Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
HRSword-ma...rv.exe
windows7-x64
HRSword-ma...rv.exe
windows10-2004-x64
HRSword-ma...10.exe
windows7-x64
HRSword-ma...10.exe
windows10-2004-x64
HRSword-ma...ag.exe
windows7-x64
HRSword-ma...ag.exe
windows10-2004-x64
HRSword-ma...10.exe
windows7-x64
HRSword-ma...10.exe
windows10-2004-x64
HRSword-ma...ag.exe
windows7-x64
1HRSword-ma...ag.exe
windows10-2004-x64
1HRSword-ma...ib.dll
windows7-x64
3HRSword-ma...ib.dll
windows10-2004-x64
3HRSword-ma...rd.exe
windows7-x64
1HRSword-ma...rd.exe
windows10-2004-x64
1HRSword-ma...or.dll
windows7-x64
1HRSword-ma...or.dll
windows10-2004-x64
1HRSword-ma...on.dll
windows7-x64
3HRSword-ma...on.dll
windows10-2004-x64
3HRSword-ma...cs.dll
windows7-x64
1HRSword-ma...cs.dll
windows10-2004-x64
1HRSword-ma...se.dll
windows7-x64
1HRSword-ma...se.dll
windows10-2004-x64
1HRSword-ma...ot.dll
windows7-x64
1HRSword-ma...ot.dll
windows10-2004-x64
1HRSword-ma...on.dll
windows7-x64
1HRSword-ma...on.dll
windows10-2004-x64
1HRSword-ma...ag.dll
windows7-x64
1HRSword-ma...ag.dll
windows10-2004-x64
1HRSword-ma...��.bat
windows7-x64
8HRSword-ma...��.bat
windows10-2004-x64
8HRSword-ma...��.bat
windows7-x64
8HRSword-ma...��.bat
windows10-2004-x64
8Analysis
-
max time kernel
161s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 07:32
Static task
static1
Behavioral task
behavioral1
Sample
HRSword-main/Drivers/hrwfpdrv.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
HRSword-main/Drivers/hrwfpdrv.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
HRSword-main/Drivers/hrwfpdrv_win10.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
HRSword-main/Drivers/hrwfpdrv_win10.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
HRSword-main/Drivers/sysdiag.exe
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
HRSword-main/Drivers/sysdiag.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
HRSword-main/Drivers/sysdiag_win10.exe
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
HRSword-main/Drivers/sysdiag_win10.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral9
Sample
HRSword-main/Drivers/usysdiag.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
HRSword-main/Drivers/usysdiag.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
HRSword-main/DuiLib.dll
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
HRSword-main/DuiLib.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
HRSword-main/HRSword.exe
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
HRSword-main/HRSword.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral15
Sample
HRSword-main/behavior.dll
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
HRSword-main/behavior.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
HRSword-main/daemon.dll
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
HRSword-main/daemon.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
HRSword-main/libcodecs.dll
Resource
win7-20220901-en
Behavioral task
behavioral20
Sample
HRSword-main/libcodecs.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
HRSword-main/libxsse.dll
Resource
win7-20220901-en
Behavioral task
behavioral22
Sample
HRSword-main/libxsse.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral23
Sample
HRSword-main/selfprot.dll
Resource
win7-20220901-en
Behavioral task
behavioral24
Sample
HRSword-main/selfprot.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral25
Sample
HRSword-main/uactmon.dll
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
HRSword-main/uactmon.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral27
Sample
HRSword-main/usysdiag.dll
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
HRSword-main/usysdiag.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral29
Sample
HRSword-main/win10初始化.bat
Resource
win7-20220812-en
Behavioral task
behavioral30
Sample
HRSword-main/win10初始化.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
HRSword-main/win7初始化.bat
Resource
win7-20220812-en
Behavioral task
behavioral32
Sample
HRSword-main/win7初始化.bat
Resource
win10v2004-20220812-en
General
-
Target
HRSword-main/win10初始化.bat
-
Size
1KB
-
MD5
5b53acdf4ec5d7362e3c5f355cfde55f
-
SHA1
8f4af3169478d310f4329b6198833685f08625cf
-
SHA256
55d308565b647c2633c34b57eee58294579ee029949023a454171bb5e65668ba
-
SHA512
c1cb9bcfa382774f071c7cd3aaecbc84ea7725c324f66f748ad9ca26e5f7cef02c7311edd043a897a4a66cd7874e725fd7975e1e1e9b475e2efc28648c3a2211
Malware Config
Signatures
-
Creates new service(s) 1 TTPs
-
Drops file in Drivers directory 4 IoCs
description ioc Process File created C:\Windows\System32\drivers\sysdiag_win10.sys cmd.exe File opened for modification C:\Windows\System32\drivers\sysdiag_win10.sys cmd.exe File created C:\Windows\System32\drivers\hrwfpdrv_win10.sys cmd.exe File opened for modification C:\Windows\System32\drivers\hrwfpdrv_win10.sys cmd.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\sysdiag\ImagePath = "system32\\DRIVERS\\sysdiag_win10.sys" reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\hrwfpdr\ImagePath = "system32\\DRIVERS\\hrwfpdrv_win10.sys" reg.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5056 sc.exe 112 sc.exe 2488 sc.exe 2356 sc.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 4532 wrote to memory of 5064 4532 cmd.exe 84 PID 4532 wrote to memory of 5064 4532 cmd.exe 84 PID 4532 wrote to memory of 3892 4532 cmd.exe 86 PID 4532 wrote to memory of 3892 4532 cmd.exe 86 PID 4532 wrote to memory of 2972 4532 cmd.exe 87 PID 4532 wrote to memory of 2972 4532 cmd.exe 87 PID 4532 wrote to memory of 1584 4532 cmd.exe 88 PID 4532 wrote to memory of 1584 4532 cmd.exe 88 PID 4532 wrote to memory of 1356 4532 cmd.exe 89 PID 4532 wrote to memory of 1356 4532 cmd.exe 89 PID 4532 wrote to memory of 4248 4532 cmd.exe 90 PID 4532 wrote to memory of 4248 4532 cmd.exe 90 PID 4532 wrote to memory of 3296 4532 cmd.exe 91 PID 4532 wrote to memory of 3296 4532 cmd.exe 91 PID 4532 wrote to memory of 5056 4532 cmd.exe 92 PID 4532 wrote to memory of 5056 4532 cmd.exe 92 PID 4532 wrote to memory of 112 4532 cmd.exe 93 PID 4532 wrote to memory of 112 4532 cmd.exe 93 PID 4532 wrote to memory of 228 4532 cmd.exe 94 PID 4532 wrote to memory of 228 4532 cmd.exe 94 PID 4532 wrote to memory of 5000 4532 cmd.exe 95 PID 4532 wrote to memory of 5000 4532 cmd.exe 95 PID 4532 wrote to memory of 1444 4532 cmd.exe 96 PID 4532 wrote to memory of 1444 4532 cmd.exe 96 PID 4532 wrote to memory of 3108 4532 cmd.exe 97 PID 4532 wrote to memory of 3108 4532 cmd.exe 97 PID 4532 wrote to memory of 3176 4532 cmd.exe 98 PID 4532 wrote to memory of 3176 4532 cmd.exe 98 PID 4532 wrote to memory of 4660 4532 cmd.exe 99 PID 4532 wrote to memory of 4660 4532 cmd.exe 99 PID 4532 wrote to memory of 3052 4532 cmd.exe 100 PID 4532 wrote to memory of 3052 4532 cmd.exe 100 PID 4532 wrote to memory of 3340 4532 cmd.exe 101 PID 4532 wrote to memory of 3340 4532 cmd.exe 101 PID 4532 wrote to memory of 2488 4532 cmd.exe 102 PID 4532 wrote to memory of 2488 4532 cmd.exe 102 PID 4532 wrote to memory of 2356 4532 cmd.exe 103 PID 4532 wrote to memory of 2356 4532 cmd.exe 103
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\HRSword-main\win10初始化.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\system32\reg.exeREG QUERY "HKU\S-1-5-19"2⤵PID:5064
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"2⤵PID:3892
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" copy Drivers\usysdiag.exe "C:\Users\Admin\AppData\Local\Temp\HRSword-main\\" 1>NUL 2>NUL"2⤵PID:2972
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"2⤵PID:1584
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" copy Drivers\sysdiag_win10.sys "C:\Windows\System32\drivers\" 1>NUL 2>NUL"2⤵
- Drops file in Drivers directory
PID:1356
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"2⤵PID:4248
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" copy Drivers\hrwfpdrv_win10.sys "C:\Windows\System32\drivers\" 1>NUL 2>NUL"2⤵
- Drops file in Drivers directory
PID:3296
-
-
C:\Windows\system32\sc.exesc create hrwfpdrv binpath= "C:\Windows\System32\drivers\hrwfpdrv.sys" type= kernel start= demand error= normal2⤵
- Launches sc.exe
PID:5056
-
-
C:\Windows\system32\sc.exesc create sysdiag binpath= "C:\Windows\System32\drivers\sysdiag.sys" type= kernel start= demand error= normal depend= FltMgr group= "PNP_TDI"2⤵
- Launches sc.exe
PID:112
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\sysdiag" /f /v "ImagePath" /t REG_EXPAND_SZ /d "system32\DRIVERS\sysdiag_win10.sys"2⤵
- Sets service image path in registry
PID:228
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\hrwfpdr" /f /v "ImagePath" /t REG_EXPAND_SZ /d "system32\DRIVERS\hrwfpdrv_win10.sys"2⤵
- Sets service image path in registry
PID:5000
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\sysdiag" /f /v "Start" /t reg_dword /d "1"2⤵PID:1444
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\hrwfpdr" /f /v "Start" /t reg_dword /d "1"2⤵PID:3108
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\sysdiag" /f /v "Group" /d "PNP_TDI"2⤵PID:3176
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\sysdiag\Instances" /f /v "DefaultInstance" /d "sysdiag"2⤵PID:4660
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\sysdiag\Instances\sysdiag" /f /v "Altitude" /d "324600"2⤵PID:3052
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\sysdiag\Instances\sysdiag" /f /v "Flags" /t reg_dword /d "0"2⤵PID:3340
-
-
C:\Windows\system32\sc.exesc start sysdiag2⤵
- Launches sc.exe
PID:2488
-
-
C:\Windows\system32\sc.exesc start hrwfpdrv2⤵
- Launches sc.exe
PID:2356
-