Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24/05/2022, 03:12
Static task
static1
Behavioral task
behavioral1
Sample
35ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
35ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a.exe
Resource
win10v2004-20220414-en
General
-
Target
35ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a.exe
-
Size
168KB
-
MD5
a69ec18cd982181a5fbd2789663a88bf
-
SHA1
7d44fdc6938916a54103169d1de0032ddeab0e35
-
SHA256
35ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a
-
SHA512
f61baf6748f3c7a5da5e46693274e8d748699199c187a3dbb550747832fcade594f618ffbc5cbba5aa3848ec716ec8f2fb8267c8d2b15e9f63687ad1211f6900
Malware Config
Extracted
buer
https://gstatiknetiplist.cc/
https://gstatiknetiplist.com/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\RedTools\\networker.exe\"" networker.exe -
resource yara_rule behavioral1/memory/1708-56-0x0000000000020000-0x000000000002A000-memory.dmp buer behavioral1/memory/1708-57-0x0000000040000000-0x000000004049C000-memory.dmp buer behavioral1/memory/948-65-0x0000000040000000-0x000000004049C000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 948 networker.exe -
Deletes itself 1 IoCs
pid Process 948 networker.exe -
Loads dropped DLL 2 IoCs
pid Process 1708 35ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a.exe 1708 35ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: networker.exe File opened (read-only) \??\O: networker.exe File opened (read-only) \??\Z: networker.exe File opened (read-only) \??\B: networker.exe File opened (read-only) \??\H: networker.exe File opened (read-only) \??\I: networker.exe File opened (read-only) \??\L: networker.exe File opened (read-only) \??\W: networker.exe File opened (read-only) \??\X: networker.exe File opened (read-only) \??\Y: networker.exe File opened (read-only) \??\F: networker.exe File opened (read-only) \??\G: networker.exe File opened (read-only) \??\U: networker.exe File opened (read-only) \??\V: networker.exe File opened (read-only) \??\Q: networker.exe File opened (read-only) \??\R: networker.exe File opened (read-only) \??\S: networker.exe File opened (read-only) \??\T: networker.exe File opened (read-only) \??\N: networker.exe File opened (read-only) \??\P: networker.exe File opened (read-only) \??\A: networker.exe File opened (read-only) \??\E: networker.exe File opened (read-only) \??\J: networker.exe File opened (read-only) \??\K: networker.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1652 1632 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 948 networker.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1708 wrote to memory of 948 1708 35ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a.exe 27 PID 1708 wrote to memory of 948 1708 35ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a.exe 27 PID 1708 wrote to memory of 948 1708 35ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a.exe 27 PID 1708 wrote to memory of 948 1708 35ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a.exe 27 PID 948 wrote to memory of 1632 948 networker.exe 28 PID 948 wrote to memory of 1632 948 networker.exe 28 PID 948 wrote to memory of 1632 948 networker.exe 28 PID 948 wrote to memory of 1632 948 networker.exe 28 PID 948 wrote to memory of 1632 948 networker.exe 28 PID 948 wrote to memory of 1632 948 networker.exe 28 PID 948 wrote to memory of 1632 948 networker.exe 28 PID 948 wrote to memory of 1632 948 networker.exe 28 PID 948 wrote to memory of 1632 948 networker.exe 28 PID 948 wrote to memory of 1632 948 networker.exe 28 PID 948 wrote to memory of 1632 948 networker.exe 28 PID 1632 wrote to memory of 1652 1632 secinit.exe 29 PID 1632 wrote to memory of 1652 1632 secinit.exe 29 PID 1632 wrote to memory of 1652 1632 secinit.exe 29 PID 1632 wrote to memory of 1652 1632 secinit.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\35ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a.exe"C:\Users\Admin\AppData\Local\Temp\35ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\ProgramData\RedTools\networker.exeC:\ProgramData\RedTools\networker.exe "C:\Users\Admin\AppData\Local\Temp\35ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Deletes itself
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\RedTools\networker.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1632 -s 1364⤵
- Program crash
PID:1652
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5a69ec18cd982181a5fbd2789663a88bf
SHA17d44fdc6938916a54103169d1de0032ddeab0e35
SHA25635ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a
SHA512f61baf6748f3c7a5da5e46693274e8d748699199c187a3dbb550747832fcade594f618ffbc5cbba5aa3848ec716ec8f2fb8267c8d2b15e9f63687ad1211f6900
-
Filesize
168KB
MD5a69ec18cd982181a5fbd2789663a88bf
SHA17d44fdc6938916a54103169d1de0032ddeab0e35
SHA25635ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a
SHA512f61baf6748f3c7a5da5e46693274e8d748699199c187a3dbb550747832fcade594f618ffbc5cbba5aa3848ec716ec8f2fb8267c8d2b15e9f63687ad1211f6900
-
Filesize
168KB
MD5a69ec18cd982181a5fbd2789663a88bf
SHA17d44fdc6938916a54103169d1de0032ddeab0e35
SHA25635ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a
SHA512f61baf6748f3c7a5da5e46693274e8d748699199c187a3dbb550747832fcade594f618ffbc5cbba5aa3848ec716ec8f2fb8267c8d2b15e9f63687ad1211f6900
-
Filesize
168KB
MD5a69ec18cd982181a5fbd2789663a88bf
SHA17d44fdc6938916a54103169d1de0032ddeab0e35
SHA25635ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a
SHA512f61baf6748f3c7a5da5e46693274e8d748699199c187a3dbb550747832fcade594f618ffbc5cbba5aa3848ec716ec8f2fb8267c8d2b15e9f63687ad1211f6900