Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28/11/2022, 01:22

General

  • Target

    f9e2c79659921f4f0fa54e6d6d960f8e83c61577c2d0601ab2d56c65879b323f.exe

  • Size

    911KB

  • MD5

    00ca2f10a413071f98f66b830aa9fe88

  • SHA1

    1d86fe0eb3d328221eb1a822f2ee825e78f5c520

  • SHA256

    f9e2c79659921f4f0fa54e6d6d960f8e83c61577c2d0601ab2d56c65879b323f

  • SHA512

    31cf5e4dabd966ead74a2e47d7307f0c88af25c58ec27118a67e73823d4f53abca9c98a74f7a708d30eb65352115990226d2c4a38a7f3d886e4cfa7780c6f2f4

  • SSDEEP

    12288:+K2mhAMJ/cPlhTrT58h7UZ6+5d2J/R+OOWy2PSQQhcuchCpjAHIC:v2O/GlRrK7nJQ5WRPuCXCdTC

Malware Config

Signatures

  • NetWire RAT payload 4 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 3 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 14 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9e2c79659921f4f0fa54e6d6d960f8e83c61577c2d0601ab2d56c65879b323f.exe
    "C:\Users\Admin\AppData\Local\Temp\f9e2c79659921f4f0fa54e6d6d960f8e83c61577c2d0601ab2d56c65879b323f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1340
    • C:\Users\Admin\io46471\uraqjzqeoozs.exe
      "C:\Users\Admin\io46471\uraqjzqeoozs.exe" gckvtfrzd
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1816
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
          PID:1664
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\io46471\run.vbs"
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:628
          • C:\Users\Admin\io46471\uraqjzqeoozs.exe
            "C:\Users\Admin\io46471\uraqjzqeoozs.exe" gckvtfrzd
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1804
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
              5⤵
              • Modifies Installed Components in the registry
              • Adds Run key to start application
              • Drops file in Windows directory
              PID:828
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\io46471\run.vbs"
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:904
          • C:\Users\Admin\io46471\uraqjzqeoozs.exe
            "C:\Users\Admin\io46471\uraqjzqeoozs.exe" gckvtfrzd
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:1308

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\io46471\ecbskw.RVM

      Filesize

      81KB

      MD5

      2b2e8e42231da09e80a757bf6233c6f5

      SHA1

      1e9ac3354d92bf45bbb365973c1411feddff8a7a

      SHA256

      4e443193eeecc09a571e864396e99a49e13061755e044047c3514b6beca3b192

      SHA512

      71bb82d7b4353d89c3cb967f0bef0d4223336130a30f5b93a5ed03f996e499c184b673590651e7fd25da5e7c6b11b2628808e4be7772bd87a159e5c3e20dc5de

    • C:\Users\Admin\io46471\gckvtfrzd

      Filesize

      646.7MB

      MD5

      a0d422ffd069f8f30cc7a36a2bcb6275

      SHA1

      983d6b8d84efec9a8d54788ab8c4fddbf2b12bf1

      SHA256

      6b77f0632f56a0569a5ae170becd4de326a7e47edcaa94e42337741ecc6c0241

      SHA512

      0ded2597d30e699b7ecbaab5d6b0b1fbb82ae110cb930af5061d8f491eff76680761a648a1913908a328ebed2db5398a760cc6854dd08061890c4a4693349814

    • C:\Users\Admin\io46471\lqccvbdurgqv.TTQ

      Filesize

      140B

      MD5

      c1b0ee38b17338787c12e654561d5d64

      SHA1

      e9bcdc45d03e3036ddd6a01e4165a5b25a2c38af

      SHA256

      f0b8f8277839261a2f9c5eaa9a535c1d151adb6694d3dcdfb901656867f1f1ee

      SHA512

      7f3874a7cf36a9a0b0367353ae8f96028ce9a5c6799b525d157485497234484044c573a89d77003f9fce523937ff89feebb3a203eb49abd998fdf4e3a6996a13

    • C:\Users\Admin\io46471\run.vbs

      Filesize

      94B

      MD5

      73eb3aab7c9bdb6a79dc2d3e60a8a64e

      SHA1

      9ef5b1db579c64e02006d062b17fad95034ca5d2

      SHA256

      a045998dcc14b187b50832653fb4da90da20f3a55ae1ce0b5ba492bd4c7645b6

      SHA512

      e80466a6724b2502ffa1e5d26bb83dac7b9985af0957a27108a5e021873d67d9ff9550411a3c273a547a38a8b4f13709beb95f129717eb87fc13fe585ff2fdb3

    • C:\Users\Admin\io46471\uraqjzqeoozs.exe

      Filesize

      732KB

      MD5

      71d8f6d5dc35517275bc38ebcc815f9f

      SHA1

      cae4e8c730de5a01d30aabeb3e5cb2136090ed8d

      SHA256

      fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b

      SHA512

      4826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59

    • C:\Users\Admin\io46471\uraqjzqeoozs.exe

      Filesize

      732KB

      MD5

      71d8f6d5dc35517275bc38ebcc815f9f

      SHA1

      cae4e8c730de5a01d30aabeb3e5cb2136090ed8d

      SHA256

      fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b

      SHA512

      4826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59

    • C:\Users\Admin\io46471\uraqjzqeoozs.exe

      Filesize

      732KB

      MD5

      71d8f6d5dc35517275bc38ebcc815f9f

      SHA1

      cae4e8c730de5a01d30aabeb3e5cb2136090ed8d

      SHA256

      fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b

      SHA512

      4826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59

    • C:\Users\Admin\io46471\uraqjzqeoozs.exe

      Filesize

      732KB

      MD5

      71d8f6d5dc35517275bc38ebcc815f9f

      SHA1

      cae4e8c730de5a01d30aabeb3e5cb2136090ed8d

      SHA256

      fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b

      SHA512

      4826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59

    • \Users\Admin\io46471\uraqjzqeoozs.exe

      Filesize

      732KB

      MD5

      71d8f6d5dc35517275bc38ebcc815f9f

      SHA1

      cae4e8c730de5a01d30aabeb3e5cb2136090ed8d

      SHA256

      fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b

      SHA512

      4826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59

    • \Users\Admin\io46471\uraqjzqeoozs.exe

      Filesize

      732KB

      MD5

      71d8f6d5dc35517275bc38ebcc815f9f

      SHA1

      cae4e8c730de5a01d30aabeb3e5cb2136090ed8d

      SHA256

      fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b

      SHA512

      4826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59

    • \Users\Admin\io46471\uraqjzqeoozs.exe

      Filesize

      732KB

      MD5

      71d8f6d5dc35517275bc38ebcc815f9f

      SHA1

      cae4e8c730de5a01d30aabeb3e5cb2136090ed8d

      SHA256

      fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b

      SHA512

      4826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59

    • \Users\Admin\io46471\uraqjzqeoozs.exe

      Filesize

      732KB

      MD5

      71d8f6d5dc35517275bc38ebcc815f9f

      SHA1

      cae4e8c730de5a01d30aabeb3e5cb2136090ed8d

      SHA256

      fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b

      SHA512

      4826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59

    • \Users\Admin\io46471\uraqjzqeoozs.exe

      Filesize

      732KB

      MD5

      71d8f6d5dc35517275bc38ebcc815f9f

      SHA1

      cae4e8c730de5a01d30aabeb3e5cb2136090ed8d

      SHA256

      fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b

      SHA512

      4826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59

    • \Users\Admin\io46471\uraqjzqeoozs.exe

      Filesize

      732KB

      MD5

      71d8f6d5dc35517275bc38ebcc815f9f

      SHA1

      cae4e8c730de5a01d30aabeb3e5cb2136090ed8d

      SHA256

      fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b

      SHA512

      4826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59

    • memory/828-79-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/828-81-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/828-85-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/828-87-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/1340-54-0x0000000076041000-0x0000000076043000-memory.dmp

      Filesize

      8KB