Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 05:04 UTC

General

  • Target

    9f3b4aeb89292766abccc7e26f7a3b62f12a1ad09b96643157a861280bb45af3N.exe

  • Size

    1.4MB

  • MD5

    649e6486aa914b2154e0574f7b9e4960

  • SHA1

    17283159a0fc0c703c1a32c3ee6eaf1778285cc0

  • SHA256

    9f3b4aeb89292766abccc7e26f7a3b62f12a1ad09b96643157a861280bb45af3

  • SHA512

    6e5545fcfb8fd5c2c9cf7adbb72abf6444374966022dee402936ba79691e2ea7585c8cda035dfab353b47fb7c17b90eaaf9d3534137cde730217323d167ef439

  • SSDEEP

    24576:ru6J3xO0c+JY5UZ+XCHkGso6Fa720W4njUprvVcC1f2o5RRfgdWYg:Fo0c++OCokGs9Fa+rd1f26RNYg

Malware Config

Extracted

Family

netwire

C2

Wealthy2019.com.strangled.net:20190

wealthyme.ddns.net:20190

Attributes
  • activex_autorun

    false

  • copy_executable

    true

  • delete_original

    false

  • host_id

    sunshineslisa

  • install_path

    %AppData%\Imgburn\Host.exe

  • keylogger_dir

    %AppData%\Logs\Imgburn\

  • lock_executable

    false

  • offline_keylogger

    true

  • password

    sucess

  • registry_autorun

    false

  • use_mutex

    false

Extracted

Family

warzonerat

C2

wealth.warzonedns.com:5202

Signatures

  • NetWire RAT payload 12 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 4 IoCs
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 16 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f3b4aeb89292766abccc7e26f7a3b62f12a1ad09b96643157a861280bb45af3N.exe
    "C:\Users\Admin\AppData\Local\Temp\9f3b4aeb89292766abccc7e26f7a3b62f12a1ad09b96643157a861280bb45af3N.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Users\Admin\AppData\Roaming\Blasthost.exe
      "C:\Users\Admin\AppData\Roaming\Blasthost.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe
        "C:\Users\Admin\AppData\Roaming\Imgburn\Host.exe"
        3⤵
        • Executes dropped EXE
        PID:2928
    • C:\Users\Admin\AppData\Local\Temp\9f3b4aeb89292766abccc7e26f7a3b62f12a1ad09b96643157a861280bb45af3N.exe
      "C:\Users\Admin\AppData\Local\Temp\9f3b4aeb89292766abccc7e26f7a3b62f12a1ad09b96643157a861280bb45af3N.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2752
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1144
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2272
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {FC0DD3A5-38F6-4E90-9E2D-4B3DA67FA08C} S-1-5-21-1846800975-3917212583-2893086201-1000:ZQABOPWE\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
      C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2628
      • C:\Users\Admin\AppData\Roaming\Blasthost.exe
        "C:\Users\Admin\AppData\Roaming\Blasthost.exe"
        3⤵
        • Executes dropped EXE
        PID:2324
      • C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
        "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:560
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1824
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2008
    • C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
      C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2556
      • C:\Users\Admin\AppData\Roaming\Blasthost.exe
        "C:\Users\Admin\AppData\Roaming\Blasthost.exe"
        3⤵
        • Executes dropped EXE
        PID:3044
      • C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
        "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1516
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2260
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:1748
    • C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
      C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      PID:2372
      • C:\Users\Admin\AppData\Roaming\Blasthost.exe
        "C:\Users\Admin\AppData\Roaming\Blasthost.exe"
        3⤵
        • Executes dropped EXE
        PID:2396
      • C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe
        "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2696
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2920
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\SysWOW64\schtasks.exe" /create /tn raserver /tr "C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe" /sc minute /mo 1 /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2916

Network

  • flag-us
    DNS
    Wealthy2019.com.strangled.net
    Blasthost.exe
    Remote address:
    8.8.8.8:53
    Request
    Wealthy2019.com.strangled.net
    IN A
    Response
  • flag-us
    DNS
    wealth.warzonedns.com
    9f3b4aeb89292766abccc7e26f7a3b62f12a1ad09b96643157a861280bb45af3N.exe
    Remote address:
    8.8.8.8:53
    Request
    wealth.warzonedns.com
    IN A
    Response
  • flag-us
    DNS
    wealthyme.ddns.net
    Host.exe
    Remote address:
    8.8.8.8:53
    Request
    wealthyme.ddns.net
    IN A
    Response
No results found
  • 8.8.8.8:53
    Wealthy2019.com.strangled.net
    dns
    Blasthost.exe
    75 B
    134 B
    1
    1

    DNS Request

    Wealthy2019.com.strangled.net

  • 8.8.8.8:53
    wealth.warzonedns.com
    dns
    9f3b4aeb89292766abccc7e26f7a3b62f12a1ad09b96643157a861280bb45af3N.exe
    67 B
    140 B
    1
    1

    DNS Request

    wealth.warzonedns.com

  • 8.8.8.8:53
    wealthyme.ddns.net
    dns
    Host.exe
    64 B
    124 B
    1
    1

    DNS Request

    wealthyme.ddns.net

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Blasthost.exe

    Filesize

    132KB

    MD5

    6087bf6af59b9c531f2c9bb421d5e902

    SHA1

    8bc0f1596c986179b82585c703bacae6d2a00316

    SHA256

    3a8ffff8485c9ed35dae82574ea1a455ea2ead532251cebea19149d78dfd682c

    SHA512

    c8ed34470a874ce21c91cb7843521d66decc32c3f0a9c8d5b55889a7b990dfe5199ade8b6c6ef94b1bced6d3b5f0721e14bcc06320e8efe73ca3fe27fd6b9292

  • C:\Users\Admin\AppData\Roaming\aepic\RtDCpl64.exe

    Filesize

    1.4MB

    MD5

    49dcf4732c6e946f2a8d3081cc9c735b

    SHA1

    63a334da543e87149432e7382dd41c06f1cb9995

    SHA256

    64770c3bc9de45a3aa30b6071c4369f7317f898f4f2760239f015b6dc7308492

    SHA512

    eff52946963a0c0502f0788dd90d28e31bafda880a1570825f64bdc04e60b7a106b2433d74e4c6e66163e23b9d40a43dac5503f07f0f615ddc813cd5fc0109c8

  • memory/560-74-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/1144-42-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/1144-44-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/1516-103-0x00000000004C0000-0x00000000004DD000-memory.dmp

    Filesize

    116KB

  • memory/1516-109-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/1516-112-0x00000000004C0000-0x00000000004DD000-memory.dmp

    Filesize

    116KB

  • memory/1644-0-0x00000000008E0000-0x0000000000A4B000-memory.dmp

    Filesize

    1.4MB

  • memory/1644-41-0x00000000008E0000-0x0000000000A4B000-memory.dmp

    Filesize

    1.4MB

  • memory/1644-26-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1824-82-0x0000000000160000-0x0000000000161000-memory.dmp

    Filesize

    4KB

  • memory/2260-118-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/2324-87-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2372-154-0x0000000000970000-0x0000000000ADB000-memory.dmp

    Filesize

    1.4MB

  • memory/2504-24-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2556-113-0x0000000000970000-0x0000000000ADB000-memory.dmp

    Filesize

    1.4MB

  • memory/2628-49-0x0000000000970000-0x0000000000ADB000-memory.dmp

    Filesize

    1.4MB

  • memory/2628-79-0x0000000000970000-0x0000000000ADB000-memory.dmp

    Filesize

    1.4MB

  • memory/2752-29-0x0000000000080000-0x000000000009D000-memory.dmp

    Filesize

    116KB

  • memory/2752-39-0x0000000000080000-0x000000000009D000-memory.dmp

    Filesize

    116KB

  • memory/2752-36-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2752-27-0x0000000000080000-0x000000000009D000-memory.dmp

    Filesize

    116KB

  • memory/2928-90-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2928-77-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.