Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    206s
  • max time network
    286s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 18:12

General

  • Target

    7394542abb42ff616b8b8dc70d65a6fbd11991f545e03b31886920b886eb54f4.exe

  • Size

    84KB

  • MD5

    347a3d54f1eb89003fc3ffc15eecc9fa

  • SHA1

    d59b10e282d5a84cfbcd92accb69c8dadfd262eb

  • SHA256

    7394542abb42ff616b8b8dc70d65a6fbd11991f545e03b31886920b886eb54f4

  • SHA512

    b0a515b732e0438a7ee905e3ba2eafb7ac221f8323470a2c30ea970881bdadca9cc2b7b0ffc712a5617eb0fb893b1696c7a8cc0efa1473afadc9fdcd7459fb30

  • SSDEEP

    1536:/fFYrHzmJcABxt2mE5OAkYJLz4agc5fHLl71Bxdm+Zz8Dq:arTmJ/vElJLz4axLl1BxHZU

Malware Config

Signatures

  • RunningRat

    RunningRat is a remote access trojan first seen in 2018.

  • RunningRat payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Creates a Windows Service
  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\wbem\wmiprvse.exe
    C:\Windows\system32\wbem\wmiprvse.exe
    1⤵
      PID:1340
    • \\?\C:\Windows\system32\wbem\WMIADAP.EXE
      wmiadap.exe /F /T /R
      1⤵
        PID:1128
      • C:\Windows\system32\sppsvc.exe
        C:\Windows\system32\sppsvc.exe
        1⤵
          PID:1968
        • C:\Users\Admin\AppData\Local\Temp\7394542abb42ff616b8b8dc70d65a6fbd11991f545e03b31886920b886eb54f4.exe
          "C:\Users\Admin\AppData\Local\Temp\7394542abb42ff616b8b8dc70d65a6fbd11991f545e03b31886920b886eb54f4.exe"
          1⤵
          • Sets DLL path for service in the registry
          • Loads dropped DLL
          • Drops file in System32 directory
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1820
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
          1⤵
            PID:1948
          • C:\Windows\Explorer.EXE
            C:\Windows\Explorer.EXE
            1⤵
              PID:1248
            • C:\Windows\system32\Dwm.exe
              "C:\Windows\system32\Dwm.exe"
              1⤵
                PID:1180
              • C:\Windows\system32\taskhost.exe
                "taskhost.exe"
                1⤵
                  PID:1120
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
                  1⤵
                    PID:1040
                  • C:\Windows\System32\spoolsv.exe
                    C:\Windows\System32\spoolsv.exe
                    1⤵
                      PID:292
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k NetworkService
                      1⤵
                        PID:280
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs
                        1⤵
                          PID:860
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService
                          1⤵
                            PID:828
                          • C:\Windows\System32\svchost.exe
                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
                            1⤵
                              PID:796
                            • C:\Windows\System32\svchost.exe
                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                              1⤵
                                PID:744
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k RPCSS
                                1⤵
                                  PID:656
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k DcomLaunch
                                  1⤵
                                    PID:580
                                  • C:\Windows\system32\lsm.exe
                                    C:\Windows\system32\lsm.exe
                                    1⤵
                                      PID:488
                                    • C:\Windows\system32\lsass.exe
                                      C:\Windows\system32\lsass.exe
                                      1⤵
                                        PID:480
                                      • C:\Windows\system32\services.exe
                                        C:\Windows\system32\services.exe
                                        1⤵
                                          PID:464
                                          • C:\Windows\SysWOW64\svchost.exe
                                            C:\Windows\SysWOW64\svchost.exe -k "123"
                                            2⤵
                                              PID:1472
                                            • C:\Windows\SysWOW64\svchost.exe
                                              C:\Windows\SysWOW64\svchost.exe -k "123"
                                              2⤵
                                              • Loads dropped DLL
                                              • Drops file in System32 directory
                                              PID:780
                                              • C:\Windows\SysWOW64\123.exe
                                                C:\Windows\system32\123.exe "c:\program files (x86)\google\7234686.dll",MainThread
                                                3⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                PID:568
                                          • C:\Windows\system32\winlogon.exe
                                            winlogon.exe
                                            1⤵
                                              PID:420
                                            • C:\Windows\system32\csrss.exe
                                              %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
                                              1⤵
                                                PID:384
                                              • C:\Windows\system32\wininit.exe
                                                wininit.exe
                                                1⤵
                                                  PID:372

                                                Network

                                                MITRE ATT&CK Enterprise v6

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Windows\SysWOW64\123.exe

                                                  Filesize

                                                  43KB

                                                  MD5

                                                  51138beea3e2c21ec44d0932c71762a8

                                                  SHA1

                                                  8939cf35447b22dd2c6e6f443446acc1bf986d58

                                                  SHA256

                                                  5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

                                                  SHA512

                                                  794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

                                                • C:\Windows\SysWOW64\123.exe

                                                  Filesize

                                                  43KB

                                                  MD5

                                                  51138beea3e2c21ec44d0932c71762a8

                                                  SHA1

                                                  8939cf35447b22dd2c6e6f443446acc1bf986d58

                                                  SHA256

                                                  5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

                                                  SHA512

                                                  794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

                                                • \??\c:\program files (x86)\google\7234686.dll

                                                  Filesize

                                                  26KB

                                                  MD5

                                                  721a67aa77b60c431aff25e5b6072ae1

                                                  SHA1

                                                  256e64e033990f262be1f02b8186bedb1679c53e

                                                  SHA256

                                                  2cf838f679e15e87e685dfbbc2a85d06434a972b2d63de52f9d4377010e7e6af

                                                  SHA512

                                                  c951f82f7e99691cf7cb1e327e8b6d63aa867ff16709a15ab1b935c8e6370482b3952abf3764ffd2e4040ae053c80700c5a777cfef6f7d8c5a2a165c3422992f

                                                • \Program Files (x86)\Google\7234686.dll

                                                  Filesize

                                                  26KB

                                                  MD5

                                                  721a67aa77b60c431aff25e5b6072ae1

                                                  SHA1

                                                  256e64e033990f262be1f02b8186bedb1679c53e

                                                  SHA256

                                                  2cf838f679e15e87e685dfbbc2a85d06434a972b2d63de52f9d4377010e7e6af

                                                  SHA512

                                                  c951f82f7e99691cf7cb1e327e8b6d63aa867ff16709a15ab1b935c8e6370482b3952abf3764ffd2e4040ae053c80700c5a777cfef6f7d8c5a2a165c3422992f

                                                • \Program Files (x86)\Google\7234686.dll

                                                  Filesize

                                                  26KB

                                                  MD5

                                                  721a67aa77b60c431aff25e5b6072ae1

                                                  SHA1

                                                  256e64e033990f262be1f02b8186bedb1679c53e

                                                  SHA256

                                                  2cf838f679e15e87e685dfbbc2a85d06434a972b2d63de52f9d4377010e7e6af

                                                  SHA512

                                                  c951f82f7e99691cf7cb1e327e8b6d63aa867ff16709a15ab1b935c8e6370482b3952abf3764ffd2e4040ae053c80700c5a777cfef6f7d8c5a2a165c3422992f

                                                • \Program Files (x86)\Google\7234686.dll

                                                  Filesize

                                                  26KB

                                                  MD5

                                                  721a67aa77b60c431aff25e5b6072ae1

                                                  SHA1

                                                  256e64e033990f262be1f02b8186bedb1679c53e

                                                  SHA256

                                                  2cf838f679e15e87e685dfbbc2a85d06434a972b2d63de52f9d4377010e7e6af

                                                  SHA512

                                                  c951f82f7e99691cf7cb1e327e8b6d63aa867ff16709a15ab1b935c8e6370482b3952abf3764ffd2e4040ae053c80700c5a777cfef6f7d8c5a2a165c3422992f

                                                • \Program Files (x86)\Google\7234686.dll

                                                  Filesize

                                                  26KB

                                                  MD5

                                                  721a67aa77b60c431aff25e5b6072ae1

                                                  SHA1

                                                  256e64e033990f262be1f02b8186bedb1679c53e

                                                  SHA256

                                                  2cf838f679e15e87e685dfbbc2a85d06434a972b2d63de52f9d4377010e7e6af

                                                  SHA512

                                                  c951f82f7e99691cf7cb1e327e8b6d63aa867ff16709a15ab1b935c8e6370482b3952abf3764ffd2e4040ae053c80700c5a777cfef6f7d8c5a2a165c3422992f

                                                • \Program Files (x86)\Google\7234686.dll

                                                  Filesize

                                                  26KB

                                                  MD5

                                                  721a67aa77b60c431aff25e5b6072ae1

                                                  SHA1

                                                  256e64e033990f262be1f02b8186bedb1679c53e

                                                  SHA256

                                                  2cf838f679e15e87e685dfbbc2a85d06434a972b2d63de52f9d4377010e7e6af

                                                  SHA512

                                                  c951f82f7e99691cf7cb1e327e8b6d63aa867ff16709a15ab1b935c8e6370482b3952abf3764ffd2e4040ae053c80700c5a777cfef6f7d8c5a2a165c3422992f

                                                • \Program Files (x86)\Google\7234686.dll

                                                  Filesize

                                                  26KB

                                                  MD5

                                                  721a67aa77b60c431aff25e5b6072ae1

                                                  SHA1

                                                  256e64e033990f262be1f02b8186bedb1679c53e

                                                  SHA256

                                                  2cf838f679e15e87e685dfbbc2a85d06434a972b2d63de52f9d4377010e7e6af

                                                  SHA512

                                                  c951f82f7e99691cf7cb1e327e8b6d63aa867ff16709a15ab1b935c8e6370482b3952abf3764ffd2e4040ae053c80700c5a777cfef6f7d8c5a2a165c3422992f

                                                • \Windows\SysWOW64\123.exe

                                                  Filesize

                                                  43KB

                                                  MD5

                                                  51138beea3e2c21ec44d0932c71762a8

                                                  SHA1

                                                  8939cf35447b22dd2c6e6f443446acc1bf986d58

                                                  SHA256

                                                  5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

                                                  SHA512

                                                  794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

                                                • memory/1820-54-0x0000000000400000-0x0000000000415000-memory.dmp

                                                  Filesize

                                                  84KB

                                                • memory/1820-57-0x0000000000400000-0x0000000000415000-memory.dmp

                                                  Filesize

                                                  84KB

                                                • memory/1820-55-0x00000000757E1000-0x00000000757E3000-memory.dmp

                                                  Filesize

                                                  8KB