Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

02/01/2023, 22:29

230102-2eejcabe71 7

02/01/2023, 22:24

230102-2bpvxagd35 7

Analysis

  • max time kernel
    83s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/01/2023, 22:24

General

  • Target

    OctousWarriors.exe

  • Size

    74.8MB

  • MD5

    2020ffc9bb4eec31bb0095a7e1f26ff9

  • SHA1

    32d8a4165e152080adf74483e1cf326d7eb4b90a

  • SHA256

    ec180ff7a9327b3b6879393e8e34b5def8599db647dc6e05ce9feaffc8666136

  • SHA512

    02a6b1a714c384c8eb2a7501dcbf17ac23ad7ce69d4d04e18531bcd897518afd0609b37ca8004bc60f904ae4b5506e1bcb75c1cc9aee03c1b0f307ca48e27e96

  • SSDEEP

    786432:D0LoCOn+2hs4urYDNulLBiuRAatLAxn84ObHOgFPzLbtl6pxovHiBqKjcn8ggEC7:DMoCm/hXwqfwvW

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\OctousWarriors.exe
    "C:\Users\Admin\AppData\Local\Temp\OctousWarriors.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:4736
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "chcp"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3220
      • C:\Windows\system32\chcp.com
        chcp
        3⤵
          PID:2396
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1012
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4572
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3816
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "echo %COMPUTERNAME%.%USERDNSDOMAIN%"
        2⤵
          PID:752
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:596
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:456
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1716
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log""
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:428
          • C:\Windows\system32\findstr.exe
            findstr /C:"Detected boot environment" "C:\Windows\Panther\setupact.log"
            3⤵
              PID:4416
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4068
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography" /v MachineGuid"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4560
            • C:\Windows\System32\reg.exe
              C:\Windows\System32\reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography" /v MachineGuid
              3⤵
                PID:3376
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c ""undefined\VBoxManage.exe" list vms --long"
              2⤵
                PID:4024

            Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

              Filesize

              3KB

              MD5

              5c3cc3c6ae2c1e0b92b502859ce79d0c

              SHA1

              bde46d0f91ad780ce5cba924f8d9f4c175c5b83d

              SHA256

              5a48860ad5bdf15d7a241aa16124163ec48adc0f0af758e43561ac07e4f163b2

              SHA512

              269b79931df92c30741c9a42a013cb24935887272ed8077653f0b6525793da52c5004c70329d8e0e7b2776fc1aba6e32da5dadf237ae42f7398fdf35a930663e

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

              Filesize

              2KB

              MD5

              2f87410b0d834a14ceff69e18946d066

              SHA1

              f2ec80550202d493db61806693439a57b76634f3

              SHA256

              5422bc17b852ad463110de0db9b59ffa4219e065d3e2843618d6ebbd14273c65

              SHA512

              a313702f22450ceff0a1d7f890b0c16cf667dbcd668dbafa6dbecd0791236c0bc68e834d12113cc75352365c2a2b6cfcf30b6ef7c97ea53ed135da50de389db4

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

              Filesize

              2KB

              MD5

              951939a040c7a35b2d102d905634b820

              SHA1

              cfec458940c3c81effbe509bf984c803a7014ccb

              SHA256

              dd3f0f44dc5814eb3a488e4ce0d1973e332a7b8de2df79f1f78fba2a45d79e5a

              SHA512

              02afd17cb280d526201b623680148d078fb53ea89321ce5294deecb0886ad4fad484fc4f0fee56f508eac3820a98f237268197582cdf123a01c93330fbd89646

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

              Filesize

              2KB

              MD5

              b1004207cf8384f56c2f49586646ee46

              SHA1

              9a78b98224e9dc1127d4454f7360c5f992e0acc9

              SHA256

              75d724e3a52397bfe75fee1ba43ce4a5b0b254aa60a5a8b2ca338129dbd48341

              SHA512

              c3e5e59bc2855df0a8f2efb3cbde294131609c250761472ce7b85b4c81e9681e835244d7e188b2cf08ec68b1cf71ed59d9365a977accf7cb6a78a0605a592016

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

              Filesize

              2KB

              MD5

              aa9f1414f1d7a48bb3bc0fcd705f95f2

              SHA1

              c3d0b9d06d44481f67f7f7e9bcf04bc4bc61175c

              SHA256

              f9b907334b4ab7beafe10061d3ddff5cdca60fcbda384081d2d6bebef281737b

              SHA512

              e9f68dc41581c2d5d5991ee9d368524be72b4818733435b4043917f133ffb402ce57f1311779b2e8fc1723dc20d7681e5976e26e52fa6bf7100e20da95d34325

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

              Filesize

              2KB

              MD5

              8d2c65b6e4add4a512cda781ef149f23

              SHA1

              55ba705696da5867dde6f9e065c56d9bdf5b5895

              SHA256

              9511a4575d2e078b2e933d73961c210b211ffc50fc3e572968ff180e871eb400

              SHA512

              d76fb1b9b30527ce908d30fdcacc1cf8549ba883951be4d49f169b9a9394009765bcdb3ae48da947a99890213eaaf1496c63f32ad3990eafb194f97562e850f8

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

              Filesize

              2KB

              MD5

              8d2c65b6e4add4a512cda781ef149f23

              SHA1

              55ba705696da5867dde6f9e065c56d9bdf5b5895

              SHA256

              9511a4575d2e078b2e933d73961c210b211ffc50fc3e572968ff180e871eb400

              SHA512

              d76fb1b9b30527ce908d30fdcacc1cf8549ba883951be4d49f169b9a9394009765bcdb3ae48da947a99890213eaaf1496c63f32ad3990eafb194f97562e850f8

            • C:\Users\Admin\AppData\Local\Temp\pkg\149f80a81cf030278152112d83935bbffc1538cf4895e2aa0603e02afc11c958\mertushkaw\build\Release\mertushkaw.node

              Filesize

              95KB

              MD5

              4581922b663ab1a359e3a51e8f596d73

              SHA1

              50eacfb4a8c669f9ce67bc67b3a338e2c057eaa9

              SHA256

              149f80a81cf030278152112d83935bbffc1538cf4895e2aa0603e02afc11c958

              SHA512

              7b19452c175e94b0c6a831c58f56a47ac16878f9904234c17c0ce4e8d5de45273f673ab9c6fce68e2c21f85894a61f200a72228c5f7582bb5279be8075418d58

            • memory/456-162-0x00007FFA06780000-0x00007FFA07241000-memory.dmp

              Filesize

              10.8MB

            • memory/456-158-0x00007FFA06780000-0x00007FFA07241000-memory.dmp

              Filesize

              10.8MB

            • memory/596-157-0x00007FFA06780000-0x00007FFA07241000-memory.dmp

              Filesize

              10.8MB

            • memory/596-164-0x00007FFA06780000-0x00007FFA07241000-memory.dmp

              Filesize

              10.8MB

            • memory/1012-142-0x00007FFA06780000-0x00007FFA07241000-memory.dmp

              Filesize

              10.8MB

            • memory/1012-136-0x00000237D5740000-0x00000237D5762000-memory.dmp

              Filesize

              136KB

            • memory/1012-137-0x00000237D5C20000-0x00000237D5C64000-memory.dmp

              Filesize

              272KB

            • memory/1012-138-0x00007FFA06780000-0x00007FFA07241000-memory.dmp

              Filesize

              10.8MB

            • memory/1012-139-0x00000237D5CF0000-0x00000237D5D66000-memory.dmp

              Filesize

              472KB

            • memory/1012-140-0x00000237D5CA0000-0x00000237D5CCA000-memory.dmp

              Filesize

              168KB

            • memory/1012-141-0x00000237D5CA0000-0x00000237D5CC4000-memory.dmp

              Filesize

              144KB

            • memory/1716-160-0x00007FFA06780000-0x00007FFA07241000-memory.dmp

              Filesize

              10.8MB

            • memory/1716-159-0x00007FFA06780000-0x00007FFA07241000-memory.dmp

              Filesize

              10.8MB

            • memory/3816-151-0x00007FFA06780000-0x00007FFA07241000-memory.dmp

              Filesize

              10.8MB

            • memory/3816-149-0x00007FFA06780000-0x00007FFA07241000-memory.dmp

              Filesize

              10.8MB

            • memory/4068-169-0x00007FFA06430000-0x00007FFA06EF1000-memory.dmp

              Filesize

              10.8MB

            • memory/4068-170-0x00007FFA06430000-0x00007FFA06EF1000-memory.dmp

              Filesize

              10.8MB

            • memory/4572-147-0x00007FFA06780000-0x00007FFA07241000-memory.dmp

              Filesize

              10.8MB

            • memory/4572-146-0x00007FFA06780000-0x00007FFA07241000-memory.dmp

              Filesize

              10.8MB