Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26/11/2022, 02:09
Behavioral task
behavioral1
Sample
b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe
Resource
win7-20220812-en
General
-
Target
b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe
-
Size
413KB
-
MD5
76b457fa5ae1c6a25e31482690516e76
-
SHA1
fc07725fe87907bae71b5b9110634244cefee8de
-
SHA256
b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4
-
SHA512
4e87f901b69c3f2b59ae25afb8853e0fe9c686235c73e18a488ab736d7d6b57ac3759f41cdeaa81c7c69ed0ae4f4bf66326c4d18a5e525fb9fb3ea8bd7a1d17c
-
SSDEEP
6144:6cNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37ft:6cW7KEZlPzCy37V
Malware Config
Extracted
darkcomet
Guest16
teetertootor.no-ip.org:1604
DC_MUTEX-JL0SAE3
-
InstallPath
BossWarZ\BossWarZ.exe
-
gencode
RW32BHwn9J8G
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
BossWarZUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\BossWarZ\\BossWarZ.exe" b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe -
Executes dropped EXE 1 IoCs
pid Process 1556 BossWarZ.exe -
resource yara_rule behavioral1/memory/1120-55-0x0000000000400000-0x0000000000508000-memory.dmp upx behavioral1/files/0x0008000000014151-56.dat upx behavioral1/files/0x0008000000014151-57.dat upx behavioral1/files/0x0008000000014151-59.dat upx behavioral1/files/0x0008000000014151-61.dat upx behavioral1/memory/1556-63-0x0000000000400000-0x0000000000508000-memory.dmp upx behavioral1/memory/1120-64-0x0000000000400000-0x0000000000508000-memory.dmp upx behavioral1/memory/1556-65-0x0000000000400000-0x0000000000508000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\BossWarZUpdate = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\BossWarZ\\BossWarZ.exe" BossWarZ.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\BossWarZUpdate = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\BossWarZ\\BossWarZ.exe" b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeSecurityPrivilege 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeTakeOwnershipPrivilege 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeLoadDriverPrivilege 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeSystemProfilePrivilege 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeSystemtimePrivilege 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeProfSingleProcessPrivilege 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeIncBasePriorityPrivilege 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeCreatePagefilePrivilege 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeBackupPrivilege 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeRestorePrivilege 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeShutdownPrivilege 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeDebugPrivilege 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeSystemEnvironmentPrivilege 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeChangeNotifyPrivilege 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeRemoteShutdownPrivilege 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeUndockPrivilege 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeManageVolumePrivilege 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeImpersonatePrivilege 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeCreateGlobalPrivilege 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: 33 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: 34 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: 35 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeIncreaseQuotaPrivilege 1556 BossWarZ.exe Token: SeSecurityPrivilege 1556 BossWarZ.exe Token: SeTakeOwnershipPrivilege 1556 BossWarZ.exe Token: SeLoadDriverPrivilege 1556 BossWarZ.exe Token: SeSystemProfilePrivilege 1556 BossWarZ.exe Token: SeSystemtimePrivilege 1556 BossWarZ.exe Token: SeProfSingleProcessPrivilege 1556 BossWarZ.exe Token: SeIncBasePriorityPrivilege 1556 BossWarZ.exe Token: SeCreatePagefilePrivilege 1556 BossWarZ.exe Token: SeBackupPrivilege 1556 BossWarZ.exe Token: SeRestorePrivilege 1556 BossWarZ.exe Token: SeShutdownPrivilege 1556 BossWarZ.exe Token: SeDebugPrivilege 1556 BossWarZ.exe Token: SeSystemEnvironmentPrivilege 1556 BossWarZ.exe Token: SeChangeNotifyPrivilege 1556 BossWarZ.exe Token: SeRemoteShutdownPrivilege 1556 BossWarZ.exe Token: SeUndockPrivilege 1556 BossWarZ.exe Token: SeManageVolumePrivilege 1556 BossWarZ.exe Token: SeImpersonatePrivilege 1556 BossWarZ.exe Token: SeCreateGlobalPrivilege 1556 BossWarZ.exe Token: 33 1556 BossWarZ.exe Token: 34 1556 BossWarZ.exe Token: 35 1556 BossWarZ.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1556 BossWarZ.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1120 wrote to memory of 1556 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe 27 PID 1120 wrote to memory of 1556 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe 27 PID 1120 wrote to memory of 1556 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe 27 PID 1120 wrote to memory of 1556 1120 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe 27 PID 1556 wrote to memory of 1724 1556 BossWarZ.exe 28 PID 1556 wrote to memory of 1724 1556 BossWarZ.exe 28 PID 1556 wrote to memory of 1724 1556 BossWarZ.exe 28 PID 1556 wrote to memory of 1724 1556 BossWarZ.exe 28 PID 1556 wrote to memory of 844 1556 BossWarZ.exe 29 PID 1556 wrote to memory of 844 1556 BossWarZ.exe 29 PID 1556 wrote to memory of 844 1556 BossWarZ.exe 29 PID 1556 wrote to memory of 844 1556 BossWarZ.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe"C:\Users\Admin\AppData\Local\Temp\b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\ProgramData\Microsoft\Windows\Start Menu\BossWarZ\BossWarZ.exe"C:\ProgramData\Microsoft\Windows\Start Menu\BossWarZ\BossWarZ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵PID:1724
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵PID:844
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
413KB
MD576b457fa5ae1c6a25e31482690516e76
SHA1fc07725fe87907bae71b5b9110634244cefee8de
SHA256b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4
SHA5124e87f901b69c3f2b59ae25afb8853e0fe9c686235c73e18a488ab736d7d6b57ac3759f41cdeaa81c7c69ed0ae4f4bf66326c4d18a5e525fb9fb3ea8bd7a1d17c
-
Filesize
413KB
MD576b457fa5ae1c6a25e31482690516e76
SHA1fc07725fe87907bae71b5b9110634244cefee8de
SHA256b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4
SHA5124e87f901b69c3f2b59ae25afb8853e0fe9c686235c73e18a488ab736d7d6b57ac3759f41cdeaa81c7c69ed0ae4f4bf66326c4d18a5e525fb9fb3ea8bd7a1d17c
-
Filesize
413KB
MD576b457fa5ae1c6a25e31482690516e76
SHA1fc07725fe87907bae71b5b9110634244cefee8de
SHA256b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4
SHA5124e87f901b69c3f2b59ae25afb8853e0fe9c686235c73e18a488ab736d7d6b57ac3759f41cdeaa81c7c69ed0ae4f4bf66326c4d18a5e525fb9fb3ea8bd7a1d17c
-
Filesize
413KB
MD576b457fa5ae1c6a25e31482690516e76
SHA1fc07725fe87907bae71b5b9110634244cefee8de
SHA256b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4
SHA5124e87f901b69c3f2b59ae25afb8853e0fe9c686235c73e18a488ab736d7d6b57ac3759f41cdeaa81c7c69ed0ae4f4bf66326c4d18a5e525fb9fb3ea8bd7a1d17c