Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2023, 07:33

General

  • Target

    0x002a00000000f66c-1394.exe

  • Size

    203KB

  • MD5

    0f6c959105b95ab977bf1539cfe7286a

  • SHA1

    834065fe82965a1d452dc85e0b6dba34cbf8e19a

  • SHA256

    52c0b7d7bda6a4ec4e97c7be75aa098c3399768478bf798034b1d3851d37b5a5

  • SHA512

    81b0dd7ad5e27d40747ce28dcad1850842ba653cb5d98f14baa33543671eb2d85b4c9d20863e331b90362ac6502c5526a5a550be88868f45566673387ace4cbc

  • SSDEEP

    6144:sLV6Bta6dtJmakIM5DPjoWNdOPgZpqS0J:sLV6Btpmk7EdOPQpG

Malware Config

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x002a00000000f66c-1394.exe
    "C:\Users\Admin\AppData\Local\Temp\0x002a00000000f66c-1394.exe"
    1⤵
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks.exe" /create /f /tn "LAN Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp6A5.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2880
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks.exe" /create /f /tn "LAN Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpA8D.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2432

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp6A5.tmp

    Filesize

    1KB

    MD5

    d376adb95e4dbeed9b3e42e3670747e4

    SHA1

    ab493fafb570e9c5ba0d0074f28c8ee27b44dfd8

    SHA256

    e1b519868da46cdddeaf034065a3ce42d48efd6cc4e94d53a95436d8637ed679

    SHA512

    4efaee890a09d7afd49b4df76e4d85f4c2b79188dee176251670ad521f022d2763135f9f2af544f92742081d313af6c5b6d7dbcf2c051333678ba54a71d92e24

  • C:\Users\Admin\AppData\Local\Temp\tmpA8D.tmp

    Filesize

    1KB

    MD5

    10fabfd2c6060c2db1bd6c6f3070be16

    SHA1

    65f418ad9715165a57efb4da44717dfcdfb71097

    SHA256

    1dd3aba494ff6ac9cd0437cbdeac0b0da0dea26828f45acded7d40f1b3461270

    SHA512

    9b21ce066c75fe9d4b12d8770920c51f5dcd0ba986b453fec93643f08d656b13e8d618d712414ca4dfda3f0cfad7371b3c2ad2d5620909e0ce43f1352d8a4485

  • memory/1704-54-0x0000000074760000-0x0000000074D0B000-memory.dmp

    Filesize

    5.7MB

  • memory/1704-56-0x0000000000180000-0x00000000001C0000-memory.dmp

    Filesize

    256KB

  • memory/1704-55-0x0000000074760000-0x0000000074D0B000-memory.dmp

    Filesize

    5.7MB

  • memory/1704-64-0x0000000074760000-0x0000000074D0B000-memory.dmp

    Filesize

    5.7MB

  • memory/1704-65-0x0000000074760000-0x0000000074D0B000-memory.dmp

    Filesize

    5.7MB

  • memory/1704-66-0x0000000000180000-0x00000000001C0000-memory.dmp

    Filesize

    256KB