Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    65s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    05/07/2023, 06:16 UTC

General

  • Target

    c7e68f6c127994363927fda99e96c53e.exe

  • Size

    2.5MB

  • MD5

    c7e68f6c127994363927fda99e96c53e

  • SHA1

    9f88fa05eead627838d9b114fcb27121f0148bf6

  • SHA256

    ff49f132c704dd427042dcd0a58c5522be6e165c40efdeb17c042217f3b0fe9c

  • SHA512

    b02732aba26620700680c457cb95eff326f150826c51daea82f0f517121a29fdc19679f600ccedaf07d1b6928303ca759bc6533a2ed9d287e5330e5c6bb2a366

  • SSDEEP

    24576:B47stUFlg46o/LJiFBIbGAq4OCgwYM/wARmPj5tS7vp1LX7J4Cx4G2FYkr:B4wtUFlg4/2i4pFYk

Malware Config

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7e68f6c127994363927fda99e96c53e.exe
    "C:\Users\Admin\AppData\Local\Temp\c7e68f6c127994363927fda99e96c53e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ipconfig /release
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1664
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /release
        3⤵
        • Gathers network information
        PID:2540
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ipconfig /renew
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2228
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /renew
        3⤵
        • Gathers network information
        PID:844
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 620
      2⤵
      • Program crash
      PID:2704

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2176-54-0x00000000003A0000-0x000000000061A000-memory.dmp

    Filesize

    2.5MB

  • memory/2176-55-0x00000000049D0000-0x0000000004AAA000-memory.dmp

    Filesize

    872KB

  • memory/2176-57-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-56-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-59-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-63-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-61-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-65-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-67-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-69-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-71-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-73-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-75-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-77-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-79-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-81-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-83-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-85-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-87-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-89-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-91-0x0000000002320000-0x0000000002360000-memory.dmp

    Filesize

    256KB

  • memory/2176-92-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-94-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-96-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-98-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-100-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-102-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-104-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-106-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-108-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-110-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-112-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-114-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-116-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-118-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-120-0x00000000049D0000-0x0000000004AA5000-memory.dmp

    Filesize

    852KB

  • memory/2176-1379-0x0000000000620000-0x0000000000660000-memory.dmp

    Filesize

    256KB

  • memory/2176-1380-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2176-1381-0x0000000002250000-0x000000000229C000-memory.dmp

    Filesize

    304KB

  • memory/2176-1382-0x0000000002320000-0x0000000002360000-memory.dmp

    Filesize

    256KB

  • memory/2176-1384-0x0000000002360000-0x00000000024BC000-memory.dmp

    Filesize

    1.4MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.