Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2022, 02:09
Behavioral task
behavioral1
Sample
b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe
Resource
win7-20220812-en
General
-
Target
b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe
-
Size
413KB
-
MD5
76b457fa5ae1c6a25e31482690516e76
-
SHA1
fc07725fe87907bae71b5b9110634244cefee8de
-
SHA256
b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4
-
SHA512
4e87f901b69c3f2b59ae25afb8853e0fe9c686235c73e18a488ab736d7d6b57ac3759f41cdeaa81c7c69ed0ae4f4bf66326c4d18a5e525fb9fb3ea8bd7a1d17c
-
SSDEEP
6144:6cNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37ft:6cW7KEZlPzCy37V
Malware Config
Extracted
darkcomet
Guest16
teetertootor.no-ip.org:1604
DC_MUTEX-JL0SAE3
-
InstallPath
BossWarZ\BossWarZ.exe
-
gencode
RW32BHwn9J8G
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
BossWarZUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\BossWarZ\\BossWarZ.exe" b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe -
Executes dropped EXE 1 IoCs
pid Process 1756 BossWarZ.exe -
resource yara_rule behavioral2/memory/1132-132-0x0000000000400000-0x0000000000508000-memory.dmp upx behavioral2/files/0x0009000000022df5-134.dat upx behavioral2/files/0x0009000000022df5-135.dat upx behavioral2/memory/1756-137-0x0000000000400000-0x0000000000508000-memory.dmp upx behavioral2/memory/1132-138-0x0000000000400000-0x0000000000508000-memory.dmp upx behavioral2/memory/1756-139-0x0000000000400000-0x0000000000508000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BossWarZUpdate = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\BossWarZ\\BossWarZ.exe" b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BossWarZUpdate = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\BossWarZ\\BossWarZ.exe" BossWarZ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1132 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeSecurityPrivilege 1132 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeTakeOwnershipPrivilege 1132 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeLoadDriverPrivilege 1132 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeSystemProfilePrivilege 1132 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeSystemtimePrivilege 1132 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeProfSingleProcessPrivilege 1132 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeIncBasePriorityPrivilege 1132 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeCreatePagefilePrivilege 1132 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeBackupPrivilege 1132 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeRestorePrivilege 1132 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeShutdownPrivilege 1132 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeDebugPrivilege 1132 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeSystemEnvironmentPrivilege 1132 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeChangeNotifyPrivilege 1132 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeRemoteShutdownPrivilege 1132 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeUndockPrivilege 1132 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeManageVolumePrivilege 1132 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeImpersonatePrivilege 1132 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeCreateGlobalPrivilege 1132 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: 33 1132 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: 34 1132 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: 35 1132 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: 36 1132 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe Token: SeIncreaseQuotaPrivilege 1756 BossWarZ.exe Token: SeSecurityPrivilege 1756 BossWarZ.exe Token: SeTakeOwnershipPrivilege 1756 BossWarZ.exe Token: SeLoadDriverPrivilege 1756 BossWarZ.exe Token: SeSystemProfilePrivilege 1756 BossWarZ.exe Token: SeSystemtimePrivilege 1756 BossWarZ.exe Token: SeProfSingleProcessPrivilege 1756 BossWarZ.exe Token: SeIncBasePriorityPrivilege 1756 BossWarZ.exe Token: SeCreatePagefilePrivilege 1756 BossWarZ.exe Token: SeBackupPrivilege 1756 BossWarZ.exe Token: SeRestorePrivilege 1756 BossWarZ.exe Token: SeShutdownPrivilege 1756 BossWarZ.exe Token: SeDebugPrivilege 1756 BossWarZ.exe Token: SeSystemEnvironmentPrivilege 1756 BossWarZ.exe Token: SeChangeNotifyPrivilege 1756 BossWarZ.exe Token: SeRemoteShutdownPrivilege 1756 BossWarZ.exe Token: SeUndockPrivilege 1756 BossWarZ.exe Token: SeManageVolumePrivilege 1756 BossWarZ.exe Token: SeImpersonatePrivilege 1756 BossWarZ.exe Token: SeCreateGlobalPrivilege 1756 BossWarZ.exe Token: 33 1756 BossWarZ.exe Token: 34 1756 BossWarZ.exe Token: 35 1756 BossWarZ.exe Token: 36 1756 BossWarZ.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1756 BossWarZ.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1132 wrote to memory of 1756 1132 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe 77 PID 1132 wrote to memory of 1756 1132 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe 77 PID 1132 wrote to memory of 1756 1132 b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe 77 PID 1756 wrote to memory of 3960 1756 BossWarZ.exe 78 PID 1756 wrote to memory of 3960 1756 BossWarZ.exe 78 PID 1756 wrote to memory of 3960 1756 BossWarZ.exe 78 PID 1756 wrote to memory of 2148 1756 BossWarZ.exe 79 PID 1756 wrote to memory of 2148 1756 BossWarZ.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe"C:\Users\Admin\AppData\Local\Temp\b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\ProgramData\Microsoft\Windows\Start Menu\BossWarZ\BossWarZ.exe"C:\ProgramData\Microsoft\Windows\Start Menu\BossWarZ\BossWarZ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵PID:3960
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵PID:2148
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
413KB
MD576b457fa5ae1c6a25e31482690516e76
SHA1fc07725fe87907bae71b5b9110634244cefee8de
SHA256b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4
SHA5124e87f901b69c3f2b59ae25afb8853e0fe9c686235c73e18a488ab736d7d6b57ac3759f41cdeaa81c7c69ed0ae4f4bf66326c4d18a5e525fb9fb3ea8bd7a1d17c
-
Filesize
413KB
MD576b457fa5ae1c6a25e31482690516e76
SHA1fc07725fe87907bae71b5b9110634244cefee8de
SHA256b734e86bf0004fc28d0461931d180ac6dee413a8c0ce9de25a6e52c92f9933e4
SHA5124e87f901b69c3f2b59ae25afb8853e0fe9c686235c73e18a488ab736d7d6b57ac3759f41cdeaa81c7c69ed0ae4f4bf66326c4d18a5e525fb9fb3ea8bd7a1d17c