Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10Danger-Mul...ain.py
windows7-x64
3Danger-Mul...ain.py
windows10-2004-x64
3Danger-Mul...11.exe
windows7-x64
7Danger-Mul...11.exe
windows10-2004-x64
8Danger-Mul...px.exe
windows7-x64
10Danger-Mul...px.exe
windows10-2004-x64
10Danger-Mul...rt.bat
windows7-x64
10Danger-Mul...rt.bat
windows10-2004-x64
10Analysis
-
max time kernel
118s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 11:35
Behavioral task
behavioral1
Sample
Danger-MultiTool-main/src/main.py
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Danger-MultiTool-main/src/main.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Danger-MultiTool-main/src/utils/__pycache__/cpython-311.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Danger-MultiTool-main/src/utils/__pycache__/cpython-311.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Danger-MultiTool-main/src/utils/upx.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Danger-MultiTool-main/src/utils/upx.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Danger-MultiTool-main/start.bat
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Danger-MultiTool-main/start.bat
Resource
win10v2004-20240802-en
General
-
Target
Danger-MultiTool-main/start.bat
-
Size
121B
-
MD5
c7bda38ca7b6acff98cfce8e087ece33
-
SHA1
d2d7b7c6757870ef3a7ff3a40678e74176a4676e
-
SHA256
8caedbf5a91ed11823eb4d35ac84720e692246a17db1dd70e42d1565540d5842
-
SHA512
7732f4fb081f71bb0a8545a033ddfc35ec6901aec49735926718466d7155f623c482a83871fc3cb9c18fae17c9ce3ee008ea4effb74cce33b7034b8ad0ad0b7a
Malware Config
Extracted
xworm
45.83.246.140:30120
-
Install_directory
%AppData%
-
install_file
runtime.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral7/memory/2820-22-0x0000000000D70000-0x0000000000D88000-memory.dmp family_xworm -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\runtime.lnk upx.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\runtime.lnk upx.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\runtime = "C:\\Users\\Admin\\AppData\\Roaming\\runtime.exe" upx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2820 upx.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2820 upx.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2288 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2820 upx.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2820 upx.exe 2288 AcroRd32.exe 2288 AcroRd32.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2812 2180 cmd.exe 31 PID 2180 wrote to memory of 2812 2180 cmd.exe 31 PID 2180 wrote to memory of 2812 2180 cmd.exe 31 PID 2180 wrote to memory of 2820 2180 cmd.exe 32 PID 2180 wrote to memory of 2820 2180 cmd.exe 32 PID 2180 wrote to memory of 2820 2180 cmd.exe 32 PID 2180 wrote to memory of 2696 2180 cmd.exe 33 PID 2180 wrote to memory of 2696 2180 cmd.exe 33 PID 2180 wrote to memory of 2696 2180 cmd.exe 33 PID 2696 wrote to memory of 2288 2696 rundll32.exe 34 PID 2696 wrote to memory of 2288 2696 rundll32.exe 34 PID 2696 wrote to memory of 2288 2696 rundll32.exe 34 PID 2696 wrote to memory of 2288 2696 rundll32.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Danger-MultiTool-main\start.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\system32\mode.commode con: cols=100 lines=302⤵PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\Danger-MultiTool-main\src\utils\upx.exesrc/utils/upx.exe2⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2820
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Danger-MultiTool-main\src\main.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Danger-MultiTool-main\src\main.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2288
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57143b0dd74c59fe37f177f60a453fb93
SHA11ccdf2b40af1ad65961f48ee5c8208d1a7c32b54
SHA2568a1e55492be6829bbfb6f8a719ea2668c9f2c41d6ffd2b474de147b8f774fe5c
SHA5124c2eb7244a823090487a975a4c056785a91086d8cf875d47c5681ba9aabc1c084874e850b7598ef28d0dbd5e2922572df4acc8857be47e024e2d371ec698f70f