Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
20/11/2023, 18:24
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231025-en
General
-
Target
file.exe
-
Size
1.3MB
-
MD5
69f23f97b1191972b5d15ef501bbe343
-
SHA1
d794d7c041cbb22bd9ada979081013b739779226
-
SHA256
53a468e47ec24c4415be30db04c716e565486b76b92aebce9df7ab63825ee11f
-
SHA512
18034faff7744b6eba11bb0b1320da3db0d7153c04d3df71b5343b0dd8521749daa6af40e150437149a1f8c7cebaf2ff81fa98ceca97ad4bb9c608f3bb626aa9
-
SSDEEP
24576:NmmEs2wqfcRBxJCBEmAMpCOJMbgp2kvB1Pj5R+d3ThJgrU35Zln2i6:8dw/IyPxbgp2iB1Pju3TIrK5Zln2i6
Malware Config
Extracted
risepro
194.49.94.152
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk file.exe -
Loads dropped DLL 1 IoCs
pid Process 2972 file.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1060 schtasks.exe 2580 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2972 wrote to memory of 1060 2972 file.exe 28 PID 2972 wrote to memory of 1060 2972 file.exe 28 PID 2972 wrote to memory of 1060 2972 file.exe 28 PID 2972 wrote to memory of 1060 2972 file.exe 28 PID 2972 wrote to memory of 2580 2972 file.exe 30 PID 2972 wrote to memory of 2580 2972 file.exe 30 PID 2972 wrote to memory of 2580 2972 file.exe 30 PID 2972 wrote to memory of 2580 2972 file.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:1060
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD569f23f97b1191972b5d15ef501bbe343
SHA1d794d7c041cbb22bd9ada979081013b739779226
SHA25653a468e47ec24c4415be30db04c716e565486b76b92aebce9df7ab63825ee11f
SHA51218034faff7744b6eba11bb0b1320da3db0d7153c04d3df71b5343b0dd8521749daa6af40e150437149a1f8c7cebaf2ff81fa98ceca97ad4bb9c608f3bb626aa9
-
Filesize
1.3MB
MD569f23f97b1191972b5d15ef501bbe343
SHA1d794d7c041cbb22bd9ada979081013b739779226
SHA25653a468e47ec24c4415be30db04c716e565486b76b92aebce9df7ab63825ee11f
SHA51218034faff7744b6eba11bb0b1320da3db0d7153c04d3df71b5343b0dd8521749daa6af40e150437149a1f8c7cebaf2ff81fa98ceca97ad4bb9c608f3bb626aa9