Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    47s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    24/05/2022, 14:23

General

  • Target

    cb2a2be7c24e35bafb85bcdb05e19c108452630f54719e2134339df59e9aa060.exe

  • Size

    6.2MB

  • MD5

    538113e9711446351217d1d2b93b1885

  • SHA1

    6fc25abd2a7e1e15113eea2105349065681b1c27

  • SHA256

    cb2a2be7c24e35bafb85bcdb05e19c108452630f54719e2134339df59e9aa060

  • SHA512

    c3e20b52373785549dfa269b692fa007aa0cede221e95f705b33d4a36a54e6cbfdf3c1831c11e2c3035aab7f171e152e6a14cc0913916965f8e12a789ffdf49f

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Executes dropped EXE 5 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb2a2be7c24e35bafb85bcdb05e19c108452630f54719e2134339df59e9aa060.exe
    "C:\Users\Admin\AppData\Local\Temp\cb2a2be7c24e35bafb85bcdb05e19c108452630f54719e2134339df59e9aa060.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Windows\System64\1systemsmss.exe
      "C:\Windows\System64\1systemsmss.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2116
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s "C:\Windows\Zont911\Regedit.reg"
        3⤵
        • Runs .reg file with regedit
        PID:4400
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Windows\Zont911\Tupe.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1440
  • C:\Windows\SysWOW64\chcp.com
    Chcp 1251
    1⤵
      PID:1720
    • C:\Windows\System64\svnhost.exe
      "C:\Windows\System64\svnhost.exe" /silentinstall
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4356
    • C:\Windows\System64\svnhost.exe
      "C:\Windows\System64\svnhost.exe" /firewall
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2832
    • C:\Windows\System64\svnhost.exe
      C:\Windows\System64\svnhost.exe
      1⤵
      • Executes dropped EXE
      PID:5092
      • C:\Windows\System64\systemsmss.exe
        C:\Windows\System64\systemsmss.exe /tray
        2⤵
          PID:3124
        • C:\Windows\System64\systemsmss.exe
          C:\Windows\System64\systemsmss.exe
          2⤵
            PID:212
        • C:\Windows\System64\svnhost.exe
          "C:\Windows\System64\svnhost.exe" /start
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1176

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads