Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 04:11
Behavioral task
behavioral1
Sample
ba7ac856f35cdb987330f158cbf912f1.exe
Resource
win7-20240221-en
General
-
Target
ba7ac856f35cdb987330f158cbf912f1.exe
-
Size
1.4MB
-
MD5
ba7ac856f35cdb987330f158cbf912f1
-
SHA1
12baedb9974c0aed68152c561d27ccd69ef738bb
-
SHA256
c7441ab4aa5cd06bc38e5bdf2752bb1b8b8812ec9c7f4638d0b39b060eb3acc4
-
SHA512
7041231aface3df24247ff9166f8cb8cb6f24c5ba632b339569e3a87cf19470cf554e83354792ef222895e553a32b09e29cf2cbba5ebc8cd66b230c65ba9eb79
-
SSDEEP
24576:YwT7rC6q8fBAyGbBD437dpN+dJr7TUxCm4oyT25DqMMNsMLR38Xo:prC6qtGV0JnTU4UDqM+sML3
Malware Config
Signatures
-
Detects Eternity stealer 1 IoCs
resource yara_rule behavioral1/memory/2892-0-0x0000000000100000-0x000000000026E000-memory.dmp eternity_stealer -
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts enet-proxy.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ba7ac856f35cdb987330f158cbf912f1.exe ba7ac856f35cdb987330f158cbf912f1.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ba7ac856f35cdb987330f158cbf912f1.exe ba7ac856f35cdb987330f158cbf912f1.exe -
Executes dropped EXE 1 IoCs
pid Process 2540 enet-proxy.exe -
Loads dropped DLL 5 IoCs
pid Process 2892 ba7ac856f35cdb987330f158cbf912f1.exe 2712 WerFault.exe 2712 WerFault.exe 2712 WerFault.exe 2712 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2892 ba7ac856f35cdb987330f158cbf912f1.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2540 2892 ba7ac856f35cdb987330f158cbf912f1.exe 28 PID 2892 wrote to memory of 2540 2892 ba7ac856f35cdb987330f158cbf912f1.exe 28 PID 2892 wrote to memory of 2540 2892 ba7ac856f35cdb987330f158cbf912f1.exe 28 PID 2892 wrote to memory of 2692 2892 ba7ac856f35cdb987330f158cbf912f1.exe 30 PID 2892 wrote to memory of 2692 2892 ba7ac856f35cdb987330f158cbf912f1.exe 30 PID 2892 wrote to memory of 2692 2892 ba7ac856f35cdb987330f158cbf912f1.exe 30 PID 2540 wrote to memory of 2712 2540 enet-proxy.exe 33 PID 2540 wrote to memory of 2712 2540 enet-proxy.exe 33 PID 2540 wrote to memory of 2712 2540 enet-proxy.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba7ac856f35cdb987330f158cbf912f1.exe"C:\Users\Admin\AppData\Local\Temp\ba7ac856f35cdb987330f158cbf912f1.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\p3o02g2k.jek\enet-proxy.exe"C:\Users\Admin\AppData\Local\Temp\p3o02g2k.jek\enet-proxy.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2540 -s 2123⤵
- Loads dropped DLL
PID:2712
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2892 -s 11282⤵PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
277KB
MD582151b5508b429ce3431105cb06a3dbb
SHA1d345a75862276808c72998a8f66cc9209f97c606
SHA25683456651c09a3eb8e0b945b33de994c26ea98220620f2a7a34349c22bec33934
SHA512d2cba4a9af34744b273d537d4f7837f15f4c5156fd18f50b31009fbdb7dd413f1849373ec022f3cd0e8034087e19d623848fa6f25d977e145dc0fa91e3db6fbb