Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    84s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    25/05/2022, 00:36

General

  • Target

    1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe

  • Size

    6.2MB

  • MD5

    0a6c36584f98ec2f98121071477e7702

  • SHA1

    6c839ed190e408f65b3b0c856e5adcb1d305c067

  • SHA256

    1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518

  • SHA512

    1e620fe29a47929c491fbe3003ae0177e4f7ff5b90c5b456f54fd67d17916c8657f80552f7f0acfd333fc0f393555d9202a564edc4f4ed5a2c9282691b414442

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe
    "C:\Users\Admin\AppData\Local\Temp\1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Windows\System64\1systemsmss.exe
      "C:\Windows\System64\1systemsmss.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1532
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\System32\regedit.exe" /s "C:\Windows\Zont911\Regedit.reg"
        3⤵
        • Runs .reg file with regedit
        PID:1724
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Windows\Zont911\Tupe.bat" "
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1208
        • C:\Windows\System64\svnhost.exe
          "C:\Windows\System64\svnhost.exe" /firewall
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1296
        • C:\Windows\System64\svnhost.exe
          "C:\Windows\System64\svnhost.exe" /start
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1456
  • C:\Windows\SysWOW64\chcp.com
    Chcp 1251
    1⤵
      PID:2000
    • C:\Windows\System64\svnhost.exe
      "C:\Windows\System64\svnhost.exe" /silentinstall
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:988
    • C:\Windows\System64\svnhost.exe
      C:\Windows\System64\svnhost.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1364
      • C:\Windows\System64\systemsmss.exe
        C:\Windows\System64\systemsmss.exe /tray
        2⤵
        • Executes dropped EXE
        PID:1992
      • C:\Windows\System64\systemsmss.exe
        C:\Windows\System64\systemsmss.exe
        2⤵
        • Executes dropped EXE
        PID:1768

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\System64\1systemsmss.exe

      Filesize

      3.0MB

      MD5

      55c22619697b70b6633fe93ad0c9b609

      SHA1

      72c6b5851a3353e9b4e9b07aa81140e12deeea3e

      SHA256

      50f6a9a883308cead80229f8c1c668afbdb3b294a1b790666c82e6403a08d7ab

      SHA512

      1c3ae633247b6d7db76dc65b4dab86654fbadacfd16a2be0b97c4da8508952939f0a0c7d4f2c70d66b2f4ca082fbe015bf5c05c78888d2a6562ca4d477c4ae43

    • C:\Windows\System64\1systemsmss.exe

      Filesize

      2.6MB

      MD5

      e27e4c2d690dad995884f1fba64e1a4a

      SHA1

      73e9c94422eb9a977601899c2ca3178f1d2bf5ff

      SHA256

      f06a07ed3e16fb91b7b111890828d30d1824469b30ceb8ebbacc8ddedd3c3e9f

      SHA512

      0fdcc1185370aa4f72b4805dc743796fa96ba8fecd6c04158fb203f16967b7e70184552283535b4e881cb4e2e09809aaf86787a87f1200aa52332edbe756e2a1

    • C:\Windows\System64\svnhost.exe

      Filesize

      3.0MB

      MD5

      96b2e75a641fc1e6a3f5c34291548189

      SHA1

      821eec4f1fe4f7e06b70ef3ab02b9769b0de3d31

      SHA256

      3e905e484d3228dea18a035b1c80c70502a6e4c659e25c8cb3b5ab27ba01238f

      SHA512

      fc682f3d4e3f88d63808f59e16878c1b70be9170d00c87c8badfd11d6cac7d5099e89cc53e314554068ddfb0a5d42e671c479027c4ca7dba917394ba77c65ce8

    • C:\Windows\System64\svnhost.exe

      Filesize

      2.3MB

      MD5

      4120d9c48f492d3389b14133662d285d

      SHA1

      adcea66e623f57e4085d54cc0fc168c7b95fceef

      SHA256

      d71c702b9cabdf41d32b5f584eea2bbf122e3ae0d710b854246018e47f45a8c2

      SHA512

      fb0748bdca0c7c97f248325b09e10922dd147fe522f05c70b8629abbe35f29e6ad49df90f21296390e44a4f53169d8c75a3297e1a24ea4164f9d7c70b55cd83a

    • C:\Windows\System64\svnhost.exe

      Filesize

      2.4MB

      MD5

      26bb460ea99a9cf68e898421175cbb1f

      SHA1

      def0734c36b41dee420587b213fb982f8f3ad18b

      SHA256

      72a1df50a2a4e7093a645357c11035700212ec63011314b852bca12ca547ebbd

      SHA512

      ab5971985a5ec89a87466c7380085097b7760887e708e2795075c1744d43427b91569b5ae648a6c6a984c9d751b58c384bcc0b72969e3878d882282b815591a4

    • C:\Windows\System64\svnhost.exe

      Filesize

      2.7MB

      MD5

      eb40cd8f246fcb5364ddaec4056aab86

      SHA1

      200a2547e104ac81d000d023f2fb3a85b139ae25

      SHA256

      2884ef9230f4c0b70d48c028875556ed1a5bf7c18831debd177087d589603317

      SHA512

      3529340ffe6464831a057ae29ac1be8c9314314829abf624043e79582c82d93c67d2251859a6b52ec9fcc940f877900f12f401ad254ff4c1785dafabf015ae3a

    • C:\Windows\System64\svnhost.exe

      Filesize

      2.4MB

      MD5

      26bb460ea99a9cf68e898421175cbb1f

      SHA1

      def0734c36b41dee420587b213fb982f8f3ad18b

      SHA256

      72a1df50a2a4e7093a645357c11035700212ec63011314b852bca12ca547ebbd

      SHA512

      ab5971985a5ec89a87466c7380085097b7760887e708e2795075c1744d43427b91569b5ae648a6c6a984c9d751b58c384bcc0b72969e3878d882282b815591a4

    • C:\Windows\System64\systemsmss.exe

      Filesize

      2.6MB

      MD5

      780b7ddd071aec9b3a6799d65a0e000e

      SHA1

      be32e523bdc3e2fb70106da0d14dfc80518ed87a

      SHA256

      1c72674e04c346ff936b53fcf1c7b563fcc507486c5349d50863573ca52658ed

      SHA512

      9b7f58fe31fecc3c1e6d1954149e38fae0a10ee0bbef09c8dc208eda64c07c7e5363c577ed4f262fe60fa26780bf3c550e986a4cea17fb335469c7895a2f90a0

    • C:\Windows\System64\systemsmss.exe

      Filesize

      2.4MB

      MD5

      3cb0dd71720bac9bf6c88bd931ae7833

      SHA1

      1ae719c4a982822f2ae6a36c90fbb66b731af042

      SHA256

      5dcbbf8699d03ef7833a92f5b29e59eb2b9beaa351e31dd5c3fb18b75fe61f56

      SHA512

      fbd04aa41019967e74f071f391a025a35a89c93697460daa1aed52f8aa5e9d2cc79c33e62a6cec01f1f951df3536321adf8118fbc8b96e2e72cd81a121773144

    • C:\Windows\System64\systemsmss.exe

      Filesize

      2.4MB

      MD5

      1ef55065139dca2a3800765979efb9e7

      SHA1

      da4b5a18275064f199e5b64f63ac817498aa1015

      SHA256

      a2be45665684a6ecef5e01f420db2a870e31ecdc277cfa18294ec626e1c134c2

      SHA512

      d907fa51b4caa89a2605ed899f8d93a422c082aa361ea78ba9f1846720117bf7db055f112d3f1321b8ede64290fd4999f68b26754e3a1d3833db921b48b82b1a

    • C:\Windows\System64\vp8decoder.dll

      Filesize

      378KB

      MD5

      d43fa82fab5337ce20ad14650085c5d9

      SHA1

      678aa092075ff65b6815ffc2d8fdc23af8425981

      SHA256

      c022958429edd94bfe31f2eacfe24ff6b45d6f12747725c449a36116373de03b

      SHA512

      103e61a9f58df03316676a074487e50ec518479c11068df3736df139b85c7671048c65bce0ef2c55b3c50c61fde54e9e6c7d1b795aea71263ae94c91d4874e0d

    • C:\Windows\System64\vp8encoder.dll

      Filesize

      1.6MB

      MD5

      dab4646806dfca6d0e0b4d80fa9209d6

      SHA1

      8244dfe22ec2090eee89dad103e6b2002059d16a

      SHA256

      cb6ef96d3a66ef08ec2c8640b751a52d6d4f4530cf01162a69966f0fd5153587

      SHA512

      aa5eb93bf23a10de797d6fb52a55a95d36bc48927c76fedd81e0c48872745cb7f7d1b3f230eaae42fd4e79b6a59ca707e56bd6963b03644cbd5984f11e98d6e7

    • C:\Windows\Zont911\Regedit.reg

      Filesize

      11KB

      MD5

      ce871700179dfc5638b9bcd2052a9e11

      SHA1

      31318891734c352a94e3e4b616fce40d29dd28e3

      SHA256

      3ef1ec65cf389b0e33c693c2f8a07ba479a5b0d9f9e281c42e6acc561f798061

      SHA512

      fbbcf4de0d77483d5ea9a74590373fcc53f2ea15b3f81cb38d353ae0c4f2c42b9e53e65da77a64c521a50c3478f5b8533e5153230299ac2f644924662cabb715

    • C:\Windows\Zont911\Tupe.bat

      Filesize

      281B

      MD5

      691f040de6d335962416b319dcd416dc

      SHA1

      db49109c0917910f7fce8b6de690a1c7e2026226

      SHA256

      605d0b9c2fd1972c4ee60d8eefd336be636884dcdf54a4e5f2829c46e80fdcea

      SHA512

      f34ba36bdeaa43a1265ec69acfa0f199f2b4d5d90b4ea890327478f4f48ec7597d660b922dd1e149de3a1ff9b48c79e4c9c53e8a482b4cb5842bc0976f93bf89

    • \Windows\System64\1systemsmss.exe

      Filesize

      2.4MB

      MD5

      7d0eaf62e06e5a388d740bd30d297ea3

      SHA1

      0f7b9e17bc4e96b387074257ba216f6d92e60f2a

      SHA256

      8f159842b5c1640555f1d75dc4ffd86934a3845d7e0faaa76f68d905b607dc8b

      SHA512

      a81d207bd70dba0454717d6c322296899b49072fc027337a98e40ab446f8f2be98c378564b900eb498608b8c5623adc8cd60aca5a2af41c9131b83994cf623ac

    • \Windows\System64\1systemsmss.exe

      Filesize

      2.7MB

      MD5

      670266316a8618ba97874c1b6e6c0278

      SHA1

      d661766be3be8988648497b22e2b75ec30fc537e

      SHA256

      7a95bcbca367e39f7905ecee515729cddf3358fc87b6e09988e46af03ab73f2e

      SHA512

      1554af535fb2b9c703e22d33b64c5077c673f8689e9da0dd1bb581229fef0c48503b1785be7e4023650bffa24af8332542a885c0f13abd99caeafab7a528de7f

    • \Windows\System64\1systemsmss.exe

      Filesize

      2.6MB

      MD5

      948db41c9c1cb22f69578f20c352368e

      SHA1

      428aa0966098ee2dffd30106b2e59656c9510024

      SHA256

      e7cfffb6ba757bf87bd229c071fdc30f5643046bf7062dc959347edbc00e6275

      SHA512

      b60a88d7ea5e154c912f27a91e9d1836451fa30ea1b72548c78ce7b32db92eee51f8e64a67c870b9f17a941cec22e4329861db27733ececc972d52588add5aa9

    • \Windows\System64\svnhost.exe

      Filesize

      2.6MB

      MD5

      cabbf7f69f09e1dfad590e4fee4feca4

      SHA1

      0564beca21e88bc389c33a6c44c426f4f0c939ff

      SHA256

      0013b2d16d2345a0edd24f89905df70514e75c9e212cc1ecab3d999c64681eb2

      SHA512

      b4fbfe315c54dd824ae74a0cf4341dbcb706f34f71d821e8dcc8b9a6c673e548291a09615807f595f89ead5fef4a8b249424622f0f3316b4e6c2060c2df55186

    • \Windows\System64\systemsmss.exe

      Filesize

      2.4MB

      MD5

      9c7e5d1d811ff90cc0025f2c477bb31f

      SHA1

      03e9d9161caa97d2444601d2914c89e32cd23626

      SHA256

      2bab4c7ae161758b4acba6efe4f6085936408b4916850139765c8d683f05e9b0

      SHA512

      089943e06dd8817b6a75f85b6993e7f701a83ba3fa81db0020398d4569b50de145b845089bb8f9a8225fa292aacc3c6d3269d706f3f22de97e95be40f2b24b53

    • \Windows\System64\systemsmss.exe

      Filesize

      2.9MB

      MD5

      e6926ab1e4b5e16d7b174783b8cd2e72

      SHA1

      d6b3b1ec7b321bfbee8b87582a1a2a418e4fb63b

      SHA256

      f86ea3b8c45be890cf587001c7fd27a1c6d071fa04e86fdccf5a7761eb878dce

      SHA512

      63f8de4cf79bf1f085c695c03b74cd2128bc707780407f3471b121281facec9d59488a3dc06198b3ba7a44b3fcc47d8a30cb6518f6b62266739b7d351fdb0d58

    • memory/1984-54-0x0000000075BF1000-0x0000000075BF3000-memory.dmp

      Filesize

      8KB