Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    328s
  • max time network
    324s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/02/2024, 17:42

General

  • Target

    2XL.exe

  • Size

    14KB

  • MD5

    36367d4ca8c25ff75097353518735693

  • SHA1

    3b92cd2781c5f5b0fdce49f8ee533bd1da0471c8

  • SHA256

    7a03e9c6f4b5e6ba1b0d48a9b9660711f3d44897c64f60cf3f07f43ccdc3ad4d

  • SHA512

    fd45e1fe109ee871108b617a5d271e4118300d81da1d789a31bfdce3bbf03eafddfac7c6f6728367ca74ceb9bc8fadb844677dd2b5f63419805ec4e2a99f0513

  • SSDEEP

    384:pPoQ7ZfBtOrwJ5t0zgw0ZJnCfJptYcFwVc03K:lrZW80zgwcJujtYcFwVc6K

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Stops running service(s) 3 TTPs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 7 IoCs
  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Kills process with taskkill 1 IoCs
  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2XL.exe
    "C:\Users\Admin\AppData\Local\Temp\2XL.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4456
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      "wmic.exe" diskdrive get serialnumber
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4592
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c C:\Windows\kdmapper.exe C:\Windows\soardrv.sys
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3888
      • C:\Windows\kdmapper.exe
        C:\Windows\kdmapper.exe C:\Windows\soardrv.sys
        3⤵
        • Sets service image path in registry
        • Executes dropped EXE
        • Suspicious behavior: LoadsDriver
        • Suspicious use of AdjustPrivilegeToken
        PID:5096
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c taskkill /f /im WmiPrvSE.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2188
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im WmiPrvSE.exe
        3⤵
        • Kills process with taskkill
        PID:4860
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      "wmic.exe" diskdrive get serialnumber
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3528
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\mwserials.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4484
      • C:\Windows\SysWOW64\mode.com
        mode con: cols=90 lines=48
        3⤵
          PID:4076
        • C:\Windows\SysWOW64\net.exe
          net stop winmgmt /y
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1896
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop winmgmt /y
            4⤵
              PID:3876
          • C:\Windows\SysWOW64\net.exe
            net start winmgmt /y
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1308
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start winmgmt /y
              4⤵
                PID:1204
            • C:\Windows\SysWOW64\sc.exe
              sc stop winmgmt
              3⤵
              • Launches sc.exe
              PID:1564
            • C:\Windows\SysWOW64\sc.exe
              sc start winmgmt
              3⤵
              • Launches sc.exe
              PID:2096
            • C:\Windows\SysWOW64\ipconfig.exe
              ipconfig /flushdns
              3⤵
              • Gathers network information
              PID:5000
            • C:\Windows\SysWOW64\Wbem\WMIC.exe
              wmic bios get serialnumber
              3⤵
                PID:3828
              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                wmic csproduct get uuid
                3⤵
                  PID:3256
                • C:\Windows\SysWOW64\Wbem\WMIC.exe
                  wmic cpu get serialnumber
                  3⤵
                    PID:776
                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                    wmic cpu get processorid
                    3⤵
                      PID:2276
                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                      wmic diskdrive get serialnumber
                      3⤵
                        PID:512
                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                        wmic baseboard get serialnumber
                        3⤵
                          PID:4428
                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                          wmic memorychip get serialnumber
                          3⤵
                            PID:4868
                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                            wmic path Win32_NetworkAdapter where "PNPDeviceID like '%PCI%' AND NetConnectionStatus=2 AND AdapterTypeID='0'" get MacAddress
                            3⤵
                              PID:3556
                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                              wmic PATH Win32_VideoController GET Description,PNPDeviceID
                              3⤵
                                PID:4960
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k netsvcs -s Winmgmt
                            1⤵
                              PID:1452
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k netsvcs -s Winmgmt
                              1⤵
                              • Drops file in System32 directory
                              PID:4048
                              • C:\Windows\system32\wbem\WMIADAP.EXE
                                wmiadap.exe /F /T /R
                                2⤵
                                  PID:2840

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Windows\kdmapper.exe

                                Filesize

                                121KB

                                MD5

                                00047e72bb99132267a4bec3158917a2

                                SHA1

                                caf72159dba3bf2af1e6f68cbcbbab7b981a4f0e

                                SHA256

                                e4f0fa3c70a4c20e7f79ac8e0c0c7b3e58e97a8e9d42274d51a54ebf9e8da5e4

                                SHA512

                                7f573d3a8a68a491c45009ce1beabc8280ccf50e10048b019146e28892c8bf3e90519721682dec5a53aa2c623af952c9957da3cf5338cded801fc7dedce99dc5

                              • C:\mwserials.bat

                                Filesize

                                959B

                                MD5

                                b234459ca7379ab3554c58be83e2f196

                                SHA1

                                65bb76c20a0a391dd9b60e1b1a1c3ecb2039e2d7

                                SHA256

                                2603849d15e5f8fae2353b5ea28b0d67aeaaea1517a393654c67bd4651e90617

                                SHA512

                                7ba4925332ead5be8ef633bc60cc5e5e5f96acc5ca9c9c16cb2aa3f3ddba9aae93494725711cc231b087fc89ae46f98cd51ba6123111a5d2a6758662cd9d8246

                              • memory/4456-0-0x0000000000280000-0x0000000000288000-memory.dmp

                                Filesize

                                32KB

                              • memory/4456-1-0x0000000073270000-0x000000007395E000-memory.dmp

                                Filesize

                                6.9MB

                              • memory/4456-2-0x0000000004B10000-0x0000000004B20000-memory.dmp

                                Filesize

                                64KB

                              • memory/4456-3-0x0000000073270000-0x000000007395E000-memory.dmp

                                Filesize

                                6.9MB

                              • memory/4456-4-0x0000000004B10000-0x0000000004B20000-memory.dmp

                                Filesize

                                64KB