Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
112s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 00:16
Static task
static1
Behavioral task
behavioral1
Sample
060035baaa53420a9ca90516c83d2050N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
060035baaa53420a9ca90516c83d2050N.exe
Resource
win10v2004-20240802-en
General
-
Target
060035baaa53420a9ca90516c83d2050N.exe
-
Size
346KB
-
MD5
060035baaa53420a9ca90516c83d2050
-
SHA1
645a55ae3c43059f1ec482f1acd1f284d4e93eae
-
SHA256
08fda62494050ac591a90803b82d7d4175434c51f70fceae922bf567d279967d
-
SHA512
08406d8c825c3c070e68f3089b28b10aba49f0c0d4a461f04823cbfcaabc219ad85fc68ba442d15e348396d099a964b9a6a174e0c11f5acf98c6bd7cc05112f2
-
SSDEEP
6144:EXc2uDUB2B7WdDMtE7iiyqW5gEjm8PtEC1YcTzT4Cl45lxj6LjJoxGq6IE9k9:EXcpDUoEdp7iiyqW5hK8FEszTr6lxOFg
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2280 RemoteOperator.exe 2800 WerFault.exe -
Loads dropped DLL 2 IoCs
pid Process 2388 060035baaa53420a9ca90516c83d2050N.exe 2280 RemoteOperator.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 060035baaa53420a9ca90516c83d2050N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RemoteOperator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WerFault.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2800 WerFault.exe 2800 WerFault.exe 2800 WerFault.exe 2800 WerFault.exe 2800 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: 33 2388 060035baaa53420a9ca90516c83d2050N.exe Token: SeIncBasePriorityPrivilege 2388 060035baaa53420a9ca90516c83d2050N.exe Token: 33 2388 060035baaa53420a9ca90516c83d2050N.exe Token: SeIncBasePriorityPrivilege 2388 060035baaa53420a9ca90516c83d2050N.exe Token: 33 2388 060035baaa53420a9ca90516c83d2050N.exe Token: SeIncBasePriorityPrivilege 2388 060035baaa53420a9ca90516c83d2050N.exe Token: 33 2388 060035baaa53420a9ca90516c83d2050N.exe Token: SeIncBasePriorityPrivilege 2388 060035baaa53420a9ca90516c83d2050N.exe Token: 33 2280 RemoteOperator.exe Token: SeIncBasePriorityPrivilege 2280 RemoteOperator.exe Token: 33 2280 RemoteOperator.exe Token: SeIncBasePriorityPrivilege 2280 RemoteOperator.exe Token: 33 2280 RemoteOperator.exe Token: SeIncBasePriorityPrivilege 2280 RemoteOperator.exe Token: 33 2800 WerFault.exe Token: SeIncBasePriorityPrivilege 2800 WerFault.exe Token: 33 2800 WerFault.exe Token: SeIncBasePriorityPrivilege 2800 WerFault.exe Token: 33 2800 WerFault.exe Token: SeIncBasePriorityPrivilege 2800 WerFault.exe Token: 33 2800 WerFault.exe Token: SeIncBasePriorityPrivilege 2800 WerFault.exe Token: SeDebugPrivilege 2800 WerFault.exe Token: 33 2800 WerFault.exe Token: SeIncBasePriorityPrivilege 2800 WerFault.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2280 2388 060035baaa53420a9ca90516c83d2050N.exe 30 PID 2388 wrote to memory of 2280 2388 060035baaa53420a9ca90516c83d2050N.exe 30 PID 2388 wrote to memory of 2280 2388 060035baaa53420a9ca90516c83d2050N.exe 30 PID 2388 wrote to memory of 2280 2388 060035baaa53420a9ca90516c83d2050N.exe 30 PID 2280 wrote to memory of 2800 2280 RemoteOperator.exe 31 PID 2280 wrote to memory of 2800 2280 RemoteOperator.exe 31 PID 2280 wrote to memory of 2800 2280 RemoteOperator.exe 31 PID 2280 wrote to memory of 2800 2280 RemoteOperator.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\060035baaa53420a9ca90516c83d2050N.exe"C:\Users\Admin\AppData\Local\Temp\060035baaa53420a9ca90516c83d2050N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\RemoteOperator\1.0.0.0\2015.09.06T01.24\Virtual\STUBEXE\@APPDATALOCAL@\Temp\RemoteOperator.exe"C:\Users\Admin\AppData\Local\Temp\RemoteOperator.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\RemoteOperator\1.0.0.0\2015.09.06T01.24\Native\STUBEXE\@SYSTEM@\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 6203⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\RemoteOperator\1.0.0.0\2015.09.06T01.24\Native\STUBEXE\@SYSTEM@\WerFault.exe
Filesize17KB
MD536e3fa60e628d7cbd22bc1dc8ccd6a11
SHA17ae9f7da10ee11131aa0f48c8be00ad0a59bce11
SHA256af12be88da7a4dff7849f9af96130976e137d2c854e699bedccb778dc0842e83
SHA5120ab35aedae2c77e64f89be4280296cdbda268f91e78d8cdfd07f417f133d4f8fc003f2f40eea3f4b3bf7c78d56bc14c31d0c45616201e25070d53d04f86c4346
-
\Users\Admin\AppData\Local\Xenocode\Sandbox\RemoteOperator\1.0.0.0\2015.09.06T01.24\Virtual\STUBEXE\@APPDATALOCAL@\Temp\RemoteOperator.exe
Filesize17KB
MD52dc5901d28a2a5a07fd1bad6223495a9
SHA198d5bee6291c558e54b976f08dbdb42dd41958ea
SHA256d6078adca4893bf57edf3a96e5eb0e450c9b4897f84bdb953e0bbd28e4e2ed91
SHA512aab782b3149ca80b2fb4dabb533b7d1d2307838029e3ca043fc56054c57b48cdc07e554aa5aa9b31b8dbdde3dbc4b654a77c828cc5d7a7d287cbad87a4dae3c9