Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/09/2024, 08:01

General

  • Target

    restart.exe

  • Size

    88KB

  • MD5

    2139fd5b746fdb409b7b8df60bafdb11

  • SHA1

    2cde2eac5ae0a5c2327f0c8090279df08b2d9920

  • SHA256

    6d918e0ce3d6a2a10a607043e03e8d744b985e8e653072c83c004020c1281706

  • SHA512

    6d22dbb5cbb4ba06c6d8855569b1668594d39d70e94e91f98a5266224d27f978eae4fb23c6d4647aaa1b1dbfad3e6b0970e2ad08aa607324ed998c35bb5b306b

  • SSDEEP

    1536:rL7ftfkS5g9YOms+gZcQipICdXkNDqLLZX9lItVGL++eIOlnToIf5w1OG:rHFfHgTWmCRkGbKGLeNTBf5y

Malware Config

Signatures

  • Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • System Network Connections Discovery 1 TTPs 2 IoCs

    Attempt to get a listing of network connections.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Kills process with WMI 2 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\restart.exe
    "C:\Users\Admin\AppData\Local\Temp\restart.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\F779.tmp\F77A.tmp\F77B.bat C:\Users\Admin\AppData\Local\Temp\restart.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Users\Admin\AppData\Local\Temp\stop.exe
        stop.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Suspicious use of WriteProcessMemory
        PID:2888
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\F7A8.tmp\F7A9.tmp\F7AA.bat C:\Users\Admin\AppData\Local\Temp\stop.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2864
          • C:\Windows\SysWOW64\mshta.exe
            mshta vbscript:CreateObject("Shell.Application").ShellExecute("cmd.exe","/c C:\Users\Admin\AppData\Local\Temp\stop.exe ::","","runas",0)(window.close)
            5⤵
            • Access Token Manipulation: Create Process with Token
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of WriteProcessMemory
            PID:2856
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\stop.exe ::
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2312
              • C:\Users\Admin\AppData\Local\Temp\stop.exe
                C:\Users\Admin\AppData\Local\Temp\stop.exe ::
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2944
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\F863.tmp\F873.tmp\F874.bat C:\Users\Admin\AppData\Local\Temp\stop.exe ::"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:1904
                  • C:\Windows\SysWOW64\PING.EXE
                    ping -n 5 127.0.0.1
                    9⤵
                    • System Location Discovery: System Language Discovery
                    • System Network Configuration Discovery: Internet Connection Discovery
                    • Runs ping.exe
                    PID:2760
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c netstat -ano | findstr 38808
                    9⤵
                    • System Location Discovery: System Language Discovery
                    • System Network Connections Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:2628
                    • C:\Windows\SysWOW64\NETSTAT.EXE
                      netstat -ano
                      10⤵
                      • System Location Discovery: System Language Discovery
                      • System Network Connections Discovery
                      • Gathers network information
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2244
                    • C:\Windows\SysWOW64\findstr.exe
                      findstr 38808
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:2264
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /f /pid
                    9⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    PID:2268
                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                    wmic process where ParentProcessId= call terminate
                    9⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with WMI
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2140
                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                    wmic process where "CommandLine Like '%-Dframework=DCP -Dservice=LocalAutoExecutor%'" call terminate
                    9⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with WMI
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1244
                  • C:\Windows\SysWOW64\PING.EXE
                    ping -n 2 127.0.0.1
                    9⤵
                    • System Location Discovery: System Language Discovery
                    • System Network Configuration Discovery: Internet Connection Discovery
                    • Runs ping.exe
                    PID:1724
      • C:\Windows\system32\PING.EXE
        ping -n 4 127.0.0.1
        3⤵
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:2868
      • C:\Users\Admin\AppData\Local\Temp\startup.exe
        startup.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Suspicious use of WriteProcessMemory
        PID:2176
        • C:\Windows\system32\cmd.exe
          "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\36A.tmp\36B.tmp\36C.bat C:\Users\Admin\AppData\Local\Temp\startup.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:804
          • C:\Windows\system32\javaw.exe
            javaw -Djava.net.preferIPv4Stack=false -Xms128m -Xmx512m -XX:+HeapDumpOnOutOfMemoryError -XX:HeapDumpPath=./ -cp "../app/lib/*;../app/lib/undertow/*" -noverify -Dframework=DCP -Dservice=LocalAutoExecutor -Dspring.jmx.enabled=false -XX:TieredStopAtLevel=1 -Drpc.introspection.checking=true -Dco.paralleluniverse.fibers.verifyInstrumentation=true -Dspring.config.location=application.yaml -Dspring.main.web-environment=true -Dserver.service=service.yaml com.huawei.dcp.springframework.springboot.Main
            5⤵
              PID:1692

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\36A.tmp\36B.tmp\36C.bat

      Filesize

      1KB

      MD5

      6fff0f25b1f097e77fa3cc3baef782be

      SHA1

      a5b3f62a5e31bae2649efb882a81cfd1a0f786a3

      SHA256

      365dcf49f7f01f038f371fe69342965d9a9ae288017b8eea3cd8b9cb90f4d3de

      SHA512

      121b1d335f3826f9f128fbf952837a49b3103183a391ac9c8479e5e02a7fa315b608f97e7594414f4364dc228dbc4004a2de4711f94bb2749f7c5f38b28d1eea

    • C:\Users\Admin\AppData\Local\Temp\F779.tmp\F77A.tmp\F77B.bat

      Filesize

      162B

      MD5

      71be6427d99fb57b746a713186983866

      SHA1

      41b9e0b40ad51d7d0f950fc2259136b6cfdc3b25

      SHA256

      f30c36097af8deb6f47fb2fc5f81e001129dc10ee536b34292231f66b480b8c0

      SHA512

      8e7f5e2609d18daf223d25c26ebfc9e4836772a2d619a5fce05d4c582c2b3519043c93e51d3446902d7e6140ea1ce55c31815daa05775423b640fbf208223689

    • C:\Users\Admin\AppData\Local\Temp\F7A8.tmp\F7A9.tmp\F7AA.bat

      Filesize

      878B

      MD5

      4c3d8e6836df5b79c9801e66b9c4544f

      SHA1

      8f4db94463b6ca0694ef20539be2110bae41155d

      SHA256

      490ed3f789efb0ec7b5486de682055c2fbd490f92f927757775f498f14f1d90f

      SHA512

      03c2bb1555a9cf330e2831fe39c4187309f0a3d775360bbf5f301d2a88c5323abf1d6a0cd48d1e4ba13178c1ab241a76b81495cea4b63ee468760a6b9a1092fe

    • memory/1692-18-0x0000000000140000-0x0000000000141000-memory.dmp

      Filesize

      4KB