Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
110s -
max time network
93s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 23:54
Static task
static1
Behavioral task
behavioral1
Sample
32c9045d39bb696ea2946a36f1ad6e60N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
32c9045d39bb696ea2946a36f1ad6e60N.exe
Resource
win10v2004-20240709-en
General
-
Target
32c9045d39bb696ea2946a36f1ad6e60N.exe
-
Size
66KB
-
MD5
32c9045d39bb696ea2946a36f1ad6e60
-
SHA1
48ca1a0fbeb6da1b04601f6d3949628405cdf92b
-
SHA256
6278921136bbcba97463cc35c8f4c47c8411ea04c4775328288b4bddaa1032e3
-
SHA512
e8461ba2a6afbc1bc369238933ebbc5741842b4fbaecb7fc4f8c8fbb7fd8dc45a5d2171fde33cebe3971b9b5c2222c646f5c082074e76fbcfd8ab2eddc29e8f8
-
SSDEEP
768:ZrItKyw5WHXfQIhIiIk9ecAaVPD96KyX63:Zr3Z5IfQIR81ad5yX63
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2904 attrib.exe -
Deletes itself 1 IoCs
pid Process 2568 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1792 rwmhost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\rwmhost.exe 32c9045d39bb696ea2946a36f1ad6e60N.exe File opened for modification C:\Windows\Debug\rwmhost.exe 32c9045d39bb696ea2946a36f1ad6e60N.exe File opened for modification C:\Windows\Debug\rwmhost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32c9045d39bb696ea2946a36f1ad6e60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rwmhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1696 32c9045d39bb696ea2946a36f1ad6e60N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2904 1696 32c9045d39bb696ea2946a36f1ad6e60N.exe 30 PID 1696 wrote to memory of 2904 1696 32c9045d39bb696ea2946a36f1ad6e60N.exe 30 PID 1696 wrote to memory of 2904 1696 32c9045d39bb696ea2946a36f1ad6e60N.exe 30 PID 1696 wrote to memory of 2904 1696 32c9045d39bb696ea2946a36f1ad6e60N.exe 30 PID 1696 wrote to memory of 2568 1696 32c9045d39bb696ea2946a36f1ad6e60N.exe 33 PID 1696 wrote to memory of 2568 1696 32c9045d39bb696ea2946a36f1ad6e60N.exe 33 PID 1696 wrote to memory of 2568 1696 32c9045d39bb696ea2946a36f1ad6e60N.exe 33 PID 1696 wrote to memory of 2568 1696 32c9045d39bb696ea2946a36f1ad6e60N.exe 33 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2904 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\32c9045d39bb696ea2946a36f1ad6e60N.exe"C:\Users\Admin\AppData\Local\Temp\32c9045d39bb696ea2946a36f1ad6e60N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\rwmhost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2904
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\32C904~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2568
-
-
C:\Windows\Debug\rwmhost.exeC:\Windows\Debug\rwmhost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5df4e8d7585716396b7815c54f466d910
SHA1521ca96ee6b3c733badc4d0790b1eb9b27aa75d7
SHA2561719359786a1d391e4a3d5ce8c66c2471c401c8299891d5d8588352f30c5e6d5
SHA512e5e8e717e714be3ed6125eec84a6edf469364c7920a79a5a00881e631bd26e0c2648bdb53b292a4cfe933cc17e8023dea8d36698fd61b0769070ffde05d314ff