Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
27/06/2023, 08:45
Behavioral task
behavioral1
Sample
windows7.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
windows7.exe
Resource
win10v2004-20230621-en
General
-
Target
windows7.exe
-
Size
113KB
-
MD5
8c5693544eefeef29423f20b3b2abaf8
-
SHA1
67bfe01d75d1dc6f952089f2872f51dd02803bdc
-
SHA256
617dfa640a93ce037bbcbe9bf4106cc9c9ea2049020f131afa500fe0c2630d73
-
SHA512
1d627ce12f9e4a9405154edf6671dcedcc71714a774e1c8bab8c61cdd6f82775706b819f68147ef8dc2bc58284d05d64de1579779583d9b1ed5773a4df03d21b
-
SSDEEP
1536:h0jP7/L1B5rVmN8sxHv2M28ix8EUaJxWZoB4u0OVE01:K1VmhaH8EFvW+0OVE0
Malware Config
Extracted
warzonerat
cowboyd.ddns.net:2404
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 5 IoCs
resource yara_rule behavioral1/files/0x00090000000122de-55.dat warzonerat behavioral1/files/0x00090000000122de-60.dat warzonerat behavioral1/files/0x00090000000122de-57.dat warzonerat behavioral1/files/0x00090000000122de-61.dat warzonerat behavioral1/files/0x00090000000122de-62.dat warzonerat -
Executes dropped EXE 1 IoCs
pid Process 820 Winlogin.exe -
Loads dropped DLL 2 IoCs
pid Process 1192 windows7.exe 1192 windows7.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\Winlogin.exe" windows7.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1192 wrote to memory of 820 1192 windows7.exe 28 PID 1192 wrote to memory of 820 1192 windows7.exe 28 PID 1192 wrote to memory of 820 1192 windows7.exe 28 PID 1192 wrote to memory of 820 1192 windows7.exe 28 PID 820 wrote to memory of 472 820 Winlogin.exe 29 PID 820 wrote to memory of 472 820 Winlogin.exe 29 PID 820 wrote to memory of 472 820 Winlogin.exe 29 PID 820 wrote to memory of 472 820 Winlogin.exe 29 PID 820 wrote to memory of 472 820 Winlogin.exe 29 PID 820 wrote to memory of 472 820 Winlogin.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\windows7.exe"C:\Users\Admin\AppData\Local\Temp\windows7.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\ProgramData\Winlogin.exe"C:\ProgramData\Winlogin.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:472
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
113KB
MD58c5693544eefeef29423f20b3b2abaf8
SHA167bfe01d75d1dc6f952089f2872f51dd02803bdc
SHA256617dfa640a93ce037bbcbe9bf4106cc9c9ea2049020f131afa500fe0c2630d73
SHA5121d627ce12f9e4a9405154edf6671dcedcc71714a774e1c8bab8c61cdd6f82775706b819f68147ef8dc2bc58284d05d64de1579779583d9b1ed5773a4df03d21b
-
Filesize
113KB
MD58c5693544eefeef29423f20b3b2abaf8
SHA167bfe01d75d1dc6f952089f2872f51dd02803bdc
SHA256617dfa640a93ce037bbcbe9bf4106cc9c9ea2049020f131afa500fe0c2630d73
SHA5121d627ce12f9e4a9405154edf6671dcedcc71714a774e1c8bab8c61cdd6f82775706b819f68147ef8dc2bc58284d05d64de1579779583d9b1ed5773a4df03d21b
-
Filesize
113KB
MD58c5693544eefeef29423f20b3b2abaf8
SHA167bfe01d75d1dc6f952089f2872f51dd02803bdc
SHA256617dfa640a93ce037bbcbe9bf4106cc9c9ea2049020f131afa500fe0c2630d73
SHA5121d627ce12f9e4a9405154edf6671dcedcc71714a774e1c8bab8c61cdd6f82775706b819f68147ef8dc2bc58284d05d64de1579779583d9b1ed5773a4df03d21b
-
Filesize
113KB
MD58c5693544eefeef29423f20b3b2abaf8
SHA167bfe01d75d1dc6f952089f2872f51dd02803bdc
SHA256617dfa640a93ce037bbcbe9bf4106cc9c9ea2049020f131afa500fe0c2630d73
SHA5121d627ce12f9e4a9405154edf6671dcedcc71714a774e1c8bab8c61cdd6f82775706b819f68147ef8dc2bc58284d05d64de1579779583d9b1ed5773a4df03d21b
-
Filesize
113KB
MD58c5693544eefeef29423f20b3b2abaf8
SHA167bfe01d75d1dc6f952089f2872f51dd02803bdc
SHA256617dfa640a93ce037bbcbe9bf4106cc9c9ea2049020f131afa500fe0c2630d73
SHA5121d627ce12f9e4a9405154edf6671dcedcc71714a774e1c8bab8c61cdd6f82775706b819f68147ef8dc2bc58284d05d64de1579779583d9b1ed5773a4df03d21b