Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10MasonRootk...I2.dll
windows7-x64
1MasonRootk...I2.dll
windows10-2004-x64
1MasonRootk...DME.md
windows7-x64
3MasonRootk...DME.md
windows10-2004-x64
3MasonRootk...kit.cs
windows7-x64
3MasonRootk...kit.cs
windows10-2004-x64
3MasonRootk...er.exe
windows7-x64
10MasonRootk...er.exe
windows10-2004-x64
10MasonRootk...ib.dll
windows7-x64
1MasonRootk...ib.dll
windows10-2004-x64
1Analysis
-
max time kernel
21s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 21:49
Behavioral task
behavioral1
Sample
MasonRootkit-main/Guna.UI2.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
MasonRootkit-main/Guna.UI2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
MasonRootkit-main/README.md
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
MasonRootkit-main/README.md
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
MasonRootkit-main/Rootkit.cs
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
MasonRootkit-main/Rootkit.cs
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
MasonRootkit-main/RootkitBuilder.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
MasonRootkit-main/RootkitBuilder.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
MasonRootkit-main/dnlib.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
MasonRootkit-main/dnlib.dll
Resource
win10v2004-20240802-en
General
-
Target
MasonRootkit-main/Rootkit.cs
-
Size
206B
-
MD5
13b6cbe9358c5dfbef1e0cdc1e624363
-
SHA1
d16845dd50dd373a19e0f1bb7c7477f6796a49cf
-
SHA256
b3adec39923485d7ccc300861d3a3c4f37351d36aa8bf87105b92112a8980cb3
-
SHA512
964d8b1c56589119f95b054b93fb67706c20ca5a2f270f799b096e6ad4785246a77df41ab967d90eaed884ee8e5f97e91e743854fa5793fa92e413fbdf622aaf
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2652 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2652 AcroRd32.exe 2652 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 572 wrote to memory of 2652 572 cmd.exe 31 PID 572 wrote to memory of 2652 572 cmd.exe 31 PID 572 wrote to memory of 2652 572 cmd.exe 31 PID 572 wrote to memory of 2652 572 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\MasonRootkit-main\Rootkit.cs1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\MasonRootkit-main\Rootkit.cs"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD546311a6382e7bdd71a36a30b25d32b98
SHA1be3814a6ae62f2005bbf75388f5f5d806a804d45
SHA25694d89cf952100dfbdefa51a4dc147bb9ef4b0b3fed4f8ae4204173b81c4dfec0
SHA512d3859fb9fd086803297067a3ef8db3f520c51b99efbf7d5ef177781400e797bfa31737375f9995928087d50f76b146d74d1411d77385ad2d68afd13457fe526f