Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
27/11/2023, 20:56
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231127-en
General
-
Target
file.exe
-
Size
1.5MB
-
MD5
a73eb8737506893d1ee4e47b8c08da5b
-
SHA1
072ffce2e4c2ab2aa8cf8a291aafe559f8db62f8
-
SHA256
09f926b67a54852a034cf11e792c0611da71d2e6fae3d5cf3fa7932265c41941
-
SHA512
ce1a318785fbf768c1bf516ab262254b6fea4dedfb1e695bc175b7b7a9e857b6ff6cb4730590e1d1dafffd763b4cd8628de8f5811b569c8737c3a7a3bf66eea8
-
SSDEEP
24576:2opGDjnvrPpkjos0OtjcFc5kM49dj+IuxWQOIjuJuVvhbqL0HtFcgekRP9dT0WNI:OnvrPGT0Egyudc4tI3bqL0NFchaP9dTy
Malware Config
Extracted
risepro
194.49.94.152
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk file.exe -
Loads dropped DLL 1 IoCs
pid Process 3032 file.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2944 schtasks.exe 2464 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2944 3032 file.exe 28 PID 3032 wrote to memory of 2944 3032 file.exe 28 PID 3032 wrote to memory of 2944 3032 file.exe 28 PID 3032 wrote to memory of 2944 3032 file.exe 28 PID 3032 wrote to memory of 2464 3032 file.exe 30 PID 3032 wrote to memory of 2464 3032 file.exe 30 PID 3032 wrote to memory of 2464 3032 file.exe 30 PID 3032 wrote to memory of 2464 3032 file.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:2944
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5a73eb8737506893d1ee4e47b8c08da5b
SHA1072ffce2e4c2ab2aa8cf8a291aafe559f8db62f8
SHA25609f926b67a54852a034cf11e792c0611da71d2e6fae3d5cf3fa7932265c41941
SHA512ce1a318785fbf768c1bf516ab262254b6fea4dedfb1e695bc175b7b7a9e857b6ff6cb4730590e1d1dafffd763b4cd8628de8f5811b569c8737c3a7a3bf66eea8
-
Filesize
1.5MB
MD5a73eb8737506893d1ee4e47b8c08da5b
SHA1072ffce2e4c2ab2aa8cf8a291aafe559f8db62f8
SHA25609f926b67a54852a034cf11e792c0611da71d2e6fae3d5cf3fa7932265c41941
SHA512ce1a318785fbf768c1bf516ab262254b6fea4dedfb1e695bc175b7b7a9e857b6ff6cb4730590e1d1dafffd763b4cd8628de8f5811b569c8737c3a7a3bf66eea8