Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
17s -
max time network
19s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
14/09/2024, 12:51
Static task
static1
General
-
Target
FearstCheat.exe
-
Size
1.7MB
-
MD5
0588341217749d543c1d9808ae996a93
-
SHA1
b0597e54d0c9a9c031d2c4f04e154e4e329f829e
-
SHA256
137372fa011a0dd39cc61ef4924fbaf23ac1d2f256a1a121c6de8bc3e08cddbb
-
SHA512
acc4f8dd88f1cbe79c0e374eb60674c5ccc324d97bda85b392a26177566a6c24390c5511535da66a6871e1c0c2a4d2bec180c08785b6d22e5d2cf39426a36248
-
SSDEEP
49152:Jdn9ScjutnACJUB7ngHHZSlwM0iKcK7UBbquuRJ:Jd9S5ZRt7U
Malware Config
Extracted
xworm
192.168.223.129:4935
-
Install_directory
%AppData%
-
install_file
$77.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1404-7-0x0000000000400000-0x0000000000416000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4380 powershell.exe 2004 powershell.exe 4736 powershell.exe 4480 powershell.exe -
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/1496-1-0x0000000000C80000-0x0000000000E30000-memory.dmp net_reactor -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\%startupname%.lnk FearstCheat.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Run\$77 = "C:\\Users\\Admin\\AppData\\Roaming\\$77.exe" MSBuild.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1496 set thread context of 1404 1496 FearstCheat.exe 72 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FearstCheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1840 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4380 powershell.exe 4380 powershell.exe 4380 powershell.exe 2004 powershell.exe 2004 powershell.exe 2004 powershell.exe 4736 powershell.exe 4736 powershell.exe 4736 powershell.exe 4480 powershell.exe 4480 powershell.exe 4480 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1404 MSBuild.exe Token: SeDebugPrivilege 4380 powershell.exe Token: SeDebugPrivilege 2004 powershell.exe Token: SeDebugPrivilege 4736 powershell.exe Token: SeDebugPrivilege 4480 powershell.exe Token: SeDebugPrivilege 1404 MSBuild.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1496 wrote to memory of 1404 1496 FearstCheat.exe 72 PID 1496 wrote to memory of 1404 1496 FearstCheat.exe 72 PID 1496 wrote to memory of 1404 1496 FearstCheat.exe 72 PID 1496 wrote to memory of 1404 1496 FearstCheat.exe 72 PID 1496 wrote to memory of 1404 1496 FearstCheat.exe 72 PID 1496 wrote to memory of 1404 1496 FearstCheat.exe 72 PID 1496 wrote to memory of 1404 1496 FearstCheat.exe 72 PID 1496 wrote to memory of 1404 1496 FearstCheat.exe 72 PID 1404 wrote to memory of 4380 1404 MSBuild.exe 74 PID 1404 wrote to memory of 4380 1404 MSBuild.exe 74 PID 1404 wrote to memory of 4380 1404 MSBuild.exe 74 PID 1404 wrote to memory of 2004 1404 MSBuild.exe 76 PID 1404 wrote to memory of 2004 1404 MSBuild.exe 76 PID 1404 wrote to memory of 2004 1404 MSBuild.exe 76 PID 1404 wrote to memory of 4736 1404 MSBuild.exe 78 PID 1404 wrote to memory of 4736 1404 MSBuild.exe 78 PID 1404 wrote to memory of 4736 1404 MSBuild.exe 78 PID 1404 wrote to memory of 4480 1404 MSBuild.exe 80 PID 1404 wrote to memory of 4480 1404 MSBuild.exe 80 PID 1404 wrote to memory of 4480 1404 MSBuild.exe 80 PID 1404 wrote to memory of 1840 1404 MSBuild.exe 82 PID 1404 wrote to memory of 1840 1404 MSBuild.exe 82 PID 1404 wrote to memory of 1840 1404 MSBuild.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\FearstCheat.exe"C:\Users\Admin\AppData\Local\Temp\FearstCheat.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4380
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'MSBuild.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4480
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "$77" /tr "C:\Users\Admin\AppData\Roaming\$77.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1840
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
Filesize
18KB
MD53db0de783af600eeba0913c24748a72a
SHA1713cd9bb8ddc4abffe540ee4ddc03a11908bca2f
SHA256643eeefbea26b727f28dd35cb097dff5d8d607ae3c31b8be97ab032d37ed7edc
SHA512dbe72dc08841a647e9e5cd800b4342a0d64f784d8e8dda68d3f8426e26e794b0ae82cc5f84f0ada168382a8cc619e55c4f69ff8bbb41dff3e93b8aa5d28a6e1f
-
Filesize
18KB
MD52821074d4ee07170c720f0ccdfcbde79
SHA1fd3c8d9f981bb1989a01494797c7a0556cb86fa2
SHA2564d569eff063c7845b9d6061d7c06962d1113fed2217442bf12fb8ed7b64ce1d0
SHA5125d323a480cff2d347842d8c80f2a1b13be0a3473a6287746c38802bc5df3e7d8c83b4d4c3b5328648b7240c433766608d241e36eba993956646e084a495ef8aa
-
Filesize
18KB
MD5ada0431564cb7c7234bfbd8b6d0529a5
SHA1697be4d8a88744f12ed3f6da7ba828584a70dc86
SHA25640d00e089e8a7582d6adf6b6546d32b96f26e6947437d3bc323c17a0dee93e19
SHA512503bd6d338061d2c249f7bb439b47e953a108b212410c19fee27a2cf6c2c05ccdd0ddcda97bc380b36a83f409e870c51d0ac2cf3089d05984bbd5ce4c5341ab3
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a