Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
110s -
max time network
94s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 18:49
Behavioral task
behavioral1
Sample
fd1c4cbf9d453ae4c1ca38738a340200N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fd1c4cbf9d453ae4c1ca38738a340200N.exe
Resource
win10v2004-20240802-en
General
-
Target
fd1c4cbf9d453ae4c1ca38738a340200N.exe
-
Size
33KB
-
MD5
fd1c4cbf9d453ae4c1ca38738a340200
-
SHA1
58c60758587a65050b403f1e3556d0255f3060c7
-
SHA256
4a1b16364c0928824aa286ffa2d028965723cbd35c8fc04b36562736c281df47
-
SHA512
9833acc01d95a9246b568a30885a2f595a75a0ce897ec122ee605782e4a111915e0831d7f02ac75cbe599861600da48fe3e2c4ca32d8524f05500771bb946146
-
SSDEEP
768:4noSEjp9Plchfr6TUqnbcuyD7UYK4pavvvZeee26666HEEExTtqqqqBttttv:4oSEZWTUUqnouy8YXEvvvZeee5Lttttv
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2820 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2704 rwmhost.exe -
resource yara_rule behavioral1/memory/2232-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/files/0x0008000000012115-3.dat upx behavioral1/memory/2232-4-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2704-5-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2704-11-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2704-14-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\rwmhost.exe fd1c4cbf9d453ae4c1ca38738a340200N.exe File opened for modification C:\Windows\Debug\rwmhost.exe fd1c4cbf9d453ae4c1ca38738a340200N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rwmhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd1c4cbf9d453ae4c1ca38738a340200N.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rwmhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rwmhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2232 fd1c4cbf9d453ae4c1ca38738a340200N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2820 2232 fd1c4cbf9d453ae4c1ca38738a340200N.exe 31 PID 2232 wrote to memory of 2820 2232 fd1c4cbf9d453ae4c1ca38738a340200N.exe 31 PID 2232 wrote to memory of 2820 2232 fd1c4cbf9d453ae4c1ca38738a340200N.exe 31 PID 2232 wrote to memory of 2820 2232 fd1c4cbf9d453ae4c1ca38738a340200N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd1c4cbf9d453ae4c1ca38738a340200N.exe"C:\Users\Admin\AppData\Local\Temp\fd1c4cbf9d453ae4c1ca38738a340200N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\FD1C4C~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2820
-
-
C:\Windows\Debug\rwmhost.exeC:\Windows\Debug\rwmhost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5d7b8b60c93794a2280896ebda3c6df2d
SHA14f6b49b0126cf559f6c4f3f2ddbce87d4d90b97e
SHA2561b523a986f89938e360cffbb3258b5286def27052cd702c12b3eccfd3562ec2b
SHA512a22083dac1111bde79ce273d1d4f4a538f39e5b04a798e04fbdeb6ecf7da8bc4c20819da4ab275194099116ec5a5d444c8190c022d60a6882fc05cf522897725