Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
15s -
max time network
17s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
04/07/2024, 22:05
General
-
Target
RunnerSys_protected.exe
-
Size
17.2MB
-
MD5
07621700c6af0996cf45a3d04eebf72d
-
SHA1
789dcf4d965009bad086a67a57ca1375b0a520e0
-
SHA256
bedfc69962e5a357c3bf9aa5e410a2f5760f4c844974b4b8f785fd2848928580
-
SHA512
506974d5449c4ed59863563aba1177a22be736c8e285bdc75d5444c5ca51d87a665af69fcc8672298615e90290bbd1cd90411fa448882823fe4258e5f25aabb4
-
SSDEEP
393216:ayP1V/VA/mtzqHYE9xPhQpuTASC0irB5AX0zPERIQTFRvYeDWzQaWKQ:xNhG/mtzg39x0SC0irDE0WzQeDyQjKQ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, wscript.exe \"C:\\windows\\winbase_base_procid_none\\secureloc0x65\\WinRapistI386.vbs\"" RunnerSys_protected.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RunnerSys_protected.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ RunnerSys_protected.exe -
XMRig Miner payload 3 IoCs
resource yara_rule behavioral1/memory/2720-11-0x0000000000400000-0x0000000002D5C000-memory.dmp xmrig behavioral1/memory/2720-12-0x0000000000400000-0x0000000002D5C000-memory.dmp xmrig behavioral1/memory/2720-16-0x0000000000400000-0x0000000002D5C000-memory.dmp xmrig -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" RunnerSys_protected.exe -
Disables Task Manager via registry modification
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RunnerSys_protected.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion RunnerSys_protected.exe -
resource yara_rule behavioral1/memory/2720-11-0x0000000000400000-0x0000000002D5C000-memory.dmp themida behavioral1/memory/2720-12-0x0000000000400000-0x0000000002D5C000-memory.dmp themida behavioral1/memory/2720-16-0x0000000000400000-0x0000000002D5C000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Windows\CurrentVersion\Run\ C:\Users\Admin\AppData\Local\Temp\RunnerSys_protected.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\RunnerSys_protected.exe" RunnerSys_protected.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RunnerSys_protected.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2720 RunnerSys_protected.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5084 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2720 RunnerSys_protected.exe 2720 RunnerSys_protected.exe 2720 RunnerSys_protected.exe 2720 RunnerSys_protected.exe 2720 RunnerSys_protected.exe 2720 RunnerSys_protected.exe 2720 RunnerSys_protected.exe 2720 RunnerSys_protected.exe 2720 RunnerSys_protected.exe 2720 RunnerSys_protected.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2720 RunnerSys_protected.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2720 wrote to memory of 5084 2720 RunnerSys_protected.exe 72 PID 2720 wrote to memory of 5084 2720 RunnerSys_protected.exe 72 PID 2720 wrote to memory of 5084 2720 RunnerSys_protected.exe 72 PID 2720 wrote to memory of 4620 2720 RunnerSys_protected.exe 74 PID 2720 wrote to memory of 4620 2720 RunnerSys_protected.exe 74 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RunnerSys_protected.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RunnerSys_protected.exe"C:\Users\Admin\AppData\Local\Temp\RunnerSys_protected.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Disables RegEdit via registry modification
- Checks BIOS information in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2720 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 3 /tn "MicrosoftEdgeUpdate" /tr "C:\Users\Admin\AppData\Roaming\Windows\WinHostService.exe" /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:5084
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe --algo rx/0 --donate-level 0 --max-cpu-usage 25 -opool.hashvault.pro:8888 -u 46xzjnxQsgsMTuFqGbQXwENhgohU94dk7cEdSatqt9g6JgzUauTwLBsAxU7agCmV7rf929oWavwsyh3C8hcebCpc6mYzDvA -p xr3v --tls --tls-fingerprint=420c7850e09b7c0bdcf748a7da9eb3647daf8515718f36d9ccfdd6b9ff834b142⤵PID:4620
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Virtualization/Sandbox Evasion
1