Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01/07/2024, 14:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe
-
Size
37.6MB
-
MD5
6068830154e280bb0c0ca87e57533425
-
SHA1
94e5cab7e49fb04ec30ff75b6e3bc4fcea9e792d
-
SHA256
492d4f36465829ece536dbd06aa7010b1d4c0270db158242d296ed6e73a4b696
-
SHA512
990ccda1b69c7a0d3bb43dc3bdf6bb518deb02197395b661b332e55d64cdbf4a740fbab830773c22e4b1afc6d357ee4be12e7ab9a6916f15386bd45c9e68df73
-
SSDEEP
786432:4TuUJP9mP1O9uGVD+6PPZlXMuzw+AuE3sBJm:4TuUJlmP1O9uGVDPxWiOuE3s/
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe -
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe -
Loads dropped DLL 1 IoCs
pid Process 2080 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2080 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2080 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2080 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2080 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2080 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2080 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2080 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2080 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2080 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2080 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2080 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe Token: SeManageVolumePrivilege 2080 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2080 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe 2080 2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-01_6068830154e280bb0c0ca87e57533425_gozi_magniber_revil.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Checks system information in the registry
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5934785bd82108251dd002da9f20b6ce3
SHA1a42c12162b4b19da5fc4ea0d43e2aed0cca48c20
SHA25641e0204223bfc255c1eb05e5b2de6c470867c5382faf565ad839b98d7498424b
SHA512859d453d1a3775d513f6eab29d9775d2da84091c34d0c025d75d4988fbb25d783a44cfc5889637aaf0f0d0c9012375e65fce00e7a001ee20cb343627dba2332b
-
Filesize
32.1MB
MD5bed62904779d0e7a5e7755982fb17e7f
SHA1fffe124468f172476d7ea326ae1fea1a75340887
SHA2568d893516a1311f7d93c85f0a29d7dec4751723c0c4aefa6e0b546e2cd08cbc61
SHA5123bb8a80c82529ebbd16daafea06181a9ef20e186319e3be252312a14c2dcb13131fe77c680a3a01843689f6a1bc8346a4292baac47b79ea202d6a3b0036c43e7
-
Filesize
600KB
MD5f637d5d3c3a60fddb5dd397556fe9b1d
SHA166f0c4f137870a9927400ea00facc00193ef21e3
SHA256641b843cb6ee7538ec267212694c9ef0616b9ac9ab14a0abd7cf020678d50b02
SHA512e96984f2f9c6858e989f10fd8e71b09a8a640c9be2fb87ac1692d9bca7107d7a837f8fbdcc46c01a6107dd9020994c5a6f975b7e16434e9b2bf1c43b1f0d8b31