Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
ce5360d3d7237e90647ea49aacdf4d00N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ce5360d3d7237e90647ea49aacdf4d00N.exe
Resource
win10v2004-20240802-en
General
-
Target
ce5360d3d7237e90647ea49aacdf4d00N.exe
-
Size
260KB
-
MD5
ce5360d3d7237e90647ea49aacdf4d00
-
SHA1
6e701e6e2fbe36390981a8de4961082e12fef1da
-
SHA256
92e209a74bce0160020f15e9c8881ea8a28e117b7f69dba72afbd0f79a0848ff
-
SHA512
22e3b587d9bd636ad242b3ebfd841652a70d73ee695e451fa66bd16fe813fc22245df55a630d5433f37b1b689c2d6d7db552545d8123aaf78d4f74c691c2d4eb
-
SSDEEP
6144:5W5ioScGBY5/fe10wDE4Hwkwvk6IKJA91INM:5WHiY5/feqwQuwsKU1INM
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2192 ciphetup.exe 2104 ~B6D1.tmp 2732 rundubst.exe -
Loads dropped DLL 3 IoCs
pid Process 1528 ce5360d3d7237e90647ea49aacdf4d00N.exe 1528 ce5360d3d7237e90647ea49aacdf4d00N.exe 2192 ciphetup.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\DpiSnsvr = "C:\\Users\\Admin\\AppData\\Roaming\\makeutil\\ciphetup.exe" ce5360d3d7237e90647ea49aacdf4d00N.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundubst.exe ce5360d3d7237e90647ea49aacdf4d00N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2748 1528 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce5360d3d7237e90647ea49aacdf4d00N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ciphetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundubst.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2192 ciphetup.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE 2732 rundubst.exe 1196 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2192 ciphetup.exe Token: SeShutdownPrivilege 1196 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1528 wrote to memory of 2192 1528 ce5360d3d7237e90647ea49aacdf4d00N.exe 30 PID 1528 wrote to memory of 2192 1528 ce5360d3d7237e90647ea49aacdf4d00N.exe 30 PID 1528 wrote to memory of 2192 1528 ce5360d3d7237e90647ea49aacdf4d00N.exe 30 PID 1528 wrote to memory of 2192 1528 ce5360d3d7237e90647ea49aacdf4d00N.exe 30 PID 2192 wrote to memory of 2104 2192 ciphetup.exe 31 PID 2192 wrote to memory of 2104 2192 ciphetup.exe 31 PID 2192 wrote to memory of 2104 2192 ciphetup.exe 31 PID 2192 wrote to memory of 2104 2192 ciphetup.exe 31 PID 2104 wrote to memory of 1196 2104 ~B6D1.tmp 21 PID 1528 wrote to memory of 2748 1528 ce5360d3d7237e90647ea49aacdf4d00N.exe 33 PID 1528 wrote to memory of 2748 1528 ce5360d3d7237e90647ea49aacdf4d00N.exe 33 PID 1528 wrote to memory of 2748 1528 ce5360d3d7237e90647ea49aacdf4d00N.exe 33 PID 1528 wrote to memory of 2748 1528 ce5360d3d7237e90647ea49aacdf4d00N.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\ce5360d3d7237e90647ea49aacdf4d00N.exe"C:\Users\Admin\AppData\Local\Temp\ce5360d3d7237e90647ea49aacdf4d00N.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Roaming\makeutil\ciphetup.exe"C:\Users\Admin\AppData\Roaming\makeutil"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\~B6D1.tmp1196 266248 2192 14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 2523⤵
- Program crash
PID:2748
-
-
-
C:\Windows\SysWOW64\rundubst.exeC:\Windows\SysWOW64\rundubst.exe -s1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5aac3165ece2959f39ff98334618d10d9
SHA1020a191bfdc70c1fbd3bf74cd7479258bd197f51
SHA25696fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974
SHA5129eb876812a6a13dd4b090788c2b1d9e9a2e25370598ed5c040f82e6f378edc4b78d58bc8f60d5a559ea57b1edcf3a144bfe09454a9928997173db8279d5b40cf
-
Filesize
260KB
MD55d561e6b0611908ac585eb06d4ff7e98
SHA1601652f2660420c6b529abf4f4ef60c2c0a5e5a5
SHA2566900e62e4c8074cd3696dfacf841e911ef2f89b317cd0842e5433bf75a99b6c4
SHA512a6c1875adf89c17c6cb89bfdf3a18e3020733eb6f9eb0346af0e81d78604c1053ece36e437918f596a41dd9988db3c417f620323585ec9d65427b193f4c26a25