Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2024, 22:27
Static task
static1
Behavioral task
behavioral1
Sample
061c9deaa42a21dbfbe9bdd700abd8c0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
061c9deaa42a21dbfbe9bdd700abd8c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
061c9deaa42a21dbfbe9bdd700abd8c0N.exe
-
Size
22KB
-
MD5
061c9deaa42a21dbfbe9bdd700abd8c0
-
SHA1
65af39a56972bd7135943a05a113752952ede9df
-
SHA256
b79024ccce9cef4a315437343d545e70002c25246f473e5a3d79ef1065b6fcb8
-
SHA512
215f4b86026ddb0cd03b5f0ec0db91a00f2325e4cffc9559096df7059ad08de9e04bde671ac7e51241b8cf10fcad91bd699aad59af1a745d100a4ff526710578
-
SSDEEP
384:jIz43Tu7MSbQUyO44MGvJSsZ/MPNapPw+nI4NTDVHg+pDJQ4r:jIUS7MwyiEPNa1w+bdVHg+py4r
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "5120" rmass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "5120" rmass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "5120" rmass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "5120" rmass.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4F445A4B-4452-4756-4F44-5A4B44524756} rmass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4F445A4B-4452-4756-4F44-5A4B44524756}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" rmass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4F445A4B-4452-4756-4F44-5A4B44524756}\IsInstalled = "1" rmass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4F445A4B-4452-4756-4F44-5A4B44524756}\StubPath = "C:\\Windows\\system32\\ahuy.exe" rmass.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts rmass.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe rmass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" rmass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\ntdbg.exe" rmass.exe -
Executes dropped EXE 2 IoCs
pid Process 4468 rmass.exe 3636 rmass.exe -
resource yara_rule behavioral2/files/0x0009000000023488-2.dat upx behavioral2/memory/4468-3-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/memory/4468-39-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/memory/3636-44-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/memory/4468-107-0x0000000000400000-0x0000000000411000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "5120" rmass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "5120" rmass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "5120" rmass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "5120" rmass.exe -
description ioc Process Delete value \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger rmass.exe -
Modifies WinLogon 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\RECOVER32.DLL" rmass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" rmass.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} rmass.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify rmass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" rmass.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ntdbg.exe rmass.exe File created C:\Windows\SysWOW64\RECOVER32.DLL rmass.exe File opened for modification C:\Windows\SysWOW64\idbg32.exe rmass.exe File opened for modification C:\Windows\SysWOW64\rmass.exe 061c9deaa42a21dbfbe9bdd700abd8c0N.exe File created C:\Windows\SysWOW64\rmass.exe 061c9deaa42a21dbfbe9bdd700abd8c0N.exe File created C:\Windows\SysWOW64\ntdbg.exe rmass.exe File opened for modification C:\Windows\SysWOW64\ahuy.exe rmass.exe File created C:\Windows\SysWOW64\ahuy.exe rmass.exe File opened for modification C:\Windows\SysWOW64\RECOVER32.DLL rmass.exe File opened for modification C:\Windows\SysWOW64\winrnt.exe rmass.exe File opened for modification C:\Windows\SysWOW64\aset32.exe rmass.exe File opened for modification C:\Windows\SysWOW64\rmass.exe rmass.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\System\winrnt.exe rmass.exe File opened for modification C:\Program Files (x86)\Common Files\System\aset32.exe rmass.exe File opened for modification C:\Program Files (x86)\Common Files\System\idbg32.exe rmass.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 061c9deaa42a21dbfbe9bdd700abd8c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rmass.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4468 rmass.exe 4468 rmass.exe 4468 rmass.exe 4468 rmass.exe 4468 rmass.exe 4468 rmass.exe 3636 rmass.exe 3636 rmass.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4468 rmass.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4220 wrote to memory of 4468 4220 061c9deaa42a21dbfbe9bdd700abd8c0N.exe 84 PID 4220 wrote to memory of 4468 4220 061c9deaa42a21dbfbe9bdd700abd8c0N.exe 84 PID 4220 wrote to memory of 4468 4220 061c9deaa42a21dbfbe9bdd700abd8c0N.exe 84 PID 4468 wrote to memory of 3636 4468 rmass.exe 85 PID 4468 wrote to memory of 3636 4468 rmass.exe 85 PID 4468 wrote to memory of 3636 4468 rmass.exe 85 PID 4468 wrote to memory of 640 4468 rmass.exe 5 PID 4468 wrote to memory of 3460 4468 rmass.exe 56
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:640
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\061c9deaa42a21dbfbe9bdd700abd8c0N.exe"C:\Users\Admin\AppData\Local\Temp\061c9deaa42a21dbfbe9bdd700abd8c0N.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\rmass.exe"C:\Windows\SysWOW64\rmass.exe"3⤵
- Windows security bypass
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Windows security modification
- Indicator Removal: Clear Persistence
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\rmass.exe--k33p4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3636
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Winlogon Helper DLL
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Winlogon Helper DLL
1Event Triggered Execution
1Image File Execution Options Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD52b2c28a7a01f9584fe220ef84003427f
SHA15fc023df0b5064045eb8de7f2dbe26f07f6fec70
SHA2569e00af53b1d0c0f5270d94a666d95aa7b4dcb9fea49487c210c055c9dcfcc9eb
SHA51239192a8a91dec1abff25af8dac0cf39da4dfd51b3fb4f1ef0b4e776185d4280fbe8387c2ea778da7bbf2ce288b0bce4d23cbe8d9e87bbd250159044f5adbac78
-
Filesize
22KB
MD5628df8f57deff9145a300106a8bc7c6b
SHA145baa6a847bc9da889079b6603439742ece70186
SHA2567b4922896077303df3d42bdd2a998d57f03522b41a3194eabb40a46e80628f63
SHA5128a8c893f3d5a266afef9c1ea3c2e0faccb8bc3a27926ab116bdd454d526748f98845d47c1fd02527f1650acc298a889313b41edb3bd602038cdefbe7054fb74d
-
Filesize
23KB
MD5148a6107769b1c1082dedc01e53c0cfe
SHA1c10183c6a6ed212dc4e5f88c971524c151286183
SHA2565a728366489bc0835cf3237adb2c18a13326ccac0d7169fa5556dd1979300ada
SHA512107c1ea02f0596d3a301ea50e6987a4152ecdce090a92a856d2e0654fcf1169bfc37fb3a13f22fd206a4ece94463ec7e3aee655d02715896f4b09884dc14cb34
-
Filesize
20KB
MD57c78331078bdb72d466e911016263006
SHA159e14e794c347acc3b7f4cd8ebffe01114cfcb45
SHA256d582bf8fd2fb7225855fa693a2050be8b915d16e7b75a1d68a5cc9706ff2c139
SHA5121182949512d4c147ccab9bb7095a5ac81922bd4e4f92c3e42718e57d24f66885f34d0326ae71dad633792efd35c12c6cf2dafcb2f4ad2e507901a0996ab60306