Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    180s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26/11/2022, 18:36

General

  • Target

    9f6da3708198e2274424357250b5842d627f1486373731f88d520ecd66b2275f.exe

  • Size

    350KB

  • MD5

    22a4ca0bb8c69559d1705afcfd19036e

  • SHA1

    1e5a7bd56f9c80ea45c36a15a49cd922c1a4b22b

  • SHA256

    9f6da3708198e2274424357250b5842d627f1486373731f88d520ecd66b2275f

  • SHA512

    1defcf24711937b3a078a6221189e80ea15788ca0a4274bb0da52708c7af45fb51eda68f78e98e13de189478114f3efef3361f9cc5a3a99df0888b9cb331d374

  • SSDEEP

    6144:K7NnAkDl9Rymx8mni62kJmj5SNw9IQV+REZrHfUT0+2ZXShqL:IXDlTyA8mi69JuXGQV4GHfUT0+2ZCY

Score
10/10

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Drops startup file 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f6da3708198e2274424357250b5842d627f1486373731f88d520ecd66b2275f.exe
    "C:\Users\Admin\AppData\Local\Temp\9f6da3708198e2274424357250b5842d627f1486373731f88d520ecd66b2275f.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\svchost\svchost.exe

    Filesize

    350KB

    MD5

    22a4ca0bb8c69559d1705afcfd19036e

    SHA1

    1e5a7bd56f9c80ea45c36a15a49cd922c1a4b22b

    SHA256

    9f6da3708198e2274424357250b5842d627f1486373731f88d520ecd66b2275f

    SHA512

    1defcf24711937b3a078a6221189e80ea15788ca0a4274bb0da52708c7af45fb51eda68f78e98e13de189478114f3efef3361f9cc5a3a99df0888b9cb331d374

  • memory/956-60-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/956-56-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/956-57-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/956-59-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/956-61-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/956-64-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/956-66-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/956-70-0x0000000074360000-0x000000007490B000-memory.dmp

    Filesize

    5.7MB

  • memory/956-71-0x0000000074360000-0x000000007490B000-memory.dmp

    Filesize

    5.7MB

  • memory/1928-54-0x0000000076031000-0x0000000076033000-memory.dmp

    Filesize

    8KB

  • memory/1928-67-0x0000000074360000-0x000000007490B000-memory.dmp

    Filesize

    5.7MB

  • memory/1928-55-0x0000000074360000-0x000000007490B000-memory.dmp

    Filesize

    5.7MB