Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    5s
  • max time network
    0s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10/09/2024, 08:07 UTC

General

  • Target

    start_yara.exe

  • Size

    4.6MB

  • MD5

    90bacba6d4a481397d3a759f06bf7271

  • SHA1

    bf0c904a0d72981e51ff575272203c03c8e3327a

  • SHA256

    bf2a11710eb16103afbcb200979c9a6de040a9b6d5e77bde5d6a93b5837aa6f1

  • SHA512

    a6582bf8132cd1c3aba5a345e1fb79c255f187b6e68d7ea0dc0c34bd8596ac1462cf97beb5716ef5fd85f09436e61b1c2b03f690f9e7198d8666a3b03c9e4ad7

  • SSDEEP

    98304:VllLJqs6/is/bhFAf5lx7pll23uog6rbre/Zs/z1rzN:VlusXs/bhC17HzD66xs/z1rB

Malware Config

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Industroyer

    Also known as CrashOverride. Malware framework which targets Industrial Control Systems (ICS) related to power transmission.

  • Industroyer IEC-104 Module 1 IoCs

    Contains strings related to Industroyer module used to communicate with power transmission grids over IEC-104 protocol.

  • Merlin

    Merlin is a cross-platform post-exploitation C2 framework written in golang.

  • Merlin payload 1 IoCs
  • NetFilter

    NetFilter is a rootkit first seen in June 2021.

  • NetFilter payload 1 IoCs
  • NetWire RAT payload 1 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\start_yara.exe
    "C:\Users\Admin\AppData\Local\Temp\start_yara.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\yara_check\start.bat" "
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2420
      • C:\yara_check\yara64.exe
        yara64.exe -r yara-rules-full.yar c:\
        3⤵
        • Executes dropped EXE
        PID:2976
  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\yara_check\start.bat

    Filesize

    64B

    MD5

    edc9d216ea519d018d09eeabd084e805

    SHA1

    eb3fe5524f4e72549d5bf3d9bbdfa38f60084a5e

    SHA256

    2468a503a7d41c4e932136218d5ce2d356aba91b92f1ba60c59a81a6b980cea1

    SHA512

    62e3c92ae597c13d910c35b2491928586baf6c43d13cddc2ee56ece88c2bcaa67bc447542e253ca6364195672d790f1aa0e752707ca533cfcd54d3d36e79fcb3

  • C:\yara_check\yara-rules-full.yar

    Filesize

    15.2MB

    MD5

    2c74ae086ff861cbc3ca5099ff09f769

    SHA1

    794e255e57ec94f1a3763867f3c32690d5ceb701

    SHA256

    e3263b8999ceed377550c046caf0f28df1fbe1d6960f57645360da463c2b3bc8

    SHA512

    c7deb47b8f70be5b10f3d8b2491c0223be5538f76d344e560b8fb4b7dd202677ef21c27cbc382709f19f3dd8c98ccaa5ff9a7a5a6e6dda78c472d60f3dc1ff4b

  • \yara_check\yara64.exe

    Filesize

    2.3MB

    MD5

    4210345b1ef5eb0aac487b429aa4b03c

    SHA1

    1ee298d7f5410f40482dfb6b2fb4142ba19df1cf

    SHA256

    da87146a6b976035e7ef95efe89ae30ba272a09216a75b7938b846dfb894345c

    SHA512

    d0a785f879d3ac7ad3a23f775927c0736ed29c55d2bb8e24c1e40f2f1bc35c1726bfb0fbe5689eefc01d9bb81f49e3d6b5e86f7fd01c11b59fb15b01cf176d8a

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.