Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 11:22

General

  • Target

    1a7bd3bb85833f8ed51f478e024af1b7.exe

  • Size

    322KB

  • MD5

    1a7bd3bb85833f8ed51f478e024af1b7

  • SHA1

    a3003e285ce0f7c04ea142351d581235e75e52aa

  • SHA256

    5851bf0214f12c68579c9b333ee5ed37b6ec5a9afebd519bd37aac0c3a25ea40

  • SHA512

    994117914190c32a71af59be095ab24569c1896b6dd7768f8247af4831ceb42dacc62e0ee90b09da2412c455f05973ef9d9efcc01cd631596e728d17ef7d583c

  • SSDEEP

    6144:Z/FjEVIUAbAoeKqv5ScGaBD00Daf6E36SfVFZDedW7J/h8O7o1r:ZREVI7bk/FVlDaf336SnZDj7php0

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a7bd3bb85833f8ed51f478e024af1b7.exe
    "C:\Users\Admin\AppData\Local\Temp\1a7bd3bb85833f8ed51f478e024af1b7.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\1a7bd3bb85833f8ed51f478e024af1b7.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:2620
    • C:\Users\Admin\AppData\Local\Temp\1a7bd3bb85833f8ed51f478e024af1b7\1a7bd3bb85833f8ed51f478e024af1b7.exe
      "C:\Users\Admin\AppData\Local\Temp\1a7bd3bb85833f8ed51f478e024af1b7\1a7bd3bb85833f8ed51f478e024af1b7.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2672
  • C:\Windows\SysWOW64\PING.EXE
    ping 1.1.1.1 -n 1 -w 1000
    1⤵
    • Runs ping.exe
    PID:2740
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:2988

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1a7bd3bb85833f8ed51f478e024af1b7\1a7bd3bb85833f8ed51f478e024af1b7.exe

      Filesize

      92KB

      MD5

      bb2aae9f26fffd5ee593883e3b996ff0

      SHA1

      87dd8602a4f092e8e15fd906b475d316c5d90060

      SHA256

      32d937c7191518ed3d7bafb35697d4dbd598e797991e96c8288e74aa626e5271

      SHA512

      4226c0d456ce01d82090c9484bfdd4c9f16bd87318358cd0543462ce08501c2bb00b1daed0cb3b6e911484fc5bf7e9e98dd566b443c21071fff5af15d48bd57f

    • \Users\Admin\AppData\Local\Temp\1a7bd3bb85833f8ed51f478e024af1b7\1a7bd3bb85833f8ed51f478e024af1b7.exe

      Filesize

      86KB

      MD5

      699accbe8cbf2b2142112d00f8277dcf

      SHA1

      77c5a1aa54ccad0a981dc28d10f33ec0bd83a08b

      SHA256

      e62a253c87cee51da89216d416c3f593cf5e55b896b8b7c98cce9d38520e3c29

      SHA512

      71d7efe9a748ab35634898540e9fd586a27af63a37c88bb62161584e92422fdc629180287445c567fcaa5f0d5635be8a63aca18fc340087f5c337bb0ce7115fd

    • memory/2024-13-0x0000000074720000-0x0000000074CCB000-memory.dmp

      Filesize

      5.7MB

    • memory/2024-1-0x0000000074720000-0x0000000074CCB000-memory.dmp

      Filesize

      5.7MB

    • memory/2024-0-0x0000000074720000-0x0000000074CCB000-memory.dmp

      Filesize

      5.7MB

    • memory/2024-2-0x00000000000F0000-0x0000000000130000-memory.dmp

      Filesize

      256KB

    • memory/2672-11-0x0000000000970000-0x00000000009B0000-memory.dmp

      Filesize

      256KB

    • memory/2672-12-0x0000000074720000-0x0000000074CCB000-memory.dmp

      Filesize

      5.7MB

    • memory/2672-10-0x0000000074720000-0x0000000074CCB000-memory.dmp

      Filesize

      5.7MB

    • memory/2672-16-0x0000000000970000-0x00000000009B0000-memory.dmp

      Filesize

      256KB

    • memory/2672-43-0x0000000000970000-0x00000000009B0000-memory.dmp

      Filesize

      256KB

    • memory/2672-42-0x0000000074720000-0x0000000074CCB000-memory.dmp

      Filesize

      5.7MB

    • memory/2672-47-0x0000000000970000-0x00000000009B0000-memory.dmp

      Filesize

      256KB