Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 01:02
Static task
static1
Behavioral task
behavioral1
Sample
0967209acb6af811572b6576a90abd19.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0967209acb6af811572b6576a90abd19.exe
Resource
win10v2004-20231215-en
General
-
Target
0967209acb6af811572b6576a90abd19.exe
-
Size
3.1MB
-
MD5
0967209acb6af811572b6576a90abd19
-
SHA1
a5385c87600986a612a03d26ea1e9ff37ffdcc31
-
SHA256
e72d1282f30fed67d34ed0eb66169c20d3744ab2d2bc1361d178412a8801da60
-
SHA512
208d5740902ba0ee1afdfee46d1445fc2edd0579d2c0e50a742121fee0b10a174ed3e32f7ddf9f6239a3398d1adc154015eaf56da2a174f3d4a2fd9cac7c6a46
-
SSDEEP
98304:T6YGnLzxmAf4GxIAfxmYPirQZRLzxmAf4GxIAfxmYPG:TCxmAf4vAOr2xxmAf4vAK
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 2488 CMD.exe 2796 firedaemon.exe 2824 FireDaemon.EXE 2812 Winnet.exe 808 Winnet.exe -
Loads dropped DLL 11 IoCs
pid Process 1520 0967209acb6af811572b6576a90abd19.exe 1520 0967209acb6af811572b6576a90abd19.exe 2488 CMD.exe 2488 CMD.exe 2824 FireDaemon.EXE 2824 FireDaemon.EXE 2812 Winnet.exe 2616 WerFault.exe 2616 WerFault.exe 2812 Winnet.exe 808 Winnet.exe -
resource yara_rule behavioral1/memory/2812-50-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral1/memory/808-44-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral1/memory/2812-33-0x0000000000400000-0x0000000000459000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2616 2824 WerFault.exe 18 -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE Winnet.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Cygnus Solutions Winnet.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Cygnus Solutions\Cygwin Winnet.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Cygnus Solutions\Cygwin\mounts v2 Winnet.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Cygnus Solutions\Cygwin\Program Options Winnet.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2812 Winnet.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1520 wrote to memory of 2488 1520 0967209acb6af811572b6576a90abd19.exe 27 PID 1520 wrote to memory of 2488 1520 0967209acb6af811572b6576a90abd19.exe 27 PID 1520 wrote to memory of 2488 1520 0967209acb6af811572b6576a90abd19.exe 27 PID 1520 wrote to memory of 2488 1520 0967209acb6af811572b6576a90abd19.exe 27 PID 2488 wrote to memory of 2796 2488 CMD.exe 25 PID 2488 wrote to memory of 2796 2488 CMD.exe 25 PID 2488 wrote to memory of 2796 2488 CMD.exe 25 PID 2488 wrote to memory of 2796 2488 CMD.exe 25 PID 1520 wrote to memory of 2580 1520 0967209acb6af811572b6576a90abd19.exe 24 PID 1520 wrote to memory of 2580 1520 0967209acb6af811572b6576a90abd19.exe 24 PID 1520 wrote to memory of 2580 1520 0967209acb6af811572b6576a90abd19.exe 24 PID 1520 wrote to memory of 2580 1520 0967209acb6af811572b6576a90abd19.exe 24 PID 2580 wrote to memory of 2112 2580 net.exe 23 PID 2580 wrote to memory of 2112 2580 net.exe 23 PID 2580 wrote to memory of 2112 2580 net.exe 23 PID 2580 wrote to memory of 2112 2580 net.exe 23 PID 2824 wrote to memory of 2812 2824 FireDaemon.EXE 22 PID 2824 wrote to memory of 2812 2824 FireDaemon.EXE 22 PID 2824 wrote to memory of 2812 2824 FireDaemon.EXE 22 PID 2824 wrote to memory of 2812 2824 FireDaemon.EXE 22 PID 2824 wrote to memory of 2616 2824 FireDaemon.EXE 20 PID 2824 wrote to memory of 2616 2824 FireDaemon.EXE 20 PID 2824 wrote to memory of 2616 2824 FireDaemon.EXE 20 PID 2824 wrote to memory of 2616 2824 FireDaemon.EXE 20 PID 2812 wrote to memory of 808 2812 Winnet.exe 19 PID 2812 wrote to memory of 808 2812 Winnet.exe 19 PID 2812 wrote to memory of 808 2812 Winnet.exe 19 PID 2812 wrote to memory of 808 2812 Winnet.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\0967209acb6af811572b6576a90abd19.exe"C:\Users\Admin\AppData\Local\Temp\0967209acb6af811572b6576a90abd19.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" start winnet2⤵
- Suspicious use of WriteProcessMemory
PID:2580
-
-
C:\Users\Admin\AppData\Local\Temp\CMD.exe"C:\Users\Admin\AppData\Local\Temp\CMD.exe" /C SET MXHOME=%cd%&SET MXBIN=%cd%&firedaemon -i winnet "%cd%" "%cd%\Winnet.exe" "Winnet.dll" Y 0 0 N Y>>debug.txt2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2488
-
-
C:\Users\Admin\AppData\Local\Temp\FireDaemon.EXEC:\Users\Admin\AppData\Local\Temp\FireDaemon.EXE1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 2122⤵
- Loads dropped DLL
- Program crash
PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\Winnet.exeC:\Users\Admin\AppData\Local\Temp\Winnet.exe Winnet.dll2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\Winnet.exeC:\Users\Admin\AppData\Local\Temp\Winnet.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:808
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start winnet1⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\firedaemon.exefiredaemon -i winnet "C:\Users\Admin\AppData\Local\Temp" "C:\Users\Admin\AppData\Local\Temp\Winnet.exe" "Winnet.dll" Y 0 0 N Y1⤵
- Executes dropped EXE
PID:2796