Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 12:20
Static task
static1
Behavioral task
behavioral1
Sample
f311887894ff39840a5e713b58489d00N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f311887894ff39840a5e713b58489d00N.exe
Resource
win10v2004-20240802-en
General
-
Target
f311887894ff39840a5e713b58489d00N.exe
-
Size
463KB
-
MD5
f311887894ff39840a5e713b58489d00
-
SHA1
d1f64b06bdff758b403c57d3977bba2e1a628c8d
-
SHA256
ec11ac94782a7a6d4b6f6026ee0064b42aa4c7c14d9b6459cd9db396aebcbdc2
-
SHA512
33430508c86c6c160bf1fa4d7ada993c5610064fc1db78a4abfd6ef3cdcea7d69f7e5f403c1b97efc321ef06992d0c807a95624b418d13be80a090196b66613c
-
SSDEEP
12288:Grlc87eqqV5e+wBV6O+1QlgMaAbhNXD4G4gvqSWri28:GrSqqHeVBxNGMaAbhNzp4gvqSQ
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1464 subsfWrp.exe 1212 ~385F.tmp 2896 AtBrokup.exe -
Loads dropped DLL 3 IoCs
pid Process 3036 f311887894ff39840a5e713b58489d00N.exe 3036 f311887894ff39840a5e713b58489d00N.exe 1464 subsfWrp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\AtBrokup = "C:\\Users\\Admin\\AppData\\Roaming\\ctfmance\\subsfWrp.exe" f311887894ff39840a5e713b58489d00N.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\AtBrokup.exe f311887894ff39840a5e713b58489d00N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AtBrokup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f311887894ff39840a5e713b58489d00N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language subsfWrp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1464 subsfWrp.exe 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE 1392 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1464 subsfWrp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3036 wrote to memory of 1464 3036 f311887894ff39840a5e713b58489d00N.exe 29 PID 3036 wrote to memory of 1464 3036 f311887894ff39840a5e713b58489d00N.exe 29 PID 3036 wrote to memory of 1464 3036 f311887894ff39840a5e713b58489d00N.exe 29 PID 3036 wrote to memory of 1464 3036 f311887894ff39840a5e713b58489d00N.exe 29 PID 1464 wrote to memory of 1212 1464 subsfWrp.exe 30 PID 1464 wrote to memory of 1212 1464 subsfWrp.exe 30 PID 1464 wrote to memory of 1212 1464 subsfWrp.exe 30 PID 1464 wrote to memory of 1212 1464 subsfWrp.exe 30 PID 1212 wrote to memory of 1392 1212 ~385F.tmp 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\f311887894ff39840a5e713b58489d00N.exe"C:\Users\Admin\AppData\Local\Temp\f311887894ff39840a5e713b58489d00N.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Roaming\ctfmance\subsfWrp.exe"C:\Users\Admin\AppData\Roaming\ctfmance"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\~385F.tmp1392 474632 1464 14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1212
-
-
-
-
C:\Windows\SysWOW64\AtBrokup.exeC:\Windows\SysWOW64\AtBrokup.exe -s1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD586dc243576cf5c7445451af37631eea9
SHA199a81c47c4c02f32c0ab456bfa23c306c7a09bf9
SHA25625d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a
SHA512c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4
-
Filesize
463KB
MD57b1ad9b9383598a8436f5c58632b8e5c
SHA136303718addec07187045a2a5cedd761e37255f1
SHA256710b6046826e1226e3d7cf602b566ef4c8b5c750ad15f1f568648c94294a2ad7
SHA512ac53c98dc86d35385ff3b0783e989c3924ab0bd744c983e4d4f268a6a1f202e334828039cc22cced17f024bf234d405ddd50043c9c01a22df853e6f97affa918