Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
87s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2022, 21:47
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.CrypterX-gen.exe
Resource
win7-20220812-en
General
-
Target
SecuriteInfo.com.Win32.CrypterX-gen.exe
-
Size
564KB
-
MD5
d2511f548930bc0a616afb4bf2f5eb59
-
SHA1
dfd9d5479816b67c213fa35f87280c192d1a20a1
-
SHA256
d867f1bbf4a3d8e8de9ce9c75d7d1690a9ab15ba919ed0d01f6bc66683e074c4
-
SHA512
e9922aefdd68bfbb1773ccf75f2412af987e67570d876bfd99aee5fd46c616a430fe8ec9fc1917a797ca3d433d94cc81e87ca5fe8eea38638361b4bbacd6651e
-
SSDEEP
12288:g8l02b1zzUFFiRUUWgSXGjITqZfs+Bog:blfzzUFAKDlW8Tqf
Malware Config
Extracted
nanocore
1.2.2.0
brewsterchristophe.ddns.net:5899
194,147,5,75:5899
b8aebc29-8c64-444f-99e6-dc4122e9bbfc
-
activate_away_mode
true
-
backup_connection_host
194,147,5,75
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2022-04-29T03:26:40.572298236Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
5899
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
b8aebc29-8c64-444f-99e6-dc4122e9bbfc
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
brewsterchristophe.ddns.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4860 Bin.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bin = "C:\\Users\\Admin\\Desktop\\Bin.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DDP Host = "C:\\Program Files (x86)\\DDP Host\\ddphost.exe" RegAsm.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4860 set thread context of 1448 4860 Bin.exe 109 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\DDP Host\ddphost.exe RegAsm.exe File created C:\Program Files (x86)\DDP Host\ddphost.exe RegAsm.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3952 schtasks.exe 4540 schtasks.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 1488 PING.EXE 3528 PING.EXE 3676 PING.EXE -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 4860 Bin.exe 4860 Bin.exe 1448 RegAsm.exe 1448 RegAsm.exe 1448 RegAsm.exe 1448 RegAsm.exe 1448 RegAsm.exe 1448 RegAsm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1448 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe Token: SeDebugPrivilege 4860 Bin.exe Token: SeDebugPrivilege 1448 RegAsm.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1572 wrote to memory of 112 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 87 PID 1572 wrote to memory of 112 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 87 PID 1572 wrote to memory of 112 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 87 PID 112 wrote to memory of 1488 112 cmd.exe 89 PID 112 wrote to memory of 1488 112 cmd.exe 89 PID 112 wrote to memory of 1488 112 cmd.exe 89 PID 1572 wrote to memory of 4764 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 92 PID 1572 wrote to memory of 4764 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 92 PID 1572 wrote to memory of 4764 1572 SecuriteInfo.com.Win32.CrypterX-gen.exe 92 PID 4764 wrote to memory of 3528 4764 cmd.exe 94 PID 4764 wrote to memory of 3528 4764 cmd.exe 94 PID 4764 wrote to memory of 3528 4764 cmd.exe 94 PID 112 wrote to memory of 1520 112 cmd.exe 97 PID 112 wrote to memory of 1520 112 cmd.exe 97 PID 112 wrote to memory of 1520 112 cmd.exe 97 PID 4764 wrote to memory of 3676 4764 cmd.exe 98 PID 4764 wrote to memory of 3676 4764 cmd.exe 98 PID 4764 wrote to memory of 3676 4764 cmd.exe 98 PID 4764 wrote to memory of 4860 4764 cmd.exe 108 PID 4764 wrote to memory of 4860 4764 cmd.exe 108 PID 4764 wrote to memory of 4860 4764 cmd.exe 108 PID 4860 wrote to memory of 1448 4860 Bin.exe 109 PID 4860 wrote to memory of 1448 4860 Bin.exe 109 PID 4860 wrote to memory of 1448 4860 Bin.exe 109 PID 4860 wrote to memory of 1448 4860 Bin.exe 109 PID 4860 wrote to memory of 1448 4860 Bin.exe 109 PID 4860 wrote to memory of 1448 4860 Bin.exe 109 PID 4860 wrote to memory of 1448 4860 Bin.exe 109 PID 4860 wrote to memory of 1448 4860 Bin.exe 109 PID 1448 wrote to memory of 3952 1448 RegAsm.exe 111 PID 1448 wrote to memory of 3952 1448 RegAsm.exe 111 PID 1448 wrote to memory of 3952 1448 RegAsm.exe 111 PID 1448 wrote to memory of 4540 1448 RegAsm.exe 113 PID 1448 wrote to memory of 4540 1448 RegAsm.exe 113 PID 1448 wrote to memory of 4540 1448 RegAsm.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.CrypterX-gen.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.CrypterX-gen.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 13 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Bin" /t REG_SZ /d "C:\Users\Admin\Desktop\Bin.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 133⤵
- Runs ping.exe
PID:1488
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Bin" /t REG_SZ /d "C:\Users\Admin\Desktop\Bin.exe"3⤵
- Adds Run key to start application
PID:1520
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 18 > nul && copy "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.CrypterX-gen.exe" "C:\Users\Admin\Desktop\Bin.exe" && ping 127.0.0.1 -n 18 > nul && "C:\Users\Admin\Desktop\Bin.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 183⤵
- Runs ping.exe
PID:3528
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 183⤵
- Runs ping.exe
PID:3676
-
-
C:\Users\Admin\Desktop\Bin.exe"C:\Users\Admin\Desktop\Bin.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DDP Host" /xml "C:\Users\Admin\AppData\Local\Temp\tmpD1C7.tmp"5⤵
- Creates scheduled task(s)
PID:3952
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DDP Host Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpD2D2.tmp"5⤵
- Creates scheduled task(s)
PID:4540
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD548ef7fa9033389ad7929d7a6b9d10298
SHA19db6cb7325c8bdf66a15f7b5f34703709a45aeb6
SHA2560c1b5f67eeb276d1d4205b138ce32bc6149924e02281a2db8e4623a700e88f15
SHA512ac8bd104ecbacc9bccce9e087f67e5b18072d59367ccd31d4e66132b6baaea520cba5b9b59464483d86abf74826b382c402f12e9a586c99bda8c78a0de33944e
-
Filesize
1KB
MD52271642ca970891700e3f48439739ed8
SHA1cd472df2349f7db9e1e460d0ee28acd97b8a8793
SHA2567aba66abbcb0b13455609174db23aed495a9adbef0e0acd28baa9c92445eda68
SHA5124669a4ef8ec28cdb852ffc1401576b1bf9a9d837797d7d92bc88c18b3097404f36854e50167b309706fef400cabc43c876569ce2797ba85eb169a2783b8fe807
-
Filesize
564KB
MD5d2511f548930bc0a616afb4bf2f5eb59
SHA1dfd9d5479816b67c213fa35f87280c192d1a20a1
SHA256d867f1bbf4a3d8e8de9ce9c75d7d1690a9ab15ba919ed0d01f6bc66683e074c4
SHA512e9922aefdd68bfbb1773ccf75f2412af987e67570d876bfd99aee5fd46c616a430fe8ec9fc1917a797ca3d433d94cc81e87ca5fe8eea38638361b4bbacd6651e
-
Filesize
564KB
MD5d2511f548930bc0a616afb4bf2f5eb59
SHA1dfd9d5479816b67c213fa35f87280c192d1a20a1
SHA256d867f1bbf4a3d8e8de9ce9c75d7d1690a9ab15ba919ed0d01f6bc66683e074c4
SHA512e9922aefdd68bfbb1773ccf75f2412af987e67570d876bfd99aee5fd46c616a430fe8ec9fc1917a797ca3d433d94cc81e87ca5fe8eea38638361b4bbacd6651e