Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2022, 01:30
Static task
static1
Behavioral task
behavioral1
Sample
d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe
Resource
win7-20220901-en
General
-
Target
d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe
-
Size
241KB
-
MD5
eaa627127b87d9f59afc00374f43583e
-
SHA1
83d1a134a9e6dcb198aeaca9030b4f058d9ff39e
-
SHA256
d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265
-
SHA512
4bc56f70e5ed758054f741274ccf47135d7b66a80c99a7a650dd15cc82a2ed3ab12ac8f751038d762049dd676e8b6440438a32a360b17302135f7badb5533b33
-
SSDEEP
6144:5LX6FrQvq9ZrumBFSOzVCdyQEDvTX2qFWdbq:57698IZqKFS8cdBivTGLb
Malware Config
Extracted
nanocore
1.2.1.1
testalerlynch2.ddns.net:19302
eddce1db-ede3-4767-a9cb-101e86025cdd
-
activate_away_mode
true
- backup_connection_host
- backup_dns_server
-
buffer_size
65535
-
build_time
2014-10-21T19:21:49.770516936Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
19302
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
eddce1db-ede3-4767-a9cb-101e86025cdd
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
testalerlynch2.ddns.net
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.1.1
-
wan_timeout
8000
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3536 Filename.exe 1444 csrss.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Filename.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ RegistryKey = "C:\\Users\\Admin\\AppData\\Roaming\\MicrosoftServices\\MicrosoftServices\\Filename.exe" Filename.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ RegistryKey = "C:\\Users\\Admin\\AppData\\Roaming\\MicrosoftServices\\MicrosoftServices\\Filename.exe" Filename.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ RegistryKey = "C:\\Users\\Admin\\AppData\\Roaming\\MicrosoftServices\\MicrosoftServices\\Filename.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ RegistryKey = "C:\\Users\\Admin\\AppData\\Roaming\\MicrosoftServices\\MicrosoftServices\\Filename.exe" csrss.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3536 set thread context of 5012 3536 Filename.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Filename.exe -
NTFS ADS 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe:ZONE.identifier cmd.exe File created C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\Filename.exe\:ZONE.identifier:$DATA d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe File opened for modification C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\Filename.exe:ZONE.identifier cmd.exe File created C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\csrss.exe\:ZONE.identifier:$DATA Filename.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5012 RegSvcs.exe 5012 RegSvcs.exe 5012 RegSvcs.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe 1444 csrss.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5012 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3536 Filename.exe Token: SeDebugPrivilege 5012 RegSvcs.exe Token: SeDebugPrivilege 1444 csrss.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3544 wrote to memory of 2464 3544 d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe 76 PID 3544 wrote to memory of 2464 3544 d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe 76 PID 3544 wrote to memory of 2464 3544 d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe 76 PID 3544 wrote to memory of 3536 3544 d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe 79 PID 3544 wrote to memory of 3536 3544 d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe 79 PID 3544 wrote to memory of 3536 3544 d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe 79 PID 3536 wrote to memory of 1732 3536 Filename.exe 81 PID 3536 wrote to memory of 1732 3536 Filename.exe 81 PID 3536 wrote to memory of 1732 3536 Filename.exe 81 PID 3536 wrote to memory of 5012 3536 Filename.exe 83 PID 3536 wrote to memory of 5012 3536 Filename.exe 83 PID 3536 wrote to memory of 5012 3536 Filename.exe 83 PID 3536 wrote to memory of 5012 3536 Filename.exe 83 PID 3536 wrote to memory of 5012 3536 Filename.exe 83 PID 3536 wrote to memory of 5012 3536 Filename.exe 83 PID 3536 wrote to memory of 5012 3536 Filename.exe 83 PID 3536 wrote to memory of 5012 3536 Filename.exe 83 PID 3536 wrote to memory of 1444 3536 Filename.exe 84 PID 3536 wrote to memory of 1444 3536 Filename.exe 84 PID 3536 wrote to memory of 1444 3536 Filename.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe"C:\Users\Admin\AppData\Local\Temp\d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe"1⤵
- Checks computer location settings
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > "C:\Users\Admin\AppData\Local\Temp\d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe":ZONE.identifier & exit2⤵
- NTFS ADS
PID:2464
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\Filename.exe"C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\Filename.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > "C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\Filename.exe":ZONE.identifier & exit3⤵
- NTFS ADS
PID:1732
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\\Microsoft.NET\\Framework\\v2.0.50727\RegSvcs.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\csrss.exe"C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\csrss.exe" -reg C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\Filename.exe -proc 5012 C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\Filename.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe
Filesize241KB
MD5eaa627127b87d9f59afc00374f43583e
SHA183d1a134a9e6dcb198aeaca9030b4f058d9ff39e
SHA256d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265
SHA5124bc56f70e5ed758054f741274ccf47135d7b66a80c99a7a650dd15cc82a2ed3ab12ac8f751038d762049dd676e8b6440438a32a360b17302135f7badb5533b33
-
Filesize
241KB
MD5eaa627127b87d9f59afc00374f43583e
SHA183d1a134a9e6dcb198aeaca9030b4f058d9ff39e
SHA256d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265
SHA5124bc56f70e5ed758054f741274ccf47135d7b66a80c99a7a650dd15cc82a2ed3ab12ac8f751038d762049dd676e8b6440438a32a360b17302135f7badb5533b33
-
Filesize
241KB
MD5eaa627127b87d9f59afc00374f43583e
SHA183d1a134a9e6dcb198aeaca9030b4f058d9ff39e
SHA256d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265
SHA5124bc56f70e5ed758054f741274ccf47135d7b66a80c99a7a650dd15cc82a2ed3ab12ac8f751038d762049dd676e8b6440438a32a360b17302135f7badb5533b33
-
Filesize
241KB
MD5eaa627127b87d9f59afc00374f43583e
SHA183d1a134a9e6dcb198aeaca9030b4f058d9ff39e
SHA256d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265
SHA5124bc56f70e5ed758054f741274ccf47135d7b66a80c99a7a650dd15cc82a2ed3ab12ac8f751038d762049dd676e8b6440438a32a360b17302135f7badb5533b33
-
Filesize
241KB
MD5eaa627127b87d9f59afc00374f43583e
SHA183d1a134a9e6dcb198aeaca9030b4f058d9ff39e
SHA256d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265
SHA5124bc56f70e5ed758054f741274ccf47135d7b66a80c99a7a650dd15cc82a2ed3ab12ac8f751038d762049dd676e8b6440438a32a360b17302135f7badb5533b33
-
Filesize
241KB
MD5eaa627127b87d9f59afc00374f43583e
SHA183d1a134a9e6dcb198aeaca9030b4f058d9ff39e
SHA256d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265
SHA5124bc56f70e5ed758054f741274ccf47135d7b66a80c99a7a650dd15cc82a2ed3ab12ac8f751038d762049dd676e8b6440438a32a360b17302135f7badb5533b33