Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 10:21
Static task
static1
Behavioral task
behavioral1
Sample
3756ac8f01c9c6d1c1a2e9b51edff7deca0540f8954950200daae8b4c28a9888.exe
Resource
win7-20240319-en
General
-
Target
3756ac8f01c9c6d1c1a2e9b51edff7deca0540f8954950200daae8b4c28a9888.exe
-
Size
1.1MB
-
MD5
3a2f2086ac104d71f450b30ab47e36d5
-
SHA1
3c29394856e86bf4d1d255e70b51929011f4c75a
-
SHA256
3756ac8f01c9c6d1c1a2e9b51edff7deca0540f8954950200daae8b4c28a9888
-
SHA512
f81309eab8b1249edb563e99d83527276ae163e89cf8fbc6da1f096fd1453ec7cd1839be0e0cc5594d2a4a2b9ecd0ed102d4b14b05330290224d3a0d352bb9d2
-
SSDEEP
24576:o2O/GlJt+uxqlvm+QEoHTj9ShwLPQNBMHxLY:i6++lTj9ShwTCBMRs
Malware Config
Extracted
netwire
knudandersen.zapto.org:21000
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
07.03.17
-
keylogger_dir
C:\NVIDIA\profile\
-
lock_executable
false
-
offline_keylogger
true
-
password
1@wi%252ReNd5y0576Z*
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral1/memory/2556-16-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral1/memory/2556-19-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral1/memory/2556-21-0x0000000000400000-0x0000000000420000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
pid Process 2608 Confirmation.exe -
Loads dropped DLL 2 IoCs
pid Process 1228 WScript.exe 1228 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2528 2556 WerFault.exe 34 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3052 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2608 Confirmation.exe 2608 Confirmation.exe 2608 Confirmation.exe 2608 Confirmation.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2044 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2044 AcroRd32.exe 2044 AcroRd32.exe 2044 AcroRd32.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2044 2348 3756ac8f01c9c6d1c1a2e9b51edff7deca0540f8954950200daae8b4c28a9888.exe 28 PID 2348 wrote to memory of 2044 2348 3756ac8f01c9c6d1c1a2e9b51edff7deca0540f8954950200daae8b4c28a9888.exe 28 PID 2348 wrote to memory of 2044 2348 3756ac8f01c9c6d1c1a2e9b51edff7deca0540f8954950200daae8b4c28a9888.exe 28 PID 2348 wrote to memory of 2044 2348 3756ac8f01c9c6d1c1a2e9b51edff7deca0540f8954950200daae8b4c28a9888.exe 28 PID 2348 wrote to memory of 2044 2348 3756ac8f01c9c6d1c1a2e9b51edff7deca0540f8954950200daae8b4c28a9888.exe 28 PID 2348 wrote to memory of 2044 2348 3756ac8f01c9c6d1c1a2e9b51edff7deca0540f8954950200daae8b4c28a9888.exe 28 PID 2348 wrote to memory of 2044 2348 3756ac8f01c9c6d1c1a2e9b51edff7deca0540f8954950200daae8b4c28a9888.exe 28 PID 2348 wrote to memory of 1228 2348 3756ac8f01c9c6d1c1a2e9b51edff7deca0540f8954950200daae8b4c28a9888.exe 29 PID 2348 wrote to memory of 1228 2348 3756ac8f01c9c6d1c1a2e9b51edff7deca0540f8954950200daae8b4c28a9888.exe 29 PID 2348 wrote to memory of 1228 2348 3756ac8f01c9c6d1c1a2e9b51edff7deca0540f8954950200daae8b4c28a9888.exe 29 PID 2348 wrote to memory of 1228 2348 3756ac8f01c9c6d1c1a2e9b51edff7deca0540f8954950200daae8b4c28a9888.exe 29 PID 2348 wrote to memory of 1228 2348 3756ac8f01c9c6d1c1a2e9b51edff7deca0540f8954950200daae8b4c28a9888.exe 29 PID 2348 wrote to memory of 1228 2348 3756ac8f01c9c6d1c1a2e9b51edff7deca0540f8954950200daae8b4c28a9888.exe 29 PID 2348 wrote to memory of 1228 2348 3756ac8f01c9c6d1c1a2e9b51edff7deca0540f8954950200daae8b4c28a9888.exe 29 PID 1228 wrote to memory of 2608 1228 WScript.exe 30 PID 1228 wrote to memory of 2608 1228 WScript.exe 30 PID 1228 wrote to memory of 2608 1228 WScript.exe 30 PID 1228 wrote to memory of 2608 1228 WScript.exe 30 PID 1228 wrote to memory of 2608 1228 WScript.exe 30 PID 1228 wrote to memory of 2608 1228 WScript.exe 30 PID 1228 wrote to memory of 2608 1228 WScript.exe 30 PID 1228 wrote to memory of 2696 1228 WScript.exe 31 PID 1228 wrote to memory of 2696 1228 WScript.exe 31 PID 1228 wrote to memory of 2696 1228 WScript.exe 31 PID 1228 wrote to memory of 2696 1228 WScript.exe 31 PID 1228 wrote to memory of 2696 1228 WScript.exe 31 PID 1228 wrote to memory of 2696 1228 WScript.exe 31 PID 1228 wrote to memory of 2696 1228 WScript.exe 31 PID 2696 wrote to memory of 3052 2696 cmd.exe 33 PID 2696 wrote to memory of 3052 2696 cmd.exe 33 PID 2696 wrote to memory of 3052 2696 cmd.exe 33 PID 2696 wrote to memory of 3052 2696 cmd.exe 33 PID 2696 wrote to memory of 3052 2696 cmd.exe 33 PID 2696 wrote to memory of 3052 2696 cmd.exe 33 PID 2696 wrote to memory of 3052 2696 cmd.exe 33 PID 2608 wrote to memory of 2556 2608 Confirmation.exe 34 PID 2608 wrote to memory of 2556 2608 Confirmation.exe 34 PID 2608 wrote to memory of 2556 2608 Confirmation.exe 34 PID 2608 wrote to memory of 2556 2608 Confirmation.exe 34 PID 2608 wrote to memory of 2556 2608 Confirmation.exe 34 PID 2608 wrote to memory of 2556 2608 Confirmation.exe 34 PID 2608 wrote to memory of 2556 2608 Confirmation.exe 34 PID 2608 wrote to memory of 2556 2608 Confirmation.exe 34 PID 2608 wrote to memory of 2556 2608 Confirmation.exe 34 PID 2608 wrote to memory of 2556 2608 Confirmation.exe 34 PID 2608 wrote to memory of 2556 2608 Confirmation.exe 34 PID 2608 wrote to memory of 2556 2608 Confirmation.exe 34 PID 2608 wrote to memory of 2556 2608 Confirmation.exe 34 PID 2608 wrote to memory of 2556 2608 Confirmation.exe 34 PID 2608 wrote to memory of 2556 2608 Confirmation.exe 34 PID 2556 wrote to memory of 2528 2556 svchost.exe 35 PID 2556 wrote to memory of 2528 2556 svchost.exe 35 PID 2556 wrote to memory of 2528 2556 svchost.exe 35 PID 2556 wrote to memory of 2528 2556 svchost.exe 35 PID 2556 wrote to memory of 2528 2556 svchost.exe 35 PID 2556 wrote to memory of 2528 2556 svchost.exe 35 PID 2556 wrote to memory of 2528 2556 svchost.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\3756ac8f01c9c6d1c1a2e9b51edff7deca0540f8954950200daae8b4c28a9888.exe"C:\Users\Admin\AppData\Local\Temp\3756ac8f01c9c6d1c1a2e9b51edff7deca0540f8954950200daae8b4c28a9888.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Certificates\Missing of Pakistani Hujjaj during0001.pdf"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2044
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Certificates\Metallicanew.vbs"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Certificates\Confirmation.exe"C:\Certificates\Confirmation.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 2205⤵
- Program crash
PID:2528
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /MO 1 /TN NH2003 /TR C:\Certificates\Metallicanew.vbs3⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /MO 1 /TN NH2003 /TR C:\Certificates\Metallicanew.vbs4⤵
- Creates scheduled task(s)
PID:3052
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5cdc613712ac2ab85d6a0d314bb95a082
SHA1b1ad7a99fe7c1cc93de3543b9c8e298d471bee75
SHA25611cb794c0f015148172ac5cac54acdb87769a16e8a93be62ab953008b1d26bb2
SHA512f48f37872186ef8644e76339e2b3f523e0bbe53381abfc464639e6bc0bc3224ff85c20fca1e9e1e7faf1a5e83623156b1bee0bb26109a5ae575f37353ce9795e
-
Filesize
165KB
MD55047080930303d63185b7360c4378c9d
SHA1f99c5303d011039ba4c292c4fd77eb4d4299d847
SHA25657c61e561fd7731c630c649984e3392cc95a30f2257ef3a4ff3fcb0b05a5ca87
SHA5123b3ac18cc73028cc74ba64251e87cecfb7598631e40fa95840555380c7157960c01d20724a79fc308b5fff96edbc05f078a4916df7c081bb0e4791681607cc69
-
Filesize
708KB
MD5c2e3f3d9fc006cd26682fb8623652c3b
SHA156acebff1f3ea7dba1f9f39877c97fb0756d7693
SHA256b5865366283db9f3accf36d5445d9701b7bff87601f8161327ae175759de0c4b
SHA51273ab29b70b8ee9b766c00f659d5c0f350f5202898b5f3e5e472d833ca2d9f53260c5237de81eb6e44523715f2f9d3d9d57dcb3e8564fab35584070a65e8ff2a1
-
Filesize
3KB
MD50d16ff4bd4cc0829db19fa02e523ff25
SHA1b461b22f74dc93de47616b8b1df41ba977966c39
SHA2566a82c2d46f3bb136a95bf9c4adc62def67c83a60d08de4c308b3e4aa86f761b9
SHA5121e244ca4d5ced20d4315efc0be79dbfd3e99a70fda56b9c5ccff7b4c2daa9ea9ea4756adae1099105073d0ef2f68b5df9da92c3c709c53beb5a543d10b7f07fc