Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/09/2022, 21:47
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.CrypterX-gen.exe
Resource
win7-20220812-en
General
-
Target
SecuriteInfo.com.Win32.CrypterX-gen.exe
-
Size
564KB
-
MD5
d2511f548930bc0a616afb4bf2f5eb59
-
SHA1
dfd9d5479816b67c213fa35f87280c192d1a20a1
-
SHA256
d867f1bbf4a3d8e8de9ce9c75d7d1690a9ab15ba919ed0d01f6bc66683e074c4
-
SHA512
e9922aefdd68bfbb1773ccf75f2412af987e67570d876bfd99aee5fd46c616a430fe8ec9fc1917a797ca3d433d94cc81e87ca5fe8eea38638361b4bbacd6651e
-
SSDEEP
12288:g8l02b1zzUFFiRUUWgSXGjITqZfs+Bog:blfzzUFAKDlW8Tqf
Malware Config
Extracted
nanocore
1.2.2.0
brewsterchristophe.ddns.net:5899
194,147,5,75:5899
b8aebc29-8c64-444f-99e6-dc4122e9bbfc
-
activate_away_mode
true
-
backup_connection_host
194,147,5,75
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2022-04-29T03:26:40.572298236Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTE2Ij8+DQo8VGFzayB2ZXJzaW9uPSIxLjIiIHhtbG5zPSJodHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL3dpbmRvd3MvMjAwNC8wMi9taXQvdGFzayI+DQogIDxSZWdpc3RyYXRpb25JbmZvIC8+DQogIDxUcmlnZ2VycyAvPg0KICA8UHJpbmNpcGFscz4NCiAgICA8UHJpbmNpcGFsIGlkPSJBdXRob3IiPg0KICAgICAgPExvZ29uVHlwZT5JbnRlcmFjdGl2ZVRva2VuPC9Mb2dvblR5cGU+DQogICAgICA8UnVuTGV2ZWw+SGlnaGVzdEF2YWlsYWJsZTwvUnVuTGV2ZWw+DQogICAgPC9QcmluY2lwYWw+DQogIDwvUHJpbmNpcGFscz4NCiAgPFNldHRpbmdzPg0KICAgIDxNdWx0aXBsZUluc3RhbmNlc1BvbGljeT5QYXJhbGxlbDwvTXVsdGlwbGVJbnN0YW5jZXNQb2xpY3k+DQogICAgPERpc2FsbG93U3RhcnRJZk9uQmF0dGVyaWVzPmZhbHNlPC9EaXNhbGxvd1N0YXJ0SWZPbkJhdHRlcmllcz4NCiAgICA8U3RvcElmR29pbmdPbkJhdHRlcmllcz5mYWxzZTwvU3RvcElmR29pbmdPbkJhdHRlcmllcz4NCiAgICA8QWxsb3dIYXJkVGVybWluYXRlPnRydWU8L0FsbG93SGFyZFRlcm1pbmF0ZT4NCiAgICA8U3RhcnRXaGVuQXZhaWxhYmxlPmZhbHNlPC9TdGFydFdoZW5BdmFpbGFibGU+DQogICAgPFJ1bk9ubHlJZk5ldHdvcmtBdmFpbGFibGU+ZmFsc2U8L1J1bk9ubHlJZk5ldHdvcmtBdmFpbGFibGU+DQogICAgPElkbGVTZXR0aW5ncz4NCiAgICAgIDxTdG9wT25JZGxlRW5kPmZhbHNlPC9TdG9wT25JZGxlRW5kPg0KICAgICAgPFJlc3RhcnRPbklkbGU+ZmFsc2U8L1Jlc3RhcnRPbklkbGU+DQogICAgPC9JZGxlU2V0dGluZ3M+DQogICAgPEFsbG93U3RhcnRPbkRlbWFuZD50cnVlPC9BbGxvd1N0YXJ0T25EZW1hbmQ+DQogICAgPEVuYWJsZWQ+dHJ1ZTwvRW5hYmxlZD4NCiAgICA8SGlkZGVuPmZhbHNlPC9IaWRkZW4+DQogICAgPFJ1bk9ubHlJZklkbGU+ZmFsc2U8L1J1bk9ubHlJZklkbGU+DQogICAgPFdha2VUb1J1bj5mYWxzZTwvV2FrZVRvUnVuPg0KICAgIDxFeGVjdXRpb25UaW1lTGltaXQ+UFQwUzwvRXhlY3V0aW9uVGltZUxpbWl0Pg0KICAgIDxQcmlvcml0eT40PC9Qcmlvcml0eT4NCiAgPC9TZXR0aW5ncz4NCiAgPEFjdGlvbnMgQ29udGV4dD0iQXV0aG9yIj4NCiAgICA8RXhlYz4NCiAgICAgIDxDb21tYW5kPiIjRVhFQ1VUQUJMRVBBVEgiPC9Db21tYW5kPg0KICAgICAgPEFyZ3VtZW50cz4kKEFyZzApPC9Bcmd1bWVudHM+DQogICAgPC9FeGVjPg0KICA8L0FjdGlvbnM+DQo8L1Rhc2s+
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
5899
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
b8aebc29-8c64-444f-99e6-dc4122e9bbfc
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
brewsterchristophe.ddns.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1556 Bin.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\UDP Service = "C:\\Program Files (x86)\\UDP Service\\udpsv.exe" RegAsm.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Bin = "C:\\Users\\Admin\\Desktop\\Bin.exe" reg.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1556 set thread context of 1160 1556 Bin.exe 36 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\UDP Service\udpsv.exe RegAsm.exe File opened for modification C:\Program Files (x86)\UDP Service\udpsv.exe RegAsm.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1200 schtasks.exe 364 schtasks.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 456 PING.EXE 1012 PING.EXE 1192 PING.EXE -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 896 SecuriteInfo.com.Win32.CrypterX-gen.exe 896 SecuriteInfo.com.Win32.CrypterX-gen.exe 896 SecuriteInfo.com.Win32.CrypterX-gen.exe 1556 Bin.exe 1556 Bin.exe 1160 RegAsm.exe 1160 RegAsm.exe 1160 RegAsm.exe 1160 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 896 SecuriteInfo.com.Win32.CrypterX-gen.exe Token: SeDebugPrivilege 1556 Bin.exe Token: SeDebugPrivilege 1160 RegAsm.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 896 wrote to memory of 904 896 SecuriteInfo.com.Win32.CrypterX-gen.exe 26 PID 896 wrote to memory of 904 896 SecuriteInfo.com.Win32.CrypterX-gen.exe 26 PID 896 wrote to memory of 904 896 SecuriteInfo.com.Win32.CrypterX-gen.exe 26 PID 896 wrote to memory of 904 896 SecuriteInfo.com.Win32.CrypterX-gen.exe 26 PID 904 wrote to memory of 456 904 cmd.exe 28 PID 904 wrote to memory of 456 904 cmd.exe 28 PID 904 wrote to memory of 456 904 cmd.exe 28 PID 904 wrote to memory of 456 904 cmd.exe 28 PID 896 wrote to memory of 1188 896 SecuriteInfo.com.Win32.CrypterX-gen.exe 29 PID 896 wrote to memory of 1188 896 SecuriteInfo.com.Win32.CrypterX-gen.exe 29 PID 896 wrote to memory of 1188 896 SecuriteInfo.com.Win32.CrypterX-gen.exe 29 PID 896 wrote to memory of 1188 896 SecuriteInfo.com.Win32.CrypterX-gen.exe 29 PID 1188 wrote to memory of 1012 1188 cmd.exe 31 PID 1188 wrote to memory of 1012 1188 cmd.exe 31 PID 1188 wrote to memory of 1012 1188 cmd.exe 31 PID 1188 wrote to memory of 1012 1188 cmd.exe 31 PID 904 wrote to memory of 1812 904 cmd.exe 32 PID 904 wrote to memory of 1812 904 cmd.exe 32 PID 904 wrote to memory of 1812 904 cmd.exe 32 PID 904 wrote to memory of 1812 904 cmd.exe 32 PID 1188 wrote to memory of 1192 1188 cmd.exe 33 PID 1188 wrote to memory of 1192 1188 cmd.exe 33 PID 1188 wrote to memory of 1192 1188 cmd.exe 33 PID 1188 wrote to memory of 1192 1188 cmd.exe 33 PID 1188 wrote to memory of 1556 1188 cmd.exe 35 PID 1188 wrote to memory of 1556 1188 cmd.exe 35 PID 1188 wrote to memory of 1556 1188 cmd.exe 35 PID 1188 wrote to memory of 1556 1188 cmd.exe 35 PID 1556 wrote to memory of 1160 1556 Bin.exe 36 PID 1556 wrote to memory of 1160 1556 Bin.exe 36 PID 1556 wrote to memory of 1160 1556 Bin.exe 36 PID 1556 wrote to memory of 1160 1556 Bin.exe 36 PID 1556 wrote to memory of 1160 1556 Bin.exe 36 PID 1556 wrote to memory of 1160 1556 Bin.exe 36 PID 1556 wrote to memory of 1160 1556 Bin.exe 36 PID 1556 wrote to memory of 1160 1556 Bin.exe 36 PID 1556 wrote to memory of 1160 1556 Bin.exe 36 PID 1556 wrote to memory of 1160 1556 Bin.exe 36 PID 1556 wrote to memory of 1160 1556 Bin.exe 36 PID 1556 wrote to memory of 1160 1556 Bin.exe 36 PID 1160 wrote to memory of 1200 1160 RegAsm.exe 37 PID 1160 wrote to memory of 1200 1160 RegAsm.exe 37 PID 1160 wrote to memory of 1200 1160 RegAsm.exe 37 PID 1160 wrote to memory of 1200 1160 RegAsm.exe 37 PID 1160 wrote to memory of 364 1160 RegAsm.exe 39 PID 1160 wrote to memory of 364 1160 RegAsm.exe 39 PID 1160 wrote to memory of 364 1160 RegAsm.exe 39 PID 1160 wrote to memory of 364 1160 RegAsm.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.CrypterX-gen.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.CrypterX-gen.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 14 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Bin" /t REG_SZ /d "C:\Users\Admin\Desktop\Bin.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 143⤵
- Runs ping.exe
PID:456
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Bin" /t REG_SZ /d "C:\Users\Admin\Desktop\Bin.exe"3⤵
- Adds Run key to start application
PID:1812
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 19 > nul && copy "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.CrypterX-gen.exe" "C:\Users\Admin\Desktop\Bin.exe" && ping 127.0.0.1 -n 19 > nul && "C:\Users\Admin\Desktop\Bin.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 193⤵
- Runs ping.exe
PID:1012
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 193⤵
- Runs ping.exe
PID:1192
-
-
C:\Users\Admin\Desktop\Bin.exe"C:\Users\Admin\Desktop\Bin.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "UDP Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp6F57.tmp"5⤵
- Creates scheduled task(s)
PID:1200
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "UDP Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp70AF.tmp"5⤵
- Creates scheduled task(s)
PID:364
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD548ef7fa9033389ad7929d7a6b9d10298
SHA19db6cb7325c8bdf66a15f7b5f34703709a45aeb6
SHA2560c1b5f67eeb276d1d4205b138ce32bc6149924e02281a2db8e4623a700e88f15
SHA512ac8bd104ecbacc9bccce9e087f67e5b18072d59367ccd31d4e66132b6baaea520cba5b9b59464483d86abf74826b382c402f12e9a586c99bda8c78a0de33944e
-
Filesize
1KB
MD50a24db62cb5b84309c4803346caaa25d
SHA167660778f61bb44168c33ed3fe56ed86cf9583e8
SHA25638d38647af394a04ee6add9f05c43244f04e64a6b96257f4b241a5038efa82df
SHA512d25d9df063f44595d5e0bf890755bd387655131ff369eeedf3d11ffcc6202ca4455bbb33a8a926dd06839cbd1ddec3d06809b3c66a82c6518aa14beaa469a548
-
Filesize
564KB
MD5d2511f548930bc0a616afb4bf2f5eb59
SHA1dfd9d5479816b67c213fa35f87280c192d1a20a1
SHA256d867f1bbf4a3d8e8de9ce9c75d7d1690a9ab15ba919ed0d01f6bc66683e074c4
SHA512e9922aefdd68bfbb1773ccf75f2412af987e67570d876bfd99aee5fd46c616a430fe8ec9fc1917a797ca3d433d94cc81e87ca5fe8eea38638361b4bbacd6651e
-
Filesize
564KB
MD5d2511f548930bc0a616afb4bf2f5eb59
SHA1dfd9d5479816b67c213fa35f87280c192d1a20a1
SHA256d867f1bbf4a3d8e8de9ce9c75d7d1690a9ab15ba919ed0d01f6bc66683e074c4
SHA512e9922aefdd68bfbb1773ccf75f2412af987e67570d876bfd99aee5fd46c616a430fe8ec9fc1917a797ca3d433d94cc81e87ca5fe8eea38638361b4bbacd6651e