Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2024, 23:43
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Loader.exe
Resource
win10v2004-20240226-en
General
-
Target
Loader.exe
-
Size
5.0MB
-
MD5
e9a24c7a42f9b296cc1e31dc3ea73b2b
-
SHA1
06e9607fb973400f0f110854ce90382965cd43d9
-
SHA256
03ee5437a1dad818f417db18dd50e16bc08c890b442874d841cd1a6a643c4010
-
SHA512
48af794e0042ce3cea37ff11e3f9b74d0a8e463018fc827d7ef459cc58252a5f436632c19b5d4674a6b54f02543005a294ef94f86d46d1ecff574ba6fab0464b
-
SSDEEP
98304:XrdCegVSGMzByLXMfivQayGnOht5RTc7kjRX1LNNDw7:waGMlyLXvvQdmmt5RTcGzLNe7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2836 X8O2R699CW.exe -
resource yara_rule behavioral2/memory/1824-0-0x00007FF661A70000-0x00007FF662490000-memory.dmp vmprotect behavioral2/files/0x000b00000002322a-6.dat vmprotect behavioral2/memory/2836-8-0x00007FF7FE790000-0x00007FF7FF1B0000-memory.dmp vmprotect -
Gathers network information 2 TTPs 3 IoCs
Uses commandline utility to view network configuration.
pid Process 2656 ipconfig.exe 4356 ipconfig.exe 3256 ipconfig.exe -
Kills process with taskkill 2 IoCs
pid Process 1612 taskkill.exe 2592 taskkill.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1980 PING.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1612 taskkill.exe Token: SeDebugPrivilege 2592 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1824 Loader.exe 2836 X8O2R699CW.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 1824 wrote to memory of 2628 1824 Loader.exe 89 PID 1824 wrote to memory of 2628 1824 Loader.exe 89 PID 2628 wrote to memory of 3172 2628 cmd.exe 91 PID 2628 wrote to memory of 3172 2628 cmd.exe 91 PID 3172 wrote to memory of 4484 3172 net.exe 92 PID 3172 wrote to memory of 4484 3172 net.exe 92 PID 1824 wrote to memory of 3428 1824 Loader.exe 93 PID 1824 wrote to memory of 3428 1824 Loader.exe 93 PID 3428 wrote to memory of 5020 3428 cmd.exe 94 PID 3428 wrote to memory of 5020 3428 cmd.exe 94 PID 1824 wrote to memory of 3156 1824 Loader.exe 95 PID 1824 wrote to memory of 3156 1824 Loader.exe 95 PID 3156 wrote to memory of 1612 3156 cmd.exe 96 PID 3156 wrote to memory of 1612 3156 cmd.exe 96 PID 1824 wrote to memory of 1740 1824 Loader.exe 100 PID 1824 wrote to memory of 1740 1824 Loader.exe 100 PID 1740 wrote to memory of 2656 1740 cmd.exe 101 PID 1740 wrote to memory of 2656 1740 cmd.exe 101 PID 1824 wrote to memory of 3656 1824 Loader.exe 102 PID 1824 wrote to memory of 3656 1824 Loader.exe 102 PID 3656 wrote to memory of 4356 3656 cmd.exe 103 PID 3656 wrote to memory of 4356 3656 cmd.exe 103 PID 1824 wrote to memory of 2836 1824 Loader.exe 109 PID 1824 wrote to memory of 2836 1824 Loader.exe 109 PID 1824 wrote to memory of 4516 1824 Loader.exe 110 PID 1824 wrote to memory of 4516 1824 Loader.exe 110 PID 4516 wrote to memory of 1980 4516 cmd.exe 112 PID 4516 wrote to memory of 1980 4516 cmd.exe 112 PID 2836 wrote to memory of 3880 2836 X8O2R699CW.exe 113 PID 2836 wrote to memory of 3880 2836 X8O2R699CW.exe 113 PID 3880 wrote to memory of 3056 3880 cmd.exe 114 PID 3880 wrote to memory of 3056 3880 cmd.exe 114 PID 3056 wrote to memory of 5016 3056 net.exe 115 PID 3056 wrote to memory of 5016 3056 net.exe 115 PID 2836 wrote to memory of 1164 2836 X8O2R699CW.exe 116 PID 2836 wrote to memory of 1164 2836 X8O2R699CW.exe 116 PID 1164 wrote to memory of 928 1164 cmd.exe 117 PID 1164 wrote to memory of 928 1164 cmd.exe 117 PID 2836 wrote to memory of 1720 2836 X8O2R699CW.exe 118 PID 2836 wrote to memory of 1720 2836 X8O2R699CW.exe 118 PID 1720 wrote to memory of 2592 1720 cmd.exe 119 PID 1720 wrote to memory of 2592 1720 cmd.exe 119 PID 2836 wrote to memory of 4568 2836 X8O2R699CW.exe 120 PID 2836 wrote to memory of 4568 2836 X8O2R699CW.exe 120 PID 4568 wrote to memory of 3256 4568 cmd.exe 121 PID 4568 wrote to memory of 3256 4568 cmd.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net start w32time2⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\system32\net.exenet start w32time3⤵
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start w32time4⤵PID:4484
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c w32tm /resync /nowait2⤵
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\system32\w32tm.exew32tm /resync /nowait3⤵PID:5020
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /IM RainbowSix.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\system32\taskkill.exetaskkill /IM RainbowSix.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /flushdns2⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\system32\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
PID:2656
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /flushdns2⤵
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\system32\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
PID:4356
-
-
-
C:\Users\Admin\AppData\Local\Temp\X8O2R699CW.exe"C:\Users\Admin\AppData\Local\Temp\X8O2R699CW.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net start w32time3⤵
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\system32\net.exenet start w32time4⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start w32time5⤵PID:5016
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c w32tm /resync /nowait3⤵
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\system32\w32tm.exew32tm /resync /nowait4⤵PID:928
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /IM RainbowSix.exe /f3⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\system32\taskkill.exetaskkill /IM RainbowSix.exe /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /flushdns3⤵
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\system32\ipconfig.exeipconfig /flushdns4⤵
- Gathers network information
PID:3256
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\Loader.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:1980
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD5ba0d6e436b6619c4c2001ba92a151a49
SHA152a4d81c782592a6836835fa589ffe3e09fa47c2
SHA25601f32aef7f4f83abac53c93d5d4868135efc87e827d0265d7e908e569506166b
SHA512fc4d5a33b3a33d5913743eebef5746808c48298043faf8fdb83c7541d647967e922518ef57b81958252186a50664b05c12db9adefdf33108cc7ded4a74801eb1