Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16/08/2024, 22:27
Static task
static1
Behavioral task
behavioral1
Sample
061c9deaa42a21dbfbe9bdd700abd8c0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
061c9deaa42a21dbfbe9bdd700abd8c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
061c9deaa42a21dbfbe9bdd700abd8c0N.exe
-
Size
22KB
-
MD5
061c9deaa42a21dbfbe9bdd700abd8c0
-
SHA1
65af39a56972bd7135943a05a113752952ede9df
-
SHA256
b79024ccce9cef4a315437343d545e70002c25246f473e5a3d79ef1065b6fcb8
-
SHA512
215f4b86026ddb0cd03b5f0ec0db91a00f2325e4cffc9559096df7059ad08de9e04bde671ac7e51241b8cf10fcad91bd699aad59af1a745d100a4ff526710578
-
SSDEEP
384:jIz43Tu7MSbQUyO44MGvJSsZ/MPNapPw+nI4NTDVHg+pDJQ4r:jIUS7MwyiEPNa1w+bdVHg+py4r
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "5120" rmass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "5120" rmass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "5120" rmass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "5120" rmass.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4D564659-5a50-4c4d-4D56-46595A504c4d}\StubPath = "C:\\Windows\\system32\\ahuy.exe" rmass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4D564659-5a50-4c4d-4D56-46595A504c4d} rmass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4D564659-5a50-4c4d-4D56-46595A504c4d}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" rmass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4D564659-5a50-4c4d-4D56-46595A504c4d}\IsInstalled = "1" rmass.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts rmass.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe rmass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" rmass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\ntdbg.exe" rmass.exe -
Executes dropped EXE 2 IoCs
pid Process 764 rmass.exe 2800 rmass.exe -
Loads dropped DLL 3 IoCs
pid Process 2472 061c9deaa42a21dbfbe9bdd700abd8c0N.exe 2472 061c9deaa42a21dbfbe9bdd700abd8c0N.exe 764 rmass.exe -
resource yara_rule behavioral1/files/0x0009000000016c1f-6.dat upx behavioral1/memory/764-9-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral1/memory/764-15-0x0000000000320000-0x0000000000331000-memory.dmp upx behavioral1/memory/2800-22-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral1/memory/764-41-0x0000000000400000-0x0000000000411000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "5120" rmass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "5120" rmass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "5120" rmass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "5120" rmass.exe -
description ioc Process Delete value \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger rmass.exe -
Modifies WinLogon 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" rmass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} rmass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify rmass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" rmass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\RECOVER32.DLL" rmass.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\rmass.exe rmass.exe File created C:\Windows\SysWOW64\rmass.exe 061c9deaa42a21dbfbe9bdd700abd8c0N.exe File created C:\Windows\SysWOW64\ahuy.exe rmass.exe File created C:\Windows\SysWOW64\ntdbg.exe rmass.exe File opened for modification C:\Windows\SysWOW64\ahuy.exe rmass.exe File opened for modification C:\Windows\SysWOW64\RECOVER32.DLL rmass.exe File created C:\Windows\SysWOW64\RECOVER32.DLL rmass.exe File opened for modification C:\Windows\SysWOW64\winrnt.exe rmass.exe File opened for modification C:\Windows\SysWOW64\aset32.exe rmass.exe File opened for modification C:\Windows\SysWOW64\rmass.exe 061c9deaa42a21dbfbe9bdd700abd8c0N.exe File opened for modification C:\Windows\SysWOW64\ntdbg.exe rmass.exe File opened for modification C:\Windows\SysWOW64\idbg32.exe rmass.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\System\winrnt.exe rmass.exe File opened for modification C:\Program Files (x86)\Common Files\System\aset32.exe rmass.exe File opened for modification C:\Program Files (x86)\Common Files\System\idbg32.exe rmass.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 061c9deaa42a21dbfbe9bdd700abd8c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rmass.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 764 rmass.exe 764 rmass.exe 764 rmass.exe 2800 rmass.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 764 rmass.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2472 wrote to memory of 764 2472 061c9deaa42a21dbfbe9bdd700abd8c0N.exe 30 PID 2472 wrote to memory of 764 2472 061c9deaa42a21dbfbe9bdd700abd8c0N.exe 30 PID 2472 wrote to memory of 764 2472 061c9deaa42a21dbfbe9bdd700abd8c0N.exe 30 PID 2472 wrote to memory of 764 2472 061c9deaa42a21dbfbe9bdd700abd8c0N.exe 30 PID 764 wrote to memory of 416 764 rmass.exe 5 PID 764 wrote to memory of 1340 764 rmass.exe 21 PID 764 wrote to memory of 2800 764 rmass.exe 31 PID 764 wrote to memory of 2800 764 rmass.exe 31 PID 764 wrote to memory of 2800 764 rmass.exe 31 PID 764 wrote to memory of 2800 764 rmass.exe 31
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\061c9deaa42a21dbfbe9bdd700abd8c0N.exe"C:\Users\Admin\AppData\Local\Temp\061c9deaa42a21dbfbe9bdd700abd8c0N.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\rmass.exe"C:\Windows\SysWOW64\rmass.exe"3⤵
- Windows security bypass
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Indicator Removal: Clear Persistence
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\rmass.exe--k33p4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2800
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Winlogon Helper DLL
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Winlogon Helper DLL
1Event Triggered Execution
1Image File Execution Options Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD52b2c28a7a01f9584fe220ef84003427f
SHA15fc023df0b5064045eb8de7f2dbe26f07f6fec70
SHA2569e00af53b1d0c0f5270d94a666d95aa7b4dcb9fea49487c210c055c9dcfcc9eb
SHA51239192a8a91dec1abff25af8dac0cf39da4dfd51b3fb4f1ef0b4e776185d4280fbe8387c2ea778da7bbf2ce288b0bce4d23cbe8d9e87bbd250159044f5adbac78
-
Filesize
22KB
MD53be150c5702ef19d8b36ec46e4e0c776
SHA1810ac069349afc39346d6e33b9fce22dfcdbd66f
SHA256676d273576ab548471bb31816bb5b0e0fc172578c58c158fc41bf1f8f8a694ee
SHA5125946f14fa45a1c0f9983f0866dd80d382c1db83e1f6471dab99e518bd7e60d2675ddf3d1bb866a532dcebfe40c2823172900896ba7ba34f7e56a27d81a742187
-
Filesize
23KB
MD5ae15ee22c07f130fc3e38d5e5840ec43
SHA1daa15dea31a0e91c64a1a82470333e758c375577
SHA2560f8ce0a6d71ee82b12437f686ec655a81da7482391a819dce316d35c037d36ca
SHA512f6f6a2c97503ef30b4bc18875a7ea54bedf510b6e72daf696343ba46f4d1d24e0b0ccf7b84c9ae5d9995ced954d814c14e58c4f394bc2a3840cf3a258107f9e8
-
Filesize
20KB
MD57c78331078bdb72d466e911016263006
SHA159e14e794c347acc3b7f4cd8ebffe01114cfcb45
SHA256d582bf8fd2fb7225855fa693a2050be8b915d16e7b75a1d68a5cc9706ff2c139
SHA5121182949512d4c147ccab9bb7095a5ac81922bd4e4f92c3e42718e57d24f66885f34d0326ae71dad633792efd35c12c6cf2dafcb2f4ad2e507901a0996ab60306