Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 01:34
Behavioral task
behavioral1
Sample
8feae2e9ed67a0e7c746cb2a9942313d88266f73eb218f7b4cefd7149bc51a8bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8feae2e9ed67a0e7c746cb2a9942313d88266f73eb218f7b4cefd7149bc51a8bN.exe
Resource
win10v2004-20240802-en
General
-
Target
8feae2e9ed67a0e7c746cb2a9942313d88266f73eb218f7b4cefd7149bc51a8bN.exe
-
Size
12KB
-
MD5
c37adec75d728bf8d915cc920a72b670
-
SHA1
9224d31644d9a937b5d027496c58a6af16a8d47e
-
SHA256
8feae2e9ed67a0e7c746cb2a9942313d88266f73eb218f7b4cefd7149bc51a8b
-
SHA512
3cdd9522152c1321bac4ad653629a5da5f44df77358af30b07f6c8484fc7e24f3b71153f865f0a916eedc86622fc240f291dadc73a3b1fdd7b63f5a8dd548f7e
-
SSDEEP
192:zjUWFh4fvYGIQnsA6psQt8FaNJhLkwcud2DH9VwGfctu55EJN:vKE7p3oaNJawcudoD7US5EJN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2716 WAMain.exe -
Loads dropped DLL 5 IoCs
pid Process 1860 8feae2e9ed67a0e7c746cb2a9942313d88266f73eb218f7b4cefd7149bc51a8bN.exe 1860 8feae2e9ed67a0e7c746cb2a9942313d88266f73eb218f7b4cefd7149bc51a8bN.exe 1860 8feae2e9ed67a0e7c746cb2a9942313d88266f73eb218f7b4cefd7149bc51a8bN.exe 1860 8feae2e9ed67a0e7c746cb2a9942313d88266f73eb218f7b4cefd7149bc51a8bN.exe 1860 8feae2e9ed67a0e7c746cb2a9942313d88266f73eb218f7b4cefd7149bc51a8bN.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows WA = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\WAMain.exe" reg.exe -
resource yara_rule behavioral1/memory/1860-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1860-27-0x00000000003F0000-0x00000000003FB000-memory.dmp upx behavioral1/files/0x000b00000001225c-25.dat upx behavioral1/memory/1860-40-0x00000000003F0000-0x00000000003FB000-memory.dmp upx behavioral1/memory/1860-47-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2716-52-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WAMain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8feae2e9ed67a0e7c746cb2a9942313d88266f73eb218f7b4cefd7149bc51a8bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe Token: SeDebugPrivilege 2716 WAMain.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1860 8feae2e9ed67a0e7c746cb2a9942313d88266f73eb218f7b4cefd7149bc51a8bN.exe 2716 WAMain.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1860 wrote to memory of 3056 1860 8feae2e9ed67a0e7c746cb2a9942313d88266f73eb218f7b4cefd7149bc51a8bN.exe 28 PID 1860 wrote to memory of 3056 1860 8feae2e9ed67a0e7c746cb2a9942313d88266f73eb218f7b4cefd7149bc51a8bN.exe 28 PID 1860 wrote to memory of 3056 1860 8feae2e9ed67a0e7c746cb2a9942313d88266f73eb218f7b4cefd7149bc51a8bN.exe 28 PID 1860 wrote to memory of 3056 1860 8feae2e9ed67a0e7c746cb2a9942313d88266f73eb218f7b4cefd7149bc51a8bN.exe 28 PID 3056 wrote to memory of 2712 3056 cmd.exe 30 PID 3056 wrote to memory of 2712 3056 cmd.exe 30 PID 3056 wrote to memory of 2712 3056 cmd.exe 30 PID 3056 wrote to memory of 2712 3056 cmd.exe 30 PID 1860 wrote to memory of 2716 1860 8feae2e9ed67a0e7c746cb2a9942313d88266f73eb218f7b4cefd7149bc51a8bN.exe 31 PID 1860 wrote to memory of 2716 1860 8feae2e9ed67a0e7c746cb2a9942313d88266f73eb218f7b4cefd7149bc51a8bN.exe 31 PID 1860 wrote to memory of 2716 1860 8feae2e9ed67a0e7c746cb2a9942313d88266f73eb218f7b4cefd7149bc51a8bN.exe 31 PID 1860 wrote to memory of 2716 1860 8feae2e9ed67a0e7c746cb2a9942313d88266f73eb218f7b4cefd7149bc51a8bN.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8feae2e9ed67a0e7c746cb2a9942313d88266f73eb218f7b4cefd7149bc51a8bN.exe"C:\Users\Admin\AppData\Local\Temp\8feae2e9ed67a0e7c746cb2a9942313d88266f73eb218f7b4cefd7149bc51a8bN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\QHRNI.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows WA" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2712
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD53a4614705555abb049c3298e61170b7f
SHA1c8686410756f346d9551256a5b878b04770950ba
SHA256cff0663c8cfadf83b80583a871c313ffc5d950cb503809cb4a482f400c5d846b
SHA51265ce6fec00e6934f21635e7ccd74757f31ed4b0ddb52bd80d3ea9abeba56340128d23151ef7d9f5daacb5d61e4a4cca50dbb3a43132e350522311ee06e829007
-
Filesize
12KB
MD5b6102b45b039967522825e0c62cbc0fc
SHA1e68384f49d4c4680a2d9eb819104be494d2b163a
SHA2560caec2da4b2defa2a3f6fa6bf31136bb9f3af244e70a7036d03b39295ff73b50
SHA512a756844c560e6ee330ec6acaa5dd4dc3452f93ec8c8a91e3c80c486910114d8416e7f92087f2cab20531cf693719abd518d2b6b0722b83ddbfad8e7754cb8b92