Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 07:35
Static task
static1
Behavioral task
behavioral1
Sample
cf4e245767f02b7fa8b7920a2793f38e82fd0b465a4227542cfc107a23588ce8.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
cf4e245767f02b7fa8b7920a2793f38e82fd0b465a4227542cfc107a23588ce8.exe
Resource
win10v2004-20241007-en
General
-
Target
cf4e245767f02b7fa8b7920a2793f38e82fd0b465a4227542cfc107a23588ce8.exe
-
Size
1.0MB
-
MD5
40d873660d330a0c7b7f4c85cad6b704
-
SHA1
cd7b401b696a26b324163b17b19ddcb34341144e
-
SHA256
cf4e245767f02b7fa8b7920a2793f38e82fd0b465a4227542cfc107a23588ce8
-
SHA512
418cb8b77729a1c1be9d1448641a9565f72acf762b20e248f69465fa9a18b729932bb12a5c47f32868a1d1c19150b85e06cbde6c2f373709a8cab7bc2bb6f201
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCEqHMuzHwNH7ZWzDRke3b+VKx:7JZoQrbTFZY1iaCEqHMSeZeke3bzx
Malware Config
Extracted
warzonerat
147.124.214.5:1993
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 4 IoCs
resource yara_rule behavioral1/memory/2548-14-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat behavioral1/memory/2548-16-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat behavioral1/memory/2548-17-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat behavioral1/memory/2548-18-0x0000000000400000-0x000000000055E000-memory.dmp warzonerat -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\overfertility.vbs overfertility.exe -
Executes dropped EXE 1 IoCs
pid Process 1388 overfertility.exe -
Loads dropped DLL 1 IoCs
pid Process 2232 cf4e245767f02b7fa8b7920a2793f38e82fd0b465a4227542cfc107a23588ce8.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000019230-4.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1388 set thread context of 2548 1388 overfertility.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf4e245767f02b7fa8b7920a2793f38e82fd0b465a4227542cfc107a23588ce8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language overfertility.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1388 overfertility.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1388 2232 cf4e245767f02b7fa8b7920a2793f38e82fd0b465a4227542cfc107a23588ce8.exe 30 PID 2232 wrote to memory of 1388 2232 cf4e245767f02b7fa8b7920a2793f38e82fd0b465a4227542cfc107a23588ce8.exe 30 PID 2232 wrote to memory of 1388 2232 cf4e245767f02b7fa8b7920a2793f38e82fd0b465a4227542cfc107a23588ce8.exe 30 PID 2232 wrote to memory of 1388 2232 cf4e245767f02b7fa8b7920a2793f38e82fd0b465a4227542cfc107a23588ce8.exe 30 PID 1388 wrote to memory of 2548 1388 overfertility.exe 31 PID 1388 wrote to memory of 2548 1388 overfertility.exe 31 PID 1388 wrote to memory of 2548 1388 overfertility.exe 31 PID 1388 wrote to memory of 2548 1388 overfertility.exe 31 PID 1388 wrote to memory of 2548 1388 overfertility.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf4e245767f02b7fa8b7920a2793f38e82fd0b465a4227542cfc107a23588ce8.exe"C:\Users\Admin\AppData\Local\Temp\cf4e245767f02b7fa8b7920a2793f38e82fd0b465a4227542cfc107a23588ce8.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\porcelainization\overfertility.exe"C:\Users\Admin\AppData\Local\Temp\cf4e245767f02b7fa8b7920a2793f38e82fd0b465a4227542cfc107a23588ce8.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\cf4e245767f02b7fa8b7920a2793f38e82fd0b465a4227542cfc107a23588ce8.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2548
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD540d873660d330a0c7b7f4c85cad6b704
SHA1cd7b401b696a26b324163b17b19ddcb34341144e
SHA256cf4e245767f02b7fa8b7920a2793f38e82fd0b465a4227542cfc107a23588ce8
SHA512418cb8b77729a1c1be9d1448641a9565f72acf762b20e248f69465fa9a18b729932bb12a5c47f32868a1d1c19150b85e06cbde6c2f373709a8cab7bc2bb6f201