Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23/10/2024, 06:46

General

  • Target

    0b1276e70d27456c9e5f7c734d22abac4fd64ddb5af08f9caed4a1ff5479356aN.exe

  • Size

    3.9MB

  • MD5

    3c99b9c8709a305eb03e2dd7aaee6b90

  • SHA1

    708921cde8f796f2ec3e443ca008afed802c55de

  • SHA256

    0b1276e70d27456c9e5f7c734d22abac4fd64ddb5af08f9caed4a1ff5479356a

  • SHA512

    a4d37ab79c5fb5f0c63dbbbe17a794028047d7e45116b6b59925a28ffa16e3bc97767d067834e0f62122209f786c0e1153f23d46c32fedff235c1a8fdee4528d

  • SSDEEP

    24576:GIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0GoWQD7:7C0bNechC0bNechC0bNecD

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 3 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 58 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b1276e70d27456c9e5f7c734d22abac4fd64ddb5af08f9caed4a1ff5479356aN.exe
    "C:\Users\Admin\AppData\Local\Temp\0b1276e70d27456c9e5f7c734d22abac4fd64ddb5af08f9caed4a1ff5479356aN.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Users\Admin\AppData\Local\Temp\0b1276e70d27456c9e5f7c734d22abac4fd64ddb5af08f9caed4a1ff5479356aN.exe
      "C:\Users\Admin\AppData\Local\Temp\0b1276e70d27456c9e5f7c734d22abac4fd64ddb5af08f9caed4a1ff5479356aN.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2632
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:536
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1916
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2160
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2068
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2296
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:316
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 316 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2164
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1844
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1084
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1660
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:908
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2268
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2544
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2204
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2408
        • C:\Windows\SysWOW64\diskperf.exe
          "C:\Windows\SysWOW64\diskperf.exe"
          4⤵
            PID:1048
      • C:\Windows\SysWOW64\diskperf.exe
        "C:\Windows\SysWOW64\diskperf.exe"
        2⤵
          PID:2952

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe

        Filesize

        3.9MB

        MD5

        3c99b9c8709a305eb03e2dd7aaee6b90

        SHA1

        708921cde8f796f2ec3e443ca008afed802c55de

        SHA256

        0b1276e70d27456c9e5f7c734d22abac4fd64ddb5af08f9caed4a1ff5479356a

        SHA512

        a4d37ab79c5fb5f0c63dbbbe17a794028047d7e45116b6b59925a28ffa16e3bc97767d067834e0f62122209f786c0e1153f23d46c32fedff235c1a8fdee4528d

      • C:\Windows\system\explorer.exe

        Filesize

        3.9MB

        MD5

        22070bef05ea53735f348be52a04a940

        SHA1

        9ea371526686e621f02f6534e1d3038f90716c5e

        SHA256

        5eec072750b637afcd66b16801fa31d6e478cf9471c5f6241010c659bfcabde9

        SHA512

        4328e61f1993b52c230fa39b8aa7fee7f3b21b03e1afbee8759c845be235ac619b24836cbe83b15f119e404895eb7e9cc07ed54286a4b9ad79ac251c9372422d

      • \Windows\system\spoolsv.exe

        Filesize

        3.9MB

        MD5

        72a1788c58f1ae3180658b586168324d

        SHA1

        069a8d8c974966cd56aeff1723f40b5683a8df92

        SHA256

        486d9f766a7dea9b08c8d014b13d5c8588e6ccdd29516bf4cb57b55948d63cc8

        SHA512

        3fccd19805877b86471ee3f3a2a802685cd9f54aa67197819c5c2432e29a3a83499be45c24fb77b99d2562f04343b6f92480323e9a6ceb314ab198d5768152a6

      • memory/536-86-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/536-57-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/536-53-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/536-52-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/536-48-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/536-49-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/1916-95-0x00000000032F0000-0x0000000003404000-memory.dmp

        Filesize

        1.1MB

      • memory/1916-150-0x00000000032F0000-0x0000000003404000-memory.dmp

        Filesize

        1.1MB

      • memory/1916-141-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/1916-139-0x00000000032F0000-0x0000000003404000-memory.dmp

        Filesize

        1.1MB

      • memory/1916-122-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2068-123-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2068-114-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2160-103-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2160-131-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2160-101-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2160-102-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2632-11-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2632-17-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2632-51-0x00000000031E0000-0x00000000032F4000-memory.dmp

        Filesize

        1.1MB

      • memory/2632-9-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2632-55-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2632-13-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2632-23-0x0000000000400000-0x000000000043E000-memory.dmp

        Filesize

        248KB

      • memory/2632-50-0x00000000031E0000-0x00000000032F4000-memory.dmp

        Filesize

        1.1MB

      • memory/2792-4-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2792-1-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2792-0-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2792-2-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2792-3-0x0000000000230000-0x0000000000231000-memory.dmp

        Filesize

        4KB

      • memory/2792-24-0x00000000032D0000-0x00000000033E4000-memory.dmp

        Filesize

        1.1MB

      • memory/2792-35-0x0000000000400000-0x0000000000514000-memory.dmp

        Filesize

        1.1MB

      • memory/2952-56-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2952-38-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2952-37-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2952-26-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB

      • memory/2952-28-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2952-30-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB