Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    04/09/2023, 22:40

General

  • Target

    5c96016a468b97f80583b04b4d72d5f73576f7bbb9227c24612019377b8b0623.exe

  • Size

    960KB

  • MD5

    1a173f8fb5505e4b41a4dac9f3cb638a

  • SHA1

    965f6d7d70e00b1f8050b3f3e1b59c5e2a437558

  • SHA256

    5c96016a468b97f80583b04b4d72d5f73576f7bbb9227c24612019377b8b0623

  • SHA512

    aaff59cd2e3c0c5af75a59836b9a94fa6b9a6eaee2a04b36a4825b393d4eafed12c0dfd9639978d80e6a59b3d557560f39e2bdacc60dbf0a7df4885cc3052ea5

  • SSDEEP

    24576:r9POTuyNVxSnULWgUO7BLvceXHphatxFCuG:r9PkumOULWgHBbhJgtxFm

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 61 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c96016a468b97f80583b04b4d72d5f73576f7bbb9227c24612019377b8b0623.exe
    "C:\Users\Admin\AppData\Local\Temp\5c96016a468b97f80583b04b4d72d5f73576f7bbb9227c24612019377b8b0623.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1456
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2668
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command -
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2504
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1808
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command -
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1096
    • C:\Users\Admin\AppData\Local\5c96016a468b97f80583b04b4d72d5f73576f7bbb9227c24612019377b8b0623.exe
      "C:\Users\Admin\AppData\Local\5c96016a468b97f80583b04b4d72d5f73576f7bbb9227c24612019377b8b0623.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1692
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3012
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command -
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1068
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:112
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command -
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\5c96016a468b97f80583b04b4d72d5f73576f7bbb9227c24612019377b8b0623.exe

    Filesize

    960KB

    MD5

    1a173f8fb5505e4b41a4dac9f3cb638a

    SHA1

    965f6d7d70e00b1f8050b3f3e1b59c5e2a437558

    SHA256

    5c96016a468b97f80583b04b4d72d5f73576f7bbb9227c24612019377b8b0623

    SHA512

    aaff59cd2e3c0c5af75a59836b9a94fa6b9a6eaee2a04b36a4825b393d4eafed12c0dfd9639978d80e6a59b3d557560f39e2bdacc60dbf0a7df4885cc3052ea5

  • C:\Users\Admin\AppData\Local\5c96016a468b97f80583b04b4d72d5f73576f7bbb9227c24612019377b8b0623.exe

    Filesize

    960KB

    MD5

    1a173f8fb5505e4b41a4dac9f3cb638a

    SHA1

    965f6d7d70e00b1f8050b3f3e1b59c5e2a437558

    SHA256

    5c96016a468b97f80583b04b4d72d5f73576f7bbb9227c24612019377b8b0623

    SHA512

    aaff59cd2e3c0c5af75a59836b9a94fa6b9a6eaee2a04b36a4825b393d4eafed12c0dfd9639978d80e6a59b3d557560f39e2bdacc60dbf0a7df4885cc3052ea5

  • C:\Users\Admin\AppData\Local\5c96016a468b97f80583b04b4d72d5f73576f7bbb9227c24612019377b8b0623.exe

    Filesize

    960KB

    MD5

    1a173f8fb5505e4b41a4dac9f3cb638a

    SHA1

    965f6d7d70e00b1f8050b3f3e1b59c5e2a437558

    SHA256

    5c96016a468b97f80583b04b4d72d5f73576f7bbb9227c24612019377b8b0623

    SHA512

    aaff59cd2e3c0c5af75a59836b9a94fa6b9a6eaee2a04b36a4825b393d4eafed12c0dfd9639978d80e6a59b3d557560f39e2bdacc60dbf0a7df4885cc3052ea5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\JRI9H2I4OA4ZA6AU30ZH.temp

    Filesize

    7KB

    MD5

    f1e26b09b4156552a6dc7ebc80df5fc3

    SHA1

    0da7fadbe955d5cf362f9d3e5984cacc9547b556

    SHA256

    29029ea75d4f1eed736725adaa25cc8906693d0d58c2afa4541ab11d217066fd

    SHA512

    226657b349bb269e3f334b762785f96383d37c64d02f9d3d029ff85da867caddf9743a20f638356d388819881d1795c9168496ab6af8dfab7c466ea0cf717547

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    f1e26b09b4156552a6dc7ebc80df5fc3

    SHA1

    0da7fadbe955d5cf362f9d3e5984cacc9547b556

    SHA256

    29029ea75d4f1eed736725adaa25cc8906693d0d58c2afa4541ab11d217066fd

    SHA512

    226657b349bb269e3f334b762785f96383d37c64d02f9d3d029ff85da867caddf9743a20f638356d388819881d1795c9168496ab6af8dfab7c466ea0cf717547

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    f1e26b09b4156552a6dc7ebc80df5fc3

    SHA1

    0da7fadbe955d5cf362f9d3e5984cacc9547b556

    SHA256

    29029ea75d4f1eed736725adaa25cc8906693d0d58c2afa4541ab11d217066fd

    SHA512

    226657b349bb269e3f334b762785f96383d37c64d02f9d3d029ff85da867caddf9743a20f638356d388819881d1795c9168496ab6af8dfab7c466ea0cf717547

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    f1e26b09b4156552a6dc7ebc80df5fc3

    SHA1

    0da7fadbe955d5cf362f9d3e5984cacc9547b556

    SHA256

    29029ea75d4f1eed736725adaa25cc8906693d0d58c2afa4541ab11d217066fd

    SHA512

    226657b349bb269e3f334b762785f96383d37c64d02f9d3d029ff85da867caddf9743a20f638356d388819881d1795c9168496ab6af8dfab7c466ea0cf717547

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    aa4904368ffa5744a24642e0b064c2e3

    SHA1

    89cf1b8d49a5897ea18a1d2ee71d49418c9c142b

    SHA256

    b00190b43f1ef49648f0f92e6572465400e95ec7fc9c4def309dacbe04c79b55

    SHA512

    b76284244fcfec7c28bda119bf687e27240d5766d32bb9980c513b57cc787b9f2b95b99dcb9dff21d03b13f678bbab72f337b6f230d1a830e5a89d8d99e220c0

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    aa4904368ffa5744a24642e0b064c2e3

    SHA1

    89cf1b8d49a5897ea18a1d2ee71d49418c9c142b

    SHA256

    b00190b43f1ef49648f0f92e6572465400e95ec7fc9c4def309dacbe04c79b55

    SHA512

    b76284244fcfec7c28bda119bf687e27240d5766d32bb9980c513b57cc787b9f2b95b99dcb9dff21d03b13f678bbab72f337b6f230d1a830e5a89d8d99e220c0

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    f1e26b09b4156552a6dc7ebc80df5fc3

    SHA1

    0da7fadbe955d5cf362f9d3e5984cacc9547b556

    SHA256

    29029ea75d4f1eed736725adaa25cc8906693d0d58c2afa4541ab11d217066fd

    SHA512

    226657b349bb269e3f334b762785f96383d37c64d02f9d3d029ff85da867caddf9743a20f638356d388819881d1795c9168496ab6af8dfab7c466ea0cf717547

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    aa4904368ffa5744a24642e0b064c2e3

    SHA1

    89cf1b8d49a5897ea18a1d2ee71d49418c9c142b

    SHA256

    b00190b43f1ef49648f0f92e6572465400e95ec7fc9c4def309dacbe04c79b55

    SHA512

    b76284244fcfec7c28bda119bf687e27240d5766d32bb9980c513b57cc787b9f2b95b99dcb9dff21d03b13f678bbab72f337b6f230d1a830e5a89d8d99e220c0

  • C:\Users\Default\Desktop\athletes.exe

    Filesize

    960KB

    MD5

    1a173f8fb5505e4b41a4dac9f3cb638a

    SHA1

    965f6d7d70e00b1f8050b3f3e1b59c5e2a437558

    SHA256

    5c96016a468b97f80583b04b4d72d5f73576f7bbb9227c24612019377b8b0623

    SHA512

    aaff59cd2e3c0c5af75a59836b9a94fa6b9a6eaee2a04b36a4825b393d4eafed12c0dfd9639978d80e6a59b3d557560f39e2bdacc60dbf0a7df4885cc3052ea5

  • \Users\Admin\AppData\Local\5c96016a468b97f80583b04b4d72d5f73576f7bbb9227c24612019377b8b0623.exe

    Filesize

    960KB

    MD5

    1a173f8fb5505e4b41a4dac9f3cb638a

    SHA1

    965f6d7d70e00b1f8050b3f3e1b59c5e2a437558

    SHA256

    5c96016a468b97f80583b04b4d72d5f73576f7bbb9227c24612019377b8b0623

    SHA512

    aaff59cd2e3c0c5af75a59836b9a94fa6b9a6eaee2a04b36a4825b393d4eafed12c0dfd9639978d80e6a59b3d557560f39e2bdacc60dbf0a7df4885cc3052ea5

  • memory/1096-62-0x0000000073040000-0x00000000735EB000-memory.dmp

    Filesize

    5.7MB

  • memory/1096-59-0x0000000073040000-0x00000000735EB000-memory.dmp

    Filesize

    5.7MB

  • memory/1096-64-0x0000000002760000-0x00000000027A0000-memory.dmp

    Filesize

    256KB

  • memory/1096-61-0x0000000073040000-0x00000000735EB000-memory.dmp

    Filesize

    5.7MB

  • memory/1096-60-0x0000000002760000-0x00000000027A0000-memory.dmp

    Filesize

    256KB

  • memory/1456-68-0x0000000004890000-0x0000000004990000-memory.dmp

    Filesize

    1024KB

  • memory/1456-8-0x0000000004150000-0x0000000004151000-memory.dmp

    Filesize

    4KB

  • memory/1456-82-0x0000000004890000-0x0000000004990000-memory.dmp

    Filesize

    1024KB

  • memory/1456-80-0x0000000000400000-0x000000000060A000-memory.dmp

    Filesize

    2.0MB

  • memory/1456-16-0x0000000000400000-0x000000000060A000-memory.dmp

    Filesize

    2.0MB

  • memory/1456-4-0x0000000004160000-0x0000000004161000-memory.dmp

    Filesize

    4KB

  • memory/1456-1-0x00000000777A0000-0x00000000777A2000-memory.dmp

    Filesize

    8KB

  • memory/1456-3-0x0000000004130000-0x0000000004131000-memory.dmp

    Filesize

    4KB

  • memory/1456-10-0x00000000020D0000-0x00000000020D1000-memory.dmp

    Filesize

    4KB

  • memory/1456-34-0x0000000000400000-0x000000000060A000-memory.dmp

    Filesize

    2.0MB

  • memory/1456-2-0x0000000000400000-0x000000000060A000-memory.dmp

    Filesize

    2.0MB

  • memory/1456-9-0x00000000020C0000-0x00000000020C1000-memory.dmp

    Filesize

    4KB

  • memory/1456-53-0x0000000000400000-0x000000000060A000-memory.dmp

    Filesize

    2.0MB

  • memory/1456-69-0x0000000010000000-0x0000000010036000-memory.dmp

    Filesize

    216KB

  • memory/1456-7-0x0000000004110000-0x0000000004111000-memory.dmp

    Filesize

    4KB

  • memory/1456-11-0x0000000004180000-0x0000000004181000-memory.dmp

    Filesize

    4KB

  • memory/1456-19-0x0000000000400000-0x000000000060A000-memory.dmp

    Filesize

    2.0MB

  • memory/1456-63-0x0000000000400000-0x000000000060A000-memory.dmp

    Filesize

    2.0MB

  • memory/1456-99-0x00000000053D0000-0x00000000055DA000-memory.dmp

    Filesize

    2.0MB

  • memory/1456-49-0x0000000000400000-0x000000000060A000-memory.dmp

    Filesize

    2.0MB

  • memory/1456-6-0x0000000004170000-0x0000000004171000-memory.dmp

    Filesize

    4KB

  • memory/1456-5-0x00000000020E0000-0x00000000020E1000-memory.dmp

    Filesize

    4KB

  • memory/1456-0-0x0000000000400000-0x000000000060A000-memory.dmp

    Filesize

    2.0MB

  • memory/1456-20-0x0000000000400000-0x000000000060A000-memory.dmp

    Filesize

    2.0MB

  • memory/1456-67-0x0000000004890000-0x0000000004990000-memory.dmp

    Filesize

    1024KB

  • memory/1692-91-0x00000000040F0000-0x00000000040F1000-memory.dmp

    Filesize

    4KB

  • memory/1692-107-0x0000000000400000-0x000000000060A000-memory.dmp

    Filesize

    2.0MB

  • memory/1692-92-0x0000000004180000-0x0000000004181000-memory.dmp

    Filesize

    4KB

  • memory/1692-167-0x0000000000400000-0x000000000060A000-memory.dmp

    Filesize

    2.0MB

  • memory/1692-100-0x0000000000400000-0x000000000060A000-memory.dmp

    Filesize

    2.0MB

  • memory/1692-106-0x0000000000400000-0x000000000060A000-memory.dmp

    Filesize

    2.0MB

  • memory/1692-153-0x0000000000400000-0x000000000060A000-memory.dmp

    Filesize

    2.0MB

  • memory/1692-142-0x0000000000400000-0x000000000060A000-memory.dmp

    Filesize

    2.0MB

  • memory/1692-121-0x0000000000400000-0x000000000060A000-memory.dmp

    Filesize

    2.0MB

  • memory/1692-159-0x0000000010000000-0x0000000010036000-memory.dmp

    Filesize

    216KB

  • memory/1692-169-0x0000000000400000-0x000000000060A000-memory.dmp

    Filesize

    2.0MB

  • memory/1692-138-0x0000000000400000-0x000000000060A000-memory.dmp

    Filesize

    2.0MB

  • memory/1692-168-0x0000000000400000-0x000000000060A000-memory.dmp

    Filesize

    2.0MB

  • memory/1692-164-0x0000000000400000-0x000000000060A000-memory.dmp

    Filesize

    2.0MB

  • memory/1692-83-0x0000000000400000-0x000000000060A000-memory.dmp

    Filesize

    2.0MB

  • memory/1692-84-0x0000000000400000-0x000000000060A000-memory.dmp

    Filesize

    2.0MB

  • memory/1692-86-0x0000000004130000-0x0000000004131000-memory.dmp

    Filesize

    4KB

  • memory/1692-87-0x0000000004160000-0x0000000004161000-memory.dmp

    Filesize

    4KB

  • memory/1692-85-0x0000000004150000-0x0000000004151000-memory.dmp

    Filesize

    4KB

  • memory/1692-89-0x0000000004170000-0x0000000004171000-memory.dmp

    Filesize

    4KB

  • memory/1692-88-0x0000000004110000-0x0000000004111000-memory.dmp

    Filesize

    4KB

  • memory/1692-90-0x00000000040E0000-0x00000000040E1000-memory.dmp

    Filesize

    4KB

  • memory/1808-46-0x0000000002800000-0x0000000002840000-memory.dmp

    Filesize

    256KB

  • memory/1808-52-0x0000000002800000-0x0000000002840000-memory.dmp

    Filesize

    256KB

  • memory/1808-51-0x0000000002800000-0x0000000002840000-memory.dmp

    Filesize

    256KB

  • memory/1808-50-0x00000000735F0000-0x0000000073B9B000-memory.dmp

    Filesize

    5.7MB

  • memory/1808-48-0x0000000002800000-0x0000000002840000-memory.dmp

    Filesize

    256KB

  • memory/1808-47-0x00000000735F0000-0x0000000073B9B000-memory.dmp

    Filesize

    5.7MB

  • memory/1808-45-0x00000000735F0000-0x0000000073B9B000-memory.dmp

    Filesize

    5.7MB

  • memory/2504-31-0x00000000026D0000-0x0000000002710000-memory.dmp

    Filesize

    256KB

  • memory/2504-32-0x00000000741E0000-0x000000007478B000-memory.dmp

    Filesize

    5.7MB

  • memory/2504-33-0x00000000026D0000-0x0000000002710000-memory.dmp

    Filesize

    256KB

  • memory/2504-35-0x00000000741E0000-0x000000007478B000-memory.dmp

    Filesize

    5.7MB

  • memory/2504-36-0x00000000026D0000-0x0000000002710000-memory.dmp

    Filesize

    256KB

  • memory/2504-30-0x00000000741E0000-0x000000007478B000-memory.dmp

    Filesize

    5.7MB

  • memory/2504-37-0x00000000026D0000-0x0000000002710000-memory.dmp

    Filesize

    256KB

  • memory/2668-14-0x00000000735F0000-0x0000000073B9B000-memory.dmp

    Filesize

    5.7MB

  • memory/2668-17-0x00000000024D0000-0x0000000002510000-memory.dmp

    Filesize

    256KB

  • memory/2668-15-0x00000000735F0000-0x0000000073B9B000-memory.dmp

    Filesize

    5.7MB

  • memory/2668-21-0x00000000735F0000-0x0000000073B9B000-memory.dmp

    Filesize

    5.7MB

  • memory/2668-18-0x00000000024D0000-0x0000000002510000-memory.dmp

    Filesize

    256KB

  • memory/2668-22-0x00000000024D0000-0x0000000002510000-memory.dmp

    Filesize

    256KB

  • memory/2668-23-0x00000000024D0000-0x0000000002510000-memory.dmp

    Filesize

    256KB

  • memory/2668-24-0x00000000024D0000-0x0000000002510000-memory.dmp

    Filesize

    256KB

  • memory/3012-101-0x00000000735F0000-0x0000000073B9B000-memory.dmp

    Filesize

    5.7MB

  • memory/3012-102-0x00000000026A0000-0x00000000026E0000-memory.dmp

    Filesize

    256KB

  • memory/3012-109-0x00000000026A0000-0x00000000026E0000-memory.dmp

    Filesize

    256KB

  • memory/3012-104-0x00000000026A0000-0x00000000026E0000-memory.dmp

    Filesize

    256KB

  • memory/3012-103-0x00000000026A0000-0x00000000026E0000-memory.dmp

    Filesize

    256KB

  • memory/3012-105-0x00000000735F0000-0x0000000073B9B000-memory.dmp

    Filesize

    5.7MB

  • memory/3012-108-0x00000000735F0000-0x0000000073B9B000-memory.dmp

    Filesize

    5.7MB