Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    131s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 13:05

General

  • Target

    Rusticaland-launcher.exe

  • Size

    64.8MB

  • MD5

    cf54cb776822a73090dc6b676e38782a

  • SHA1

    f1ac2a51e35e30c07ed2df769135295d3a5a88bf

  • SHA256

    fc93d7953819ec00809d4b231ce8b96d67d3a8cd46d13d0becb463fe16bde68f

  • SHA512

    8cb5dcb036662939b45d4c6ef991291f6d5efbac5fff79a01c43181632acd081f68f6ffe4459aec1ee2c7d3880ef8fcd5e44b85e173491034ccb5945be89c081

  • SSDEEP

    1572864:R9LHOdEv/78Bl9Bzs7hwOq/VE2kUC7dTiMuR34H8P7o92Zh:zjOU/e9FOIaLW1xP7o92Z

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Rusticaland-launcher.exe
    "C:\Users\Admin\AppData\Local\Temp\Rusticaland-launcher.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Users\Admin\AppData\Local\Temp\ZipExtractor.exe
      "C:\Users\Admin\AppData\Local\Temp\ZipExtractor.exe" "C:\Users\Admin\AppData\Local\Temp\Rusticaland-launcher.zip" "C:\Users\Admin\AppData\Local\Temp\Rusticaland-launcher.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:556
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2668 -s 3480
      2⤵
      • Loads dropped DLL
      PID:1732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab7D9B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7DBD.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\ZipExtractor.exe

    Filesize

    103KB

    MD5

    dda26abcea9aa9cad843f8dfe348fac8

    SHA1

    3d21afc1824129af40b570e9a2550aa7d85d2970

    SHA256

    b9da405d11a1572c9d4b841ab86721ebc7f8dcaa1d266c98f46fc0ceaecb849f

    SHA512

    22807cd4ec4a7aa62c9ebe1781ed6410c1c13cc65ca9e230af3385e6020d90b99986d04764a0f14e1d2d53c6c272f976e1a3b74b6176527e3023c72ac4883ea2

  • C:\Users\Admin\AppData\Roaming\Rusticaland\QuickLauncher\MissingResources.zip

    Filesize

    474KB

    MD5

    3ad18aa86939ac43408c3f75e3644387

    SHA1

    259afcf64c5ddbefe54e72b7dfaf284b947b2a64

    SHA256

    2275cbaa3440b7b657a0cd61098bfe62ab93ede23fd6234869a576155990aadc

    SHA512

    c83c5acf3a01c35c356c284de09bfdc59715331470cba75eadbc7d083da0ae18e963661915bacf55ee91682fe01155cacf9710b85583bcc12648786b81c323d6

  • C:\Users\Admin\AppData\Roaming\Rusticaland\QuickLauncher\Nuclear.wma

    Filesize

    5.0MB

    MD5

    ecc578e589d671109bbc291268e24854

    SHA1

    2c7153ad8b0464c679cf28344f787bab713ba878

    SHA256

    ddf635d42349620ecf288b1b2bc4006f9a4849c5b136847c9c5e44651790dc6a

    SHA512

    9b1691a7236be5c0a04421f65fdd91b3bdbf283879c92e8076f11c50bacafcd6faa746e743e73c65b971ce9678098630daac0d88a52ed2c2ba1af4f51d60a998

  • \Users\Admin\AppData\Local\Temp\WebView2Loader.dll

    Filesize

    156KB

    MD5

    1ba96800bad54c6019fdb6fe41fca592

    SHA1

    b443b01719c3046d9107e93d181d5da38e6650aa

    SHA256

    dcf3c4f6024313eeb6f775ed343265d73be1ce1d5dde2f92195dbc32310c7fc9

    SHA512

    499764e2c75e9afb25e19941312221d3fce7c058ffac8293db5986a6a9b8dd77c45bf93311858470bec9afbd64dc3068b3d9a26d3e01051b9d51c02b1c2484c2

  • memory/556-120-0x0000000000350000-0x0000000000370000-memory.dmp

    Filesize

    128KB

  • memory/2668-11-0x0000000000F90000-0x000000000104E000-memory.dmp

    Filesize

    760KB

  • memory/2668-27-0x000000002E030000-0x000000002E242000-memory.dmp

    Filesize

    2.1MB

  • memory/2668-9-0x0000000021480000-0x00000000227E4000-memory.dmp

    Filesize

    19.4MB

  • memory/2668-10-0x00000000227F0000-0x0000000022D02000-memory.dmp

    Filesize

    5.1MB

  • memory/2668-0-0x000007FEF5A23000-0x000007FEF5A24000-memory.dmp

    Filesize

    4KB

  • memory/2668-12-0x0000000000C90000-0x0000000000C9C000-memory.dmp

    Filesize

    48KB

  • memory/2668-14-0x000000001FB40000-0x000000001FBF2000-memory.dmp

    Filesize

    712KB

  • memory/2668-13-0x000000001F300000-0x000000001F36C000-memory.dmp

    Filesize

    432KB

  • memory/2668-16-0x000000001F370000-0x000000001F3C0000-memory.dmp

    Filesize

    320KB

  • memory/2668-15-0x00000000201B0000-0x0000000020288000-memory.dmp

    Filesize

    864KB

  • memory/2668-18-0x000000001FAF0000-0x000000001FB36000-memory.dmp

    Filesize

    280KB

  • memory/2668-19-0x000000002C4F0000-0x000000002C6CE000-memory.dmp

    Filesize

    1.9MB

  • memory/2668-20-0x000000002C6D0000-0x000000002CB52000-memory.dmp

    Filesize

    4.5MB

  • memory/2668-21-0x000000002CB50000-0x000000002D306000-memory.dmp

    Filesize

    7.7MB

  • memory/2668-22-0x0000000025A10000-0x0000000025AF6000-memory.dmp

    Filesize

    920KB

  • memory/2668-23-0x0000000026390000-0x000000002647C000-memory.dmp

    Filesize

    944KB

  • memory/2668-24-0x000000002D310000-0x000000002D9A0000-memory.dmp

    Filesize

    6.6MB

  • memory/2668-25-0x000000002D9A0000-0x000000002DD3A000-memory.dmp

    Filesize

    3.6MB

  • memory/2668-26-0x000000002DD40000-0x000000002E034000-memory.dmp

    Filesize

    3.0MB

  • memory/2668-8-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

    Filesize

    9.9MB

  • memory/2668-28-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

    Filesize

    9.9MB

  • memory/2668-29-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

    Filesize

    9.9MB

  • memory/2668-30-0x00000000307C0000-0x0000000031028000-memory.dmp

    Filesize

    8.4MB

  • memory/2668-31-0x0000000031030000-0x00000000313E6000-memory.dmp

    Filesize

    3.7MB

  • memory/2668-7-0x0000000000C70000-0x0000000000C78000-memory.dmp

    Filesize

    32KB

  • memory/2668-6-0x0000000000C50000-0x0000000000C66000-memory.dmp

    Filesize

    88KB

  • memory/2668-5-0x0000000000900000-0x000000000091C000-memory.dmp

    Filesize

    112KB

  • memory/2668-91-0x000007FEF5A23000-0x000007FEF5A24000-memory.dmp

    Filesize

    4KB

  • memory/2668-92-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

    Filesize

    9.9MB

  • memory/2668-94-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

    Filesize

    9.9MB

  • memory/2668-95-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

    Filesize

    9.9MB

  • memory/2668-102-0x000000001FDA0000-0x000000001FDB0000-memory.dmp

    Filesize

    64KB

  • memory/2668-4-0x0000000020790000-0x000000002147A000-memory.dmp

    Filesize

    12.9MB

  • memory/2668-106-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

    Filesize

    9.9MB

  • memory/2668-108-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

    Filesize

    9.9MB

  • memory/2668-111-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

    Filesize

    9.9MB

  • memory/2668-112-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

    Filesize

    9.9MB

  • memory/2668-3-0x00000000008E0000-0x00000000008FA000-memory.dmp

    Filesize

    104KB

  • memory/2668-2-0x00000000008D0000-0x00000000008DA000-memory.dmp

    Filesize

    40KB

  • memory/2668-1-0x0000000001060000-0x0000000005132000-memory.dmp

    Filesize

    64.8MB