Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03/11/2024, 23:41
Static task
static1
Behavioral task
behavioral1
Sample
6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057N.exe
Resource
win7-20240708-en
General
-
Target
6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057N.exe
-
Size
254KB
-
MD5
0676798cb430804268472910ad8a1750
-
SHA1
82c2dc99275e7ca0935be96a9fab6ca7b976aed0
-
SHA256
6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057
-
SHA512
722c1160042d11a98248fa4e17596f880dd5e7a6e95b832bc6f2b0f5c14ca067b484f2bdc5c0480569c2e33472ab5cd65250c471c5cda5840c932b0bb118a2f9
-
SSDEEP
6144:85p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQqC:EeGUA5YZazpXUmZhJC
Malware Config
Extracted
nanocore
1.2.2.0
sysupdate24.ddns.net:45400
ae82ab7f-db07-49ee-9d2b-76075d76f37f
-
activate_away_mode
true
- backup_connection_host
- backup_dns_server
-
buffer_size
65535
-
build_time
2020-04-24T17:41:53.492468936Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
45400
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
ae82ab7f-db07-49ee-9d2b-76075d76f37f
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
sysupdate24.ddns.net
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Nanocore family
-
Executes dropped EXE 2 IoCs
pid Process 2852 a1punf5t2of.exe 2616 a1punf5t2of.exe -
Loads dropped DLL 2 IoCs
pid Process 2568 6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057N.exe 2852 a1punf5t2of.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\b1b2dqljdx3 = "C:\\Users\\Admin\\AppData\\Roaming\\b1b2dqljdx3\\a1punf5t2of.exe" 6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057N.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a1punf5t2of.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2852 set thread context of 2616 2852 a1punf5t2of.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1punf5t2of.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2616 a1punf5t2of.exe 2616 a1punf5t2of.exe 2616 a1punf5t2of.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2616 a1punf5t2of.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2616 a1punf5t2of.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2568 wrote to memory of 2852 2568 6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057N.exe 31 PID 2568 wrote to memory of 2852 2568 6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057N.exe 31 PID 2568 wrote to memory of 2852 2568 6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057N.exe 31 PID 2568 wrote to memory of 2852 2568 6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057N.exe 31 PID 2568 wrote to memory of 2852 2568 6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057N.exe 31 PID 2568 wrote to memory of 2852 2568 6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057N.exe 31 PID 2568 wrote to memory of 2852 2568 6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057N.exe 31 PID 2852 wrote to memory of 2616 2852 a1punf5t2of.exe 32 PID 2852 wrote to memory of 2616 2852 a1punf5t2of.exe 32 PID 2852 wrote to memory of 2616 2852 a1punf5t2of.exe 32 PID 2852 wrote to memory of 2616 2852 a1punf5t2of.exe 32 PID 2852 wrote to memory of 2616 2852 a1punf5t2of.exe 32 PID 2852 wrote to memory of 2616 2852 a1punf5t2of.exe 32 PID 2852 wrote to memory of 2616 2852 a1punf5t2of.exe 32 PID 2852 wrote to memory of 2616 2852 a1punf5t2of.exe 32 PID 2852 wrote to memory of 2616 2852 a1punf5t2of.exe 32 PID 2852 wrote to memory of 2616 2852 a1punf5t2of.exe 32 PID 2852 wrote to memory of 2616 2852 a1punf5t2of.exe 32 PID 2852 wrote to memory of 2616 2852 a1punf5t2of.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057N.exe"C:\Users\Admin\AppData\Local\Temp\6fe2af6d9f517881181f96dfc1301369a8c6c26ed83fc0cc9a9e5fd2c7590057N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5e361b6d014b46d5d55bec3d62b74fd4a
SHA148978af5850c25a15ed26479d75b3a2cd530944b
SHA256d1156c0cd73b3d94a3d68e03e3e20200e7209ff90da3d4e77c3fe27993e1c71a
SHA512260b745aba490b1113cc098b7c16d4d345b7638cfca2c1df52692d3a7c17390e98f51a1fe81c6ce52de5431a85019c505828e3bb1cc1f9a1ce1fcd6e9d14dd1a