Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
100s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/09/2024, 05:45
Static task
static1
Behavioral task
behavioral1
Sample
dropper.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
dropper.exe
Resource
win11-20240802-en
General
-
Target
dropper.exe
-
Size
33.5MB
-
MD5
5e84cd460ac5eb9ee72dd2f831297b52
-
SHA1
17960e740ac5596b5025ab0515383df0db3b8753
-
SHA256
8c473bf936fd8076a2330dbc420ed96b96a6169f747aab0129705e1d4e57309d
-
SHA512
c670120cea8eef9ff2f017e1d13470774a155cbc5e47877adf45ed37a91afa89eee6903fd7b848d99a5cd0aed4c5619541928ea0ed63caeb866c0a68ca1a14de
-
SSDEEP
786432:lkghL+KScDz/3G5qz0dwUOA9ZCVgQKwWCIPwUT49Zf3/b:agB7Db25qz0dQAUgGXIPwbZnb
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2842058299-443432012-2465494467-1000\Software\Microsoft\Windows\CurrentVersion\Run\loader = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\Shell\\loader.bat" dropper.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3520 wmic.exe Token: SeSecurityPrivilege 3520 wmic.exe Token: SeTakeOwnershipPrivilege 3520 wmic.exe Token: SeLoadDriverPrivilege 3520 wmic.exe Token: SeSystemProfilePrivilege 3520 wmic.exe Token: SeSystemtimePrivilege 3520 wmic.exe Token: SeProfSingleProcessPrivilege 3520 wmic.exe Token: SeIncBasePriorityPrivilege 3520 wmic.exe Token: SeCreatePagefilePrivilege 3520 wmic.exe Token: SeBackupPrivilege 3520 wmic.exe Token: SeRestorePrivilege 3520 wmic.exe Token: SeShutdownPrivilege 3520 wmic.exe Token: SeDebugPrivilege 3520 wmic.exe Token: SeSystemEnvironmentPrivilege 3520 wmic.exe Token: SeRemoteShutdownPrivilege 3520 wmic.exe Token: SeUndockPrivilege 3520 wmic.exe Token: SeManageVolumePrivilege 3520 wmic.exe Token: 33 3520 wmic.exe Token: 34 3520 wmic.exe Token: 35 3520 wmic.exe Token: 36 3520 wmic.exe Token: SeIncreaseQuotaPrivilege 3520 wmic.exe Token: SeSecurityPrivilege 3520 wmic.exe Token: SeTakeOwnershipPrivilege 3520 wmic.exe Token: SeLoadDriverPrivilege 3520 wmic.exe Token: SeSystemProfilePrivilege 3520 wmic.exe Token: SeSystemtimePrivilege 3520 wmic.exe Token: SeProfSingleProcessPrivilege 3520 wmic.exe Token: SeIncBasePriorityPrivilege 3520 wmic.exe Token: SeCreatePagefilePrivilege 3520 wmic.exe Token: SeBackupPrivilege 3520 wmic.exe Token: SeRestorePrivilege 3520 wmic.exe Token: SeShutdownPrivilege 3520 wmic.exe Token: SeDebugPrivilege 3520 wmic.exe Token: SeSystemEnvironmentPrivilege 3520 wmic.exe Token: SeRemoteShutdownPrivilege 3520 wmic.exe Token: SeUndockPrivilege 3520 wmic.exe Token: SeManageVolumePrivilege 3520 wmic.exe Token: 33 3520 wmic.exe Token: 34 3520 wmic.exe Token: 35 3520 wmic.exe Token: 36 3520 wmic.exe Token: SeDebugPrivilege 3332 dropper.exe Token: SeIncreaseQuotaPrivilege 2616 wmic.exe Token: SeSecurityPrivilege 2616 wmic.exe Token: SeTakeOwnershipPrivilege 2616 wmic.exe Token: SeLoadDriverPrivilege 2616 wmic.exe Token: SeSystemProfilePrivilege 2616 wmic.exe Token: SeSystemtimePrivilege 2616 wmic.exe Token: SeProfSingleProcessPrivilege 2616 wmic.exe Token: SeIncBasePriorityPrivilege 2616 wmic.exe Token: SeCreatePagefilePrivilege 2616 wmic.exe Token: SeBackupPrivilege 2616 wmic.exe Token: SeRestorePrivilege 2616 wmic.exe Token: SeShutdownPrivilege 2616 wmic.exe Token: SeDebugPrivilege 2616 wmic.exe Token: SeSystemEnvironmentPrivilege 2616 wmic.exe Token: SeRemoteShutdownPrivilege 2616 wmic.exe Token: SeUndockPrivilege 2616 wmic.exe Token: SeManageVolumePrivilege 2616 wmic.exe Token: 33 2616 wmic.exe Token: 34 2616 wmic.exe Token: 35 2616 wmic.exe Token: 36 2616 wmic.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3332 wrote to memory of 3520 3332 dropper.exe 79 PID 3332 wrote to memory of 3520 3332 dropper.exe 79 PID 3332 wrote to memory of 3384 3332 dropper.exe 82 PID 3332 wrote to memory of 3384 3332 dropper.exe 82 PID 3332 wrote to memory of 1880 3332 dropper.exe 84 PID 3332 wrote to memory of 1880 3332 dropper.exe 84 PID 1872 wrote to memory of 440 1872 cmd.exe 90 PID 1872 wrote to memory of 440 1872 cmd.exe 90 PID 440 wrote to memory of 2616 440 dropper.exe 91 PID 440 wrote to memory of 2616 440 dropper.exe 91 PID 440 wrote to memory of 1192 440 dropper.exe 93 PID 440 wrote to memory of 1192 440 dropper.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\dropper.exe"C:\Users\Admin\AppData\Local\Temp\dropper.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" diskdrive get Model2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3520
-
-
C:\Windows\SYSTEM32\findstr.exe"findstr.exe" /i "DADY HARDDISK QEMU HARDDISK WDC WDS100T2B0A"2⤵PID:3384
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C "C:\Users\Admin\AppData\Local\Microsoft\Windows\Shell\loader.bat"2⤵PID:1880
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:580
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\dropper.exedropper.exe2⤵
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" diskdrive get Model3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\SYSTEM32\findstr.exe"findstr.exe" /i "DADY HARDDISK QEMU HARDDISK WDC WDS100T2B0A"3⤵PID:1192
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20B
MD53f3a41bd8b90767fc6aac3793137c6f3
SHA18709a86ed2364a4daf7c443770b1f3fefc6d7529
SHA25641b9efbeb8fe9a6f96a7ad64edbf1d06a24d5d4574d380191411af3d64614c80
SHA5127555b2ec9e6b0a2c1eaaff954b0a7d5421f1b5b79b38261d5d5c1d5b41699047a2db2593b679ac454cd5e083508961d5689f5880136faf2470e9219463c37dc8