JwBwAGEAcgBhAG0AKAAkAHAAYgBmAG0AYwBnAHQAcwB1AGYAbQApADsAWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAQQBTAEMASQBJAC4ARwBlAHQAUwB0AHIAaQBuAGcAKAAkAHAAYgBmAG0AYwBnAHQAcwB1AGYAbQApACcA
                6⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:844
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\cjxp6gcr.cmdline"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1580
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFFA4.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCFFA3.tmp"
                  7⤵
                    PID:1544
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\adua5uv0.cmdline"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1472
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES21.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC20.tmp"
                    7⤵
                      PID:1124
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C timeout /t 5 && del "C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\RESTR.EXE"
            2⤵
            • Deletes itself
            • Suspicious use of WriteProcessMemory
            PID:1960
            • C:\Windows\system32\timeout.exe
              timeout /t 5
              3⤵
              • Delays execution with timeout.exe
              PID:1752
          • C:\Windows\system32\iexpress.exe
            iexpress.exe /n /q /m C:\Users\Admin\AppData\Local\Temp\6D90.bin
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1292
            • C:\Windows\system32\makecab.exe
              C:\Windows\system32\makecab.exe /f "C:\Users\Admin\~Columnsoftware.DDF"
              3⤵
                PID:760
            • C:\Windows\system32\cmd.exe
              cmd /C "net group "domain computers" /domain" >> C:\Users\Admin\AppData\Local\Temp\A5C0.bin0
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:980
              • C:\Windows\system32\net.exe
                net group "domain computers" /domain
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:1012
                • C:\Windows\system32\net1.exe
                  C:\Windows\system32\net1 group "domain computers" /domain
                  4⤵
                    PID:1292
              • C:\Windows\syswow64\svchost.exe
                C:\Windows\syswow64\svchost.exe
                2⤵
                  PID:568
                • C:\Windows\system32\cmd.exe
                  cmd /C "net session" >> C:\Users\Admin\AppData\Local\Temp\5BA0.bin0
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1364
                  • C:\Windows\system32\net.exe
                    net session
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1936
                    • C:\Windows\system32\net1.exe
                      C:\Windows\system32\net1 session
                      4⤵
                        PID:1656
                  • C:\Windows\system32\cmd.exe
                    cmd /U /C "type C:\Users\Admin\AppData\Local\Temp\5BA0.bin0 > C:\Users\Admin\AppData\Local\Temp\5BA0.bin & del C:\Users\Admin\AppData\Local\Temp\5BA0.bin0"
                    2⤵
                      PID:988
                    • C:\Windows\system32\cmd.exe
                      cmd /C "systeminfo.exe" >> C:\Users\Admin\AppData\Local\Temp\7AD4.bin0
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1908
                      • C:\Windows\system32\systeminfo.exe
                        systeminfo.exe
                        3⤵
                        • Gathers system information
                        PID:1992
                    • C:\Windows\system32\cmd.exe
                      cmd /C "echo -------- 1" >> C:\Users\Admin\AppData\Local\Temp\7AD4.bin0
                      2⤵
                        PID:980
                      • C:\Windows\system32\cmd.exe
                        cmd /C "net view" >> C:\Users\Admin\AppData\Local\Temp\7AD4.bin0
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:952
                        • C:\Windows\system32\net.exe
                          net view
                          3⤵
                          • Discovers systems in the same network
                          PID:1784
                      • C:\Windows\system32\cmd.exe
                        cmd /C "echo -------- 2" >> C:\Users\Admin\AppData\Local\Temp\7AD4.bin0
                        2⤵
                          PID:1836
                        • C:\Windows\system32\cmd.exe
                          cmd /C "nslookup 127.0.0.1" >> C:\Users\Admin\AppData\Local\Temp\7AD4.bin0
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1540
                          • C:\Windows\system32\nslookup.exe
                            nslookup 127.0.0.1
                            3⤵
                              PID:1296
                          • C:\Windows\system32\cmd.exe
                            cmd /C "echo -------- 3" >> C:\Users\Admin\AppData\Local\Temp\7AD4.bin0
                            2⤵
                              PID:576
                            • C:\Windows\system32\cmd.exe
                              cmd /C "whoami /all" >> C:\Users\Admin\AppData\Local\Temp\7AD4.bin0
                              2⤵
                                PID:1020
                                • C:\Windows\system32\whoami.exe
                                  whoami /all
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1200
                              • C:\Windows\system32\cmd.exe
                                cmd /C "echo -------- 4" >> C:\Users\Admin\AppData\Local\Temp\7AD4.bin0
                                2⤵
                                  PID:1676
                                • C:\Windows\system32\cmd.exe
                                  cmd /C "net localgroup administrators" >> C:\Users\Admin\AppData\Local\Temp\7AD4.bin0
                                  2⤵
                                    PID:1744
                                    • C:\Windows\system32\net.exe
                                      net localgroup administrators
                                      3⤵
                                        PID:1468
                                        • C:\Windows\system32\net1.exe
                                          C:\Windows\system32\net1 localgroup administrators
                                          4⤵
                                            PID:1656
                                      • C:\Windows\system32\cmd.exe
                                        cmd /C "echo -------- 5" >> C:\Users\Admin\AppData\Local\Temp\7AD4.bin0
                                        2⤵
                                          PID:1012
                                        • C:\Windows\system32\cmd.exe
                                          cmd /C "net group "domain computers" /domain" >> C:\Users\Admin\AppData\Local\Temp\7AD4.bin0
                                          2⤵
                                            PID:1200
                                            • C:\Windows\system32\net.exe
                                              net group "domain computers" /domain
                                              3⤵
                                                PID:1924
                                                • C:\Windows\system32\net1.exe
                                                  C:\Windows\system32\net1 group "domain computers" /domain
                                                  4⤵
                                                    PID:1352
                                              • C:\Windows\system32\cmd.exe
                                                cmd /C "echo -------- 6" >> C:\Users\Admin\AppData\Local\Temp\7AD4.bin0
                                                2⤵
                                                  PID:1708
                                                • C:\Windows\system32\cmd.exe
                                                  cmd /C "tasklist.exe /SVC" >> C:\Users\Admin\AppData\Local\Temp\7AD4.bin0
                                                  2⤵
                                                    PID:1040
                                                    • C:\Windows\system32\tasklist.exe
                                                      tasklist.exe /SVC
                                                      3⤵
                                                      • Enumerates processes with tasklist
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1496
                                                  • C:\Windows\system32\cmd.exe
                                                    cmd /C "echo -------- 7" >> C:\Users\Admin\AppData\Local\Temp\7AD4.bin0
                                                    2⤵
                                                      PID:1688
                                                    • C:\Windows\system32\cmd.exe
                                                      cmd /C "driverquery.exe" >> C:\Users\Admin\AppData\Local\Temp\7AD4.bin0
                                                      2⤵
                                                        PID:1744
                                                        • C:\Windows\system32\driverquery.exe
                                                          driverquery.exe
                                                          3⤵
                                                            PID:1200
                                                        • C:\Windows\system32\cmd.exe
                                                          cmd /C "echo -------- 8" >> C:\Users\Admin\AppData\Local\Temp\7AD4.bin0
                                                          2⤵
                                                            PID:1900
                                                          • C:\Windows\system32\cmd.exe
                                                            cmd /C "reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s" >> C:\Users\Admin\AppData\Local\Temp\7AD4.bin0
                                                            2⤵
                                                              PID:576
                                                              • C:\Windows\system32\reg.exe
                                                                reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s
                                                                3⤵
                                                                  PID:1652
                                                              • C:\Windows\system32\cmd.exe
                                                                cmd /C "echo -------- 9" >> C:\Users\Admin\AppData\Local\Temp\7AD4.bin0
                                                                2⤵
                                                                  PID:1600
                                                                • C:\Windows\system32\cmd.exe
                                                                  cmd /C "wmic computersystem get domain |more" >> C:\Users\Admin\AppData\Local\Temp\7AD4.bin0
                                                                  2⤵
                                                                    PID:1060
                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                      wmic computersystem get domain
                                                                      3⤵
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:1380
                                                                    • C:\Windows\system32\more.com
                                                                      more
                                                                      3⤵
                                                                        PID:1676
                                                                    • C:\Windows\system32\cmd.exe
                                                                      cmd /U /C "type C:\Users\Admin\AppData\Local\Temp\7AD4.bin0 > C:\Users\Admin\AppData\Local\Temp\7AD4.bin & del C:\Users\Admin\AppData\Local\Temp\7AD4.bin0"
                                                                      2⤵
                                                                        PID:1020
                                                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                                                      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                                                                      1⤵
                                                                      • Modifies Internet Explorer settings
                                                                      • Suspicious use of FindShellTrayWindow
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      • Suspicious use of WriteProcessMemory
                                                                      PID:2020
                                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:2
                                                                        2⤵
                                                                        • Modifies Internet Explorer settings
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:1840
                                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:734213 /prefetch:2
                                                                        2⤵
                                                                        • Modifies Internet Explorer settings
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:1080

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v6

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • memory/304-56-0x0000000000230000-0x000000000023C000-memory.dmp

                                                                      Filesize

                                                                      48KB

                                                                    • memory/304-65-0x0000000000270000-0x0000000000272000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/304-59-0x0000000000240000-0x0000000000250000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/304-54-0x000000000052E000-0x0000000000539000-memory.dmp

                                                                      Filesize

                                                                      44KB

                                                                    • memory/304-57-0x0000000075C41000-0x0000000075C43000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/304-58-0x0000000001000000-0x000000000106F000-memory.dmp

                                                                      Filesize

                                                                      444KB

                                                                    • memory/304-55-0x000000000052E000-0x0000000000539000-memory.dmp

                                                                      Filesize

                                                                      44KB

                                                                    • memory/304-111-0x00000000002D0000-0x0000000000311000-memory.dmp

                                                                      Filesize

                                                                      260KB

                                                                    • memory/844-95-0x0000000002692000-0x0000000002694000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/844-93-0x0000000002690000-0x0000000002692000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/844-92-0x000007FEF5B30000-0x000007FEF64CD000-memory.dmp

                                                                      Filesize

                                                                      9.6MB

                                                                    • memory/844-91-0x000007FEF2B00000-0x000007FEF365D000-memory.dmp

                                                                      Filesize

                                                                      11.4MB

                                                                    • memory/844-94-0x000007FEF5B30000-0x000007FEF64CD000-memory.dmp

                                                                      Filesize

                                                                      9.6MB

                                                                    • memory/844-96-0x0000000002694000-0x0000000002697000-memory.dmp

                                                                      Filesize

                                                                      12KB

                                                                    • memory/844-97-0x000000000269B000-0x00000000026BA000-memory.dmp

                                                                      Filesize

                                                                      124KB

                                                                    • memory/1292-75-0x000007FEF5B30000-0x000007FEF64CD000-memory.dmp

                                                                      Filesize

                                                                      9.6MB

                                                                    • memory/1292-72-0x000007FEF2B00000-0x000007FEF365D000-memory.dmp

                                                                      Filesize

                                                                      11.4MB

                                                                    • memory/1292-110-0x000000001B660000-0x000000001B673000-memory.dmp

                                                                      Filesize

                                                                      76KB

                                                                    • memory/1292-81-0x00000000025BB000-0x00000000025DA000-memory.dmp

                                                                      Filesize

                                                                      124KB

                                                                    • memory/1292-77-0x00000000025B4000-0x00000000025B7000-memory.dmp

                                                                      Filesize

                                                                      12KB

                                                                    • memory/1292-76-0x00000000025B2000-0x00000000025B4000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/1292-71-0x000007FEFC1E1000-0x000007FEFC1E3000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/1292-74-0x00000000025B0000-0x00000000025B2000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/1292-73-0x000007FEF5B30000-0x000007FEF64CD000-memory.dmp

                                                                      Filesize

                                                                      9.6MB

                                                                    • memory/1368-112-0x00000000029B0000-0x00000000029C5000-memory.dmp

                                                                      Filesize

                                                                      84KB

                                                                    • memory/1368-718-0x0000000002990000-0x00000000029A5000-memory.dmp

                                                                      Filesize

                                                                      84KB

                                                                    • memory/1640-80-0x000007FEF2B00000-0x000007FEF365D000-memory.dmp

                                                                      Filesize

                                                                      11.4MB

                                                                    • memory/1640-86-0x0000000002342000-0x0000000002344000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/1640-87-0x0000000002344000-0x0000000002347000-memory.dmp

                                                                      Filesize

                                                                      12KB

                                                                    • memory/1640-82-0x000000001B830000-0x000000001BB2F000-memory.dmp

                                                                      Filesize

                                                                      3.0MB

                                                                    • memory/1640-88-0x000000000234B000-0x000000000236A000-memory.dmp

                                                                      Filesize

                                                                      124KB

                                                                    • memory/1640-85-0x000007FEF5B30000-0x000007FEF64CD000-memory.dmp

                                                                      Filesize

                                                                      9.6MB

                                                                    • memory/1640-83-0x000007FEF5B30000-0x000007FEF64CD000-memory.dmp

                                                                      Filesize

                                                                      9.6MB

                                                                    • memory/1640-84-0x0000000002340000-0x0000000002342000-memory.dmp

                                                                      Filesize

                                                                      8KB