Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    114s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    30/09/2024, 02:21

General

  • Target

    54bf1a46ebdcca78b7dd2ef7a497aacf0cb6ed2745d64b296e98859f11c80154N.exe

  • Size

    210KB

  • MD5

    18323bd9db3060c3ec9230d324c3b2c0

  • SHA1

    7589b3a69d0e0e5ed00189b023933824c60cdf3c

  • SHA256

    54bf1a46ebdcca78b7dd2ef7a497aacf0cb6ed2745d64b296e98859f11c80154

  • SHA512

    9dc90a029531b76df44192d0788973266a3a38aae93f8a7f12b0d7dc6383d3496bef6b8f08d45cb51316c3457e880dd2d30a216675025cb13459f6362298e8fc

  • SSDEEP

    3072:yzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HISv2X6ecnziHRCWuzu/gBuFAUG:yLV6Bta6dtJmakIM572GnWaQgyhMd

Malware Config

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\54bf1a46ebdcca78b7dd2ef7a497aacf0cb6ed2745d64b296e98859f11c80154N.exe
    "C:\Users\Admin\AppData\Local\Temp\54bf1a46ebdcca78b7dd2ef7a497aacf0cb6ed2745d64b296e98859f11c80154N.exe"
    1⤵
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Windows\system32\schtasks.exe
      "schtasks.exe" /create /f /tn "PCI Manager" /xml "C:\Users\Admin\AppData\Local\Temp\tmpC39D.tmp"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2160
    • C:\Windows\system32\schtasks.exe
      "schtasks.exe" /create /f /tn "PCI Manager Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpC505.tmp"
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:1932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpC39D.tmp

    Filesize

    1KB

    MD5

    78b7deea88b4d507bf724df7785d21df

    SHA1

    4f9441ad9ff2f13b5da89498e9bb47b18a09b98c

    SHA256

    1595b43755bdbcefb7aeb79cf16b426fa98d3021dc986a501603dad3156f5c7d

    SHA512

    707ac62117261c411cdfc21c7fc7c8d3f2fa2e20a2dfd9008e18830229f6745fb41c86416b29fdfcb5dac7214a19e9e5926e215c940142020c19ac08ae146654

  • C:\Users\Admin\AppData\Local\Temp\tmpC505.tmp

    Filesize

    1KB

    MD5

    f7fc5cfe3d4801d5fb389238c3400380

    SHA1

    41751c30225709a60ba8f8049c6e2405d9d6717d

    SHA256

    79a01572b6494f8dc6cd81f182d1566d57b6eaf8592f4e07f1a7eb8eaf89d883

    SHA512

    86fdef1ccb273b2680c8f9645be7fd532cfc1441b2299f72d785d038a228129b0bdca6ddb83e9fd25945f65832fca1668c9f510705fca418e0fdb2d1ed6fc9b0

  • memory/1312-13-0x000007FEF5140000-0x000007FEF5ADD000-memory.dmp

    Filesize

    9.6MB

  • memory/1312-16-0x000007FEF5140000-0x000007FEF5ADD000-memory.dmp

    Filesize

    9.6MB

  • memory/1312-1-0x000007FEF5140000-0x000007FEF5ADD000-memory.dmp

    Filesize

    9.6MB

  • memory/1312-10-0x0000000000C90000-0x0000000000C9A000-memory.dmp

    Filesize

    40KB

  • memory/1312-12-0x0000000000D10000-0x0000000000D2E000-memory.dmp

    Filesize

    120KB

  • memory/1312-11-0x00000000003F0000-0x00000000003FC000-memory.dmp

    Filesize

    48KB

  • memory/1312-0-0x000007FEF53FE000-0x000007FEF53FF000-memory.dmp

    Filesize

    4KB

  • memory/1312-14-0x0000000000C80000-0x0000000000C8A000-memory.dmp

    Filesize

    40KB

  • memory/1312-15-0x000007FEF5140000-0x000007FEF5ADD000-memory.dmp

    Filesize

    9.6MB

  • memory/1312-2-0x000007FEF5140000-0x000007FEF5ADD000-memory.dmp

    Filesize

    9.6MB

  • memory/1312-17-0x000007FEF5140000-0x000007FEF5ADD000-memory.dmp

    Filesize

    9.6MB

  • memory/1312-18-0x000007FEF53FE000-0x000007FEF53FF000-memory.dmp

    Filesize

    4KB

  • memory/1312-19-0x000007FEF5140000-0x000007FEF5ADD000-memory.dmp

    Filesize

    9.6MB

  • memory/1312-20-0x000007FEF5140000-0x000007FEF5ADD000-memory.dmp

    Filesize

    9.6MB

  • memory/1312-21-0x000007FEF5140000-0x000007FEF5ADD000-memory.dmp

    Filesize

    9.6MB

  • memory/1312-22-0x000007FEF5140000-0x000007FEF5ADD000-memory.dmp

    Filesize

    9.6MB

  • memory/1312-23-0x000007FEF5140000-0x000007FEF5ADD000-memory.dmp

    Filesize

    9.6MB