Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/12/2023, 02:39
Behavioral task
behavioral1
Sample
5e38bce5b175e470433f314ed3873cc8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5e38bce5b175e470433f314ed3873cc8.exe
Resource
win10v2004-20231127-en
General
-
Target
5e38bce5b175e470433f314ed3873cc8.exe
-
Size
1.6MB
-
MD5
5e38bce5b175e470433f314ed3873cc8
-
SHA1
567325adefc324f0fefd07a6c021d94a246d7d05
-
SHA256
32a152f5e46b11a74987365bc083824b43f283620c0d813cb1f1e37520a1f36c
-
SHA512
2e98f347222f0f969868ad0fa34c306ea6a7ffb8a4757fdd85652418cf7430ca1fbffa22d0bce9c71baf820088fbce1a7ab948c77023063381af633c1df289b5
-
SSDEEP
49152:qWg8wUmZOzqiavjDUJO/WH89ctcO0ljbbQnIQGotBKqy8TJCHEGU42sn6:ZiUmZOzqiavjDUM/WH89y8bboGO
Malware Config
Extracted
risepro
193.233.132.51
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 5e38bce5b175e470433f314ed3873cc8.exe -
Loads dropped DLL 1 IoCs
pid Process 2216 5e38bce5b175e470433f314ed3873cc8.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 5e38bce5b175e470433f314ed3873cc8.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\GroupPolicy 5e38bce5b175e470433f314ed3873cc8.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini 5e38bce5b175e470433f314ed3873cc8.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 5e38bce5b175e470433f314ed3873cc8.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 5e38bce5b175e470433f314ed3873cc8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3024 schtasks.exe 2556 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2216 wrote to memory of 3024 2216 5e38bce5b175e470433f314ed3873cc8.exe 29 PID 2216 wrote to memory of 3024 2216 5e38bce5b175e470433f314ed3873cc8.exe 29 PID 2216 wrote to memory of 3024 2216 5e38bce5b175e470433f314ed3873cc8.exe 29 PID 2216 wrote to memory of 3024 2216 5e38bce5b175e470433f314ed3873cc8.exe 29 PID 2216 wrote to memory of 2556 2216 5e38bce5b175e470433f314ed3873cc8.exe 31 PID 2216 wrote to memory of 2556 2216 5e38bce5b175e470433f314ed3873cc8.exe 31 PID 2216 wrote to memory of 2556 2216 5e38bce5b175e470433f314ed3873cc8.exe 31 PID 2216 wrote to memory of 2556 2216 5e38bce5b175e470433f314ed3873cc8.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e38bce5b175e470433f314ed3873cc8.exe"C:\Users\Admin\AppData\Local\Temp\5e38bce5b175e470433f314ed3873cc8.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:3024
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD55e38bce5b175e470433f314ed3873cc8
SHA1567325adefc324f0fefd07a6c021d94a246d7d05
SHA25632a152f5e46b11a74987365bc083824b43f283620c0d813cb1f1e37520a1f36c
SHA5122e98f347222f0f969868ad0fa34c306ea6a7ffb8a4757fdd85652418cf7430ca1fbffa22d0bce9c71baf820088fbce1a7ab948c77023063381af633c1df289b5