Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2023, 08:45
Behavioral task
behavioral1
Sample
windows7.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
windows7.exe
Resource
win10v2004-20230621-en
General
-
Target
windows7.exe
-
Size
113KB
-
MD5
8c5693544eefeef29423f20b3b2abaf8
-
SHA1
67bfe01d75d1dc6f952089f2872f51dd02803bdc
-
SHA256
617dfa640a93ce037bbcbe9bf4106cc9c9ea2049020f131afa500fe0c2630d73
-
SHA512
1d627ce12f9e4a9405154edf6671dcedcc71714a774e1c8bab8c61cdd6f82775706b819f68147ef8dc2bc58284d05d64de1579779583d9b1ed5773a4df03d21b
-
SSDEEP
1536:h0jP7/L1B5rVmN8sxHv2M28ix8EUaJxWZoB4u0OVE01:K1VmhaH8EFvW+0OVE0
Malware Config
Extracted
warzonerat
cowboyd.ddns.net:2404
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 2 IoCs
resource yara_rule behavioral2/files/0x000a000000023235-138.dat warzonerat behavioral2/files/0x000a000000023235-139.dat warzonerat -
Executes dropped EXE 1 IoCs
pid Process 1952 Winlogin.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\Winlogin.exe" windows7.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1952 1632 windows7.exe 83 PID 1632 wrote to memory of 1952 1632 windows7.exe 83 PID 1632 wrote to memory of 1952 1632 windows7.exe 83 PID 1952 wrote to memory of 2060 1952 Winlogin.exe 84 PID 1952 wrote to memory of 2060 1952 Winlogin.exe 84 PID 1952 wrote to memory of 2060 1952 Winlogin.exe 84 PID 1952 wrote to memory of 2060 1952 Winlogin.exe 84 PID 1952 wrote to memory of 2060 1952 Winlogin.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\windows7.exe"C:\Users\Admin\AppData\Local\Temp\windows7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\ProgramData\Winlogin.exe"C:\ProgramData\Winlogin.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:2060
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
113KB
MD58c5693544eefeef29423f20b3b2abaf8
SHA167bfe01d75d1dc6f952089f2872f51dd02803bdc
SHA256617dfa640a93ce037bbcbe9bf4106cc9c9ea2049020f131afa500fe0c2630d73
SHA5121d627ce12f9e4a9405154edf6671dcedcc71714a774e1c8bab8c61cdd6f82775706b819f68147ef8dc2bc58284d05d64de1579779583d9b1ed5773a4df03d21b
-
Filesize
113KB
MD58c5693544eefeef29423f20b3b2abaf8
SHA167bfe01d75d1dc6f952089f2872f51dd02803bdc
SHA256617dfa640a93ce037bbcbe9bf4106cc9c9ea2049020f131afa500fe0c2630d73
SHA5121d627ce12f9e4a9405154edf6671dcedcc71714a774e1c8bab8c61cdd6f82775706b819f68147ef8dc2bc58284d05d64de1579779583d9b1ed5773a4df03d21b