Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 15:05
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe
Resource
win7-20230831-en
General
-
Target
SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe
-
Size
7.6MB
-
MD5
1c9f3c0258e923c07e1943498c789a3d
-
SHA1
e908faaa5eff19c6b653241253ecc6f28c83f436
-
SHA256
925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55
-
SHA512
92c16e56ae3d830e2110f97159d6f19fbf91b8bc56d29be207a0da12bd388a0fe68dd13c63dba5266d7d48be9f423d75c1e1e3ec16e6ad1458940f0bb0d0cb0b
-
SSDEEP
196608:o9/4OSUKi7eAGR6EGOUqJNTUQ0uG2DWMyoim06EV5X:U/4OSZeeLcvqJNF0uJW3/HX
Malware Config
Extracted
bitrat
1.38
185.225.75.68:3569
-
communication_password
0edcbe7d888380c49e7d1dcf67b6ea6e
-
tor_process
tor
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1508 uno.exe 2736 uno.exe 540 uno.exe 2708 uno.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2596 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 2596 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 2596 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 2596 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 2736 uno.exe 2708 uno.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2112 set thread context of 2596 2112 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 28 PID 1508 set thread context of 2736 1508 uno.exe 40 PID 540 set thread context of 2708 540 uno.exe 49 -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2512 schtasks.exe 3020 schtasks.exe 2452 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2596 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe Token: SeShutdownPrivilege 2596 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe Token: SeDebugPrivilege 2736 uno.exe Token: SeShutdownPrivilege 2736 uno.exe Token: SeDebugPrivilege 2708 uno.exe Token: SeShutdownPrivilege 2708 uno.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2596 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 2596 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2596 2112 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 28 PID 2112 wrote to memory of 2596 2112 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 28 PID 2112 wrote to memory of 2596 2112 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 28 PID 2112 wrote to memory of 2596 2112 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 28 PID 2112 wrote to memory of 2596 2112 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 28 PID 2112 wrote to memory of 2596 2112 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 28 PID 2112 wrote to memory of 2596 2112 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 28 PID 2112 wrote to memory of 2596 2112 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 28 PID 2112 wrote to memory of 2596 2112 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 28 PID 2112 wrote to memory of 2596 2112 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 28 PID 2112 wrote to memory of 2596 2112 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 28 PID 2112 wrote to memory of 2596 2112 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 28 PID 2112 wrote to memory of 2644 2112 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 29 PID 2112 wrote to memory of 2644 2112 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 29 PID 2112 wrote to memory of 2644 2112 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 29 PID 2112 wrote to memory of 2644 2112 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 29 PID 2112 wrote to memory of 1744 2112 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 32 PID 2112 wrote to memory of 1744 2112 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 32 PID 2112 wrote to memory of 1744 2112 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 32 PID 2112 wrote to memory of 1744 2112 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 32 PID 2112 wrote to memory of 2772 2112 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 34 PID 2112 wrote to memory of 2772 2112 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 34 PID 2112 wrote to memory of 2772 2112 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 34 PID 2112 wrote to memory of 2772 2112 SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe 34 PID 1744 wrote to memory of 2512 1744 cmd.exe 36 PID 1744 wrote to memory of 2512 1744 cmd.exe 36 PID 1744 wrote to memory of 2512 1744 cmd.exe 36 PID 1744 wrote to memory of 2512 1744 cmd.exe 36 PID 1592 wrote to memory of 1508 1592 taskeng.exe 39 PID 1592 wrote to memory of 1508 1592 taskeng.exe 39 PID 1592 wrote to memory of 1508 1592 taskeng.exe 39 PID 1592 wrote to memory of 1508 1592 taskeng.exe 39 PID 1508 wrote to memory of 2736 1508 uno.exe 40 PID 1508 wrote to memory of 2736 1508 uno.exe 40 PID 1508 wrote to memory of 2736 1508 uno.exe 40 PID 1508 wrote to memory of 2736 1508 uno.exe 40 PID 1508 wrote to memory of 2736 1508 uno.exe 40 PID 1508 wrote to memory of 2736 1508 uno.exe 40 PID 1508 wrote to memory of 2736 1508 uno.exe 40 PID 1508 wrote to memory of 2736 1508 uno.exe 40 PID 1508 wrote to memory of 2736 1508 uno.exe 40 PID 1508 wrote to memory of 2736 1508 uno.exe 40 PID 1508 wrote to memory of 2736 1508 uno.exe 40 PID 1508 wrote to memory of 2736 1508 uno.exe 40 PID 1508 wrote to memory of 2872 1508 uno.exe 41 PID 1508 wrote to memory of 2872 1508 uno.exe 41 PID 1508 wrote to memory of 2872 1508 uno.exe 41 PID 1508 wrote to memory of 2872 1508 uno.exe 41 PID 1508 wrote to memory of 1848 1508 uno.exe 43 PID 1508 wrote to memory of 1848 1508 uno.exe 43 PID 1508 wrote to memory of 1848 1508 uno.exe 43 PID 1508 wrote to memory of 1848 1508 uno.exe 43 PID 1508 wrote to memory of 948 1508 uno.exe 44 PID 1508 wrote to memory of 948 1508 uno.exe 44 PID 1508 wrote to memory of 948 1508 uno.exe 44 PID 1508 wrote to memory of 948 1508 uno.exe 44 PID 1848 wrote to memory of 3020 1848 cmd.exe 47 PID 1848 wrote to memory of 3020 1848 cmd.exe 47 PID 1848 wrote to memory of 3020 1848 cmd.exe 47 PID 1848 wrote to memory of 3020 1848 cmd.exe 47 PID 1592 wrote to memory of 540 1592 taskeng.exe 48 PID 1592 wrote to memory of 540 1592 taskeng.exe 48 PID 1592 wrote to memory of 540 1592 taskeng.exe 48 PID 1592 wrote to memory of 540 1592 taskeng.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2596
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\uno"2⤵PID:2644
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\uno\uno.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\uno\uno.exe'" /f3⤵
- Creates scheduled task(s)
PID:2512
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.6182.9511.exe" "C:\Users\Admin\AppData\Roaming\uno\uno.exe"2⤵PID:2772
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {5A194797-0BD1-42E6-B957-CFB8FE05E841} S-1-5-21-3185155662-718608226-894467740-1000:YETUIZPU\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Roaming\uno\uno.exeC:\Users\Admin\AppData\Roaming\uno\uno.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Roaming\uno\uno.exe"C:\Users\Admin\AppData\Roaming\uno\uno.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\uno"3⤵PID:2872
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\uno\uno.exe'" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\uno\uno.exe'" /f4⤵
- Creates scheduled task(s)
PID:3020
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\uno\uno.exe" "C:\Users\Admin\AppData\Roaming\uno\uno.exe"3⤵PID:948
-
-
-
C:\Users\Admin\AppData\Roaming\uno\uno.exeC:\Users\Admin\AppData\Roaming\uno\uno.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:540 -
C:\Users\Admin\AppData\Roaming\uno\uno.exe"C:\Users\Admin\AppData\Roaming\uno\uno.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\uno"3⤵PID:1680
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\uno\uno.exe'" /f3⤵PID:1276
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\uno\uno.exe'" /f4⤵
- Creates scheduled task(s)
PID:2452
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\uno\uno.exe" "C:\Users\Admin\AppData\Roaming\uno\uno.exe"3⤵PID:2072
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.6MB
MD51c9f3c0258e923c07e1943498c789a3d
SHA1e908faaa5eff19c6b653241253ecc6f28c83f436
SHA256925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55
SHA51292c16e56ae3d830e2110f97159d6f19fbf91b8bc56d29be207a0da12bd388a0fe68dd13c63dba5266d7d48be9f423d75c1e1e3ec16e6ad1458940f0bb0d0cb0b
-
Filesize
7.6MB
MD51c9f3c0258e923c07e1943498c789a3d
SHA1e908faaa5eff19c6b653241253ecc6f28c83f436
SHA256925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55
SHA51292c16e56ae3d830e2110f97159d6f19fbf91b8bc56d29be207a0da12bd388a0fe68dd13c63dba5266d7d48be9f423d75c1e1e3ec16e6ad1458940f0bb0d0cb0b
-
Filesize
7.6MB
MD51c9f3c0258e923c07e1943498c789a3d
SHA1e908faaa5eff19c6b653241253ecc6f28c83f436
SHA256925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55
SHA51292c16e56ae3d830e2110f97159d6f19fbf91b8bc56d29be207a0da12bd388a0fe68dd13c63dba5266d7d48be9f423d75c1e1e3ec16e6ad1458940f0bb0d0cb0b
-
Filesize
7.6MB
MD51c9f3c0258e923c07e1943498c789a3d
SHA1e908faaa5eff19c6b653241253ecc6f28c83f436
SHA256925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55
SHA51292c16e56ae3d830e2110f97159d6f19fbf91b8bc56d29be207a0da12bd388a0fe68dd13c63dba5266d7d48be9f423d75c1e1e3ec16e6ad1458940f0bb0d0cb0b
-
Filesize
7.6MB
MD51c9f3c0258e923c07e1943498c789a3d
SHA1e908faaa5eff19c6b653241253ecc6f28c83f436
SHA256925329eac4d8dfc71dfd0d222e935b31fb340bbb70367c7abf6553d921b64e55
SHA51292c16e56ae3d830e2110f97159d6f19fbf91b8bc56d29be207a0da12bd388a0fe68dd13c63dba5266d7d48be9f423d75c1e1e3ec16e6ad1458940f0bb0d0cb0b