Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
5s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/09/2024, 08:07 UTC
Static task
static1
General
-
Target
start_yara.exe
-
Size
4.6MB
-
MD5
90bacba6d4a481397d3a759f06bf7271
-
SHA1
bf0c904a0d72981e51ff575272203c03c8e3327a
-
SHA256
bf2a11710eb16103afbcb200979c9a6de040a9b6d5e77bde5d6a93b5837aa6f1
-
SHA512
a6582bf8132cd1c3aba5a345e1fb79c255f187b6e68d7ea0dc0c34bd8596ac1462cf97beb5716ef5fd85f09436e61b1c2b03f690f9e7198d8666a3b03c9e4ad7
-
SSDEEP
98304:VllLJqs6/is/bhFAf5lx7pll23uog6rbre/Zs/z1rzN:VlusXs/bhC17HzD66xs/z1rB
Malware Config
Signatures
-
Cobalt Strike reflective loader 1 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral1/files/0x0008000000015d9c-25.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Industroyer
Also known as CrashOverride. Malware framework which targets Industrial Control Systems (ICS) related to power transmission.
-
Industroyer IEC-104 Module 1 IoCs
Contains strings related to Industroyer module used to communicate with power transmission grids over IEC-104 protocol.
resource yara_rule behavioral1/files/0x0008000000015d9c-25.dat win_industroyer_w3 -
Merlin payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000015d9c-25.dat family_merlin -
NetFilter payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000015d9c-25.dat netfilter_payload -
NetWire RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000015d9c-25.dat netwire -
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000015d9c-25.dat family_snakekeylogger -
Executes dropped EXE 1 IoCs
pid Process 2976 yara64.exe -
Loads dropped DLL 1 IoCs
pid Process 2420 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language start_yara.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2720 AcroRd32.exe 2720 AcroRd32.exe 2720 AcroRd32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1768 wrote to memory of 2420 1768 start_yara.exe 30 PID 1768 wrote to memory of 2420 1768 start_yara.exe 30 PID 1768 wrote to memory of 2420 1768 start_yara.exe 30 PID 1768 wrote to memory of 2420 1768 start_yara.exe 30 PID 2420 wrote to memory of 2976 2420 cmd.exe 32 PID 2420 wrote to memory of 2976 2420 cmd.exe 32 PID 2420 wrote to memory of 2976 2420 cmd.exe 32 PID 2420 wrote to memory of 2976 2420 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\start_yara.exe"C:\Users\Admin\AppData\Local\Temp\start_yara.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\yara_check\start.bat" "2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\yara_check\yara64.exeyara64.exe -r yara-rules-full.yar c:\3⤵
- Executes dropped EXE
PID:2976
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD5edc9d216ea519d018d09eeabd084e805
SHA1eb3fe5524f4e72549d5bf3d9bbdfa38f60084a5e
SHA2562468a503a7d41c4e932136218d5ce2d356aba91b92f1ba60c59a81a6b980cea1
SHA51262e3c92ae597c13d910c35b2491928586baf6c43d13cddc2ee56ece88c2bcaa67bc447542e253ca6364195672d790f1aa0e752707ca533cfcd54d3d36e79fcb3
-
Filesize
15.2MB
MD52c74ae086ff861cbc3ca5099ff09f769
SHA1794e255e57ec94f1a3763867f3c32690d5ceb701
SHA256e3263b8999ceed377550c046caf0f28df1fbe1d6960f57645360da463c2b3bc8
SHA512c7deb47b8f70be5b10f3d8b2491c0223be5538f76d344e560b8fb4b7dd202677ef21c27cbc382709f19f3dd8c98ccaa5ff9a7a5a6e6dda78c472d60f3dc1ff4b
-
Filesize
2.3MB
MD54210345b1ef5eb0aac487b429aa4b03c
SHA11ee298d7f5410f40482dfb6b2fb4142ba19df1cf
SHA256da87146a6b976035e7ef95efe89ae30ba272a09216a75b7938b846dfb894345c
SHA512d0a785f879d3ac7ad3a23f775927c0736ed29c55d2bb8e24c1e40f2f1bc35c1726bfb0fbe5689eefc01d9bb81f49e3d6b5e86f7fd01c11b59fb15b01cf176d8a