Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 09:36
Static task
static1
Behavioral task
behavioral1
Sample
PO# ROSIT MR2309040.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PO# ROSIT MR2309040.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
General
-
Target
PO# ROSIT MR2309040.exe
-
Size
761KB
-
MD5
9cca6c27ab4c2d57ffb57973de78658c
-
SHA1
961a879187aa8d7665cb00bbbfddcf67bce4172c
-
SHA256
051cb37b130a5af6e0fdcedbcbf67901e45baf9a99cf81e106b0e72e4ef2f6b9
-
SHA512
afca46b53e037e1872f4810c45ac0561bcef96b7dffc34bfd697082228934f66a5ea949b578a28f9d1e1b6ee4698e639dc2f4ed4769eec2aa9ad55382ba91461
-
SSDEEP
12288:Zgf3/HvEqA4wXuyo86ii63KnVdZsfZhgZ7q+V9qKWLZrEGg29fiuhx:83/PE0weyorI6nzOfZq7S+o9v
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 2 IoCs
pid Process 2764 PO# ROSIT MR2309040.exe 2764 PO# ROSIT MR2309040.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2184 PO# ROSIT MR2309040.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2764 PO# ROSIT MR2309040.exe 2184 PO# ROSIT MR2309040.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2764 set thread context of 2184 2764 PO# ROSIT MR2309040.exe 30 PID 2184 set thread context of 1208 2184 PO# ROSIT MR2309040.exe 21 PID 2184 set thread context of 2004 2184 PO# ROSIT MR2309040.exe 33 PID 2004 set thread context of 1208 2004 help.exe 21 -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\naah.Akt79 PO# ROSIT MR2309040.exe File created C:\Program Files (x86)\tribesmen.lnk PO# ROSIT MR2309040.exe File opened for modification C:\Program Files (x86)\tribesmen.lnk PO# ROSIT MR2309040.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\superline.Vrk218 PO# ROSIT MR2309040.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 2184 PO# ROSIT MR2309040.exe 2184 PO# ROSIT MR2309040.exe 2184 PO# ROSIT MR2309040.exe 2184 PO# ROSIT MR2309040.exe 2184 PO# ROSIT MR2309040.exe 2184 PO# ROSIT MR2309040.exe 2184 PO# ROSIT MR2309040.exe 2184 PO# ROSIT MR2309040.exe 2004 help.exe 2004 help.exe 2004 help.exe 2004 help.exe 2004 help.exe 2004 help.exe 2004 help.exe 2004 help.exe 2004 help.exe 2004 help.exe 2004 help.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2764 PO# ROSIT MR2309040.exe 2184 PO# ROSIT MR2309040.exe 1208 Explorer.EXE 1208 Explorer.EXE 2004 help.exe 2004 help.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2184 2764 PO# ROSIT MR2309040.exe 30 PID 2764 wrote to memory of 2184 2764 PO# ROSIT MR2309040.exe 30 PID 2764 wrote to memory of 2184 2764 PO# ROSIT MR2309040.exe 30 PID 2764 wrote to memory of 2184 2764 PO# ROSIT MR2309040.exe 30 PID 2764 wrote to memory of 2184 2764 PO# ROSIT MR2309040.exe 30 PID 2764 wrote to memory of 2184 2764 PO# ROSIT MR2309040.exe 30 PID 1208 wrote to memory of 2004 1208 Explorer.EXE 33 PID 1208 wrote to memory of 2004 1208 Explorer.EXE 33 PID 1208 wrote to memory of 2004 1208 Explorer.EXE 33 PID 1208 wrote to memory of 2004 1208 Explorer.EXE 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\PO# ROSIT MR2309040.exe"C:\Users\Admin\AppData\Local\Temp\PO# ROSIT MR2309040.exe"2⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\PO# ROSIT MR2309040.exe"C:\Users\Admin\AppData\Local\Temp\PO# ROSIT MR2309040.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2184
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
994B
MD5369fe95f362239e821084436ea31e1a2
SHA182aedd2fa9b81779a241645e1d2d11a5773e79b9
SHA256c9e39001ae5d773a10dc0a132a4a13e649ab94b54474b97567b548d5ec2ee589
SHA512d6c56559b9ba670f609cec6985fd510519705154fc6d5e4fd187a1da9571c3cd412f659edb0e34f46aaf2e60a6a8bea7f57f5769f8c4e37a4c89f3a252a7a9c4
-
Filesize
11KB
MD5a4dd044bcd94e9b3370ccf095b31f896
SHA117c78201323ab2095bc53184aa8267c9187d5173
SHA2562e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc
SHA51287335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a