Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/11/2024, 05:36
Static task
static1
Behavioral task
behavioral1
Sample
dceafff25f376bd3883f15c500fbfe369b45821fdbb0e.exe
Resource
win7-20241010-en
General
-
Target
dceafff25f376bd3883f15c500fbfe369b45821fdbb0e.exe
-
Size
682KB
-
MD5
e85e9ee55cd11e262bebc6a50adf9eb4
-
SHA1
0ea3108775ea4aeca19c338b7873bc5f29f17333
-
SHA256
dceafff25f376bd3883f15c500fbfe369b45821fdbb0e34caa0bc715f5e34ad2
-
SHA512
11804e98b271ab6e997b175935e2ab2b596da7d13c8c1590e224c20d5ab6572b859965a5a6762dedef266c26da266571751cf4c041936f3818f5600530931580
-
SSDEEP
12288:Veezo4rQ7otxmQB4r3/fuNXat1Idh+t74g8qKYgi74m241FMA7h+0bAbJz:LQo71O/caIH+tKqKy74j
Malware Config
Extracted
nanocore
1.2.2.0
fredrchmn.duckdns.org:7788
f09b885f-e168-4a65-b204-d7370430fd19
-
activate_away_mode
true
-
backup_connection_host
fredrchmn.duckdns.org
- backup_dns_server
-
buffer_size
65535
-
build_time
2021-03-06T05:27:19.753914436Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
true
-
connect_delay
4000
-
connection_port
7788
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
f09b885f-e168-4a65-b204-d7370430fd19
-
mutex_timeout
5000
-
prevent_system_sleep
true
-
primary_connection_host
fredrchmn.duckdns.org
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Nanocore family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2880 set thread context of 2740 2880 dceafff25f376bd3883f15c500fbfe369b45821fdbb0e.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dceafff25f376bd3883f15c500fbfe369b45821fdbb0e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2668 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2740 RegSvcs.exe 2740 RegSvcs.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2740 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2740 RegSvcs.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2668 2880 dceafff25f376bd3883f15c500fbfe369b45821fdbb0e.exe 30 PID 2880 wrote to memory of 2668 2880 dceafff25f376bd3883f15c500fbfe369b45821fdbb0e.exe 30 PID 2880 wrote to memory of 2668 2880 dceafff25f376bd3883f15c500fbfe369b45821fdbb0e.exe 30 PID 2880 wrote to memory of 2668 2880 dceafff25f376bd3883f15c500fbfe369b45821fdbb0e.exe 30 PID 2880 wrote to memory of 2740 2880 dceafff25f376bd3883f15c500fbfe369b45821fdbb0e.exe 32 PID 2880 wrote to memory of 2740 2880 dceafff25f376bd3883f15c500fbfe369b45821fdbb0e.exe 32 PID 2880 wrote to memory of 2740 2880 dceafff25f376bd3883f15c500fbfe369b45821fdbb0e.exe 32 PID 2880 wrote to memory of 2740 2880 dceafff25f376bd3883f15c500fbfe369b45821fdbb0e.exe 32 PID 2880 wrote to memory of 2740 2880 dceafff25f376bd3883f15c500fbfe369b45821fdbb0e.exe 32 PID 2880 wrote to memory of 2740 2880 dceafff25f376bd3883f15c500fbfe369b45821fdbb0e.exe 32 PID 2880 wrote to memory of 2740 2880 dceafff25f376bd3883f15c500fbfe369b45821fdbb0e.exe 32 PID 2880 wrote to memory of 2740 2880 dceafff25f376bd3883f15c500fbfe369b45821fdbb0e.exe 32 PID 2880 wrote to memory of 2740 2880 dceafff25f376bd3883f15c500fbfe369b45821fdbb0e.exe 32 PID 2880 wrote to memory of 2740 2880 dceafff25f376bd3883f15c500fbfe369b45821fdbb0e.exe 32 PID 2880 wrote to memory of 2740 2880 dceafff25f376bd3883f15c500fbfe369b45821fdbb0e.exe 32 PID 2880 wrote to memory of 2740 2880 dceafff25f376bd3883f15c500fbfe369b45821fdbb0e.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\dceafff25f376bd3883f15c500fbfe369b45821fdbb0e.exe"C:\Users\Admin\AppData\Local\Temp\dceafff25f376bd3883f15c500fbfe369b45821fdbb0e.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\adwOuvuzR" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD9BC.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2668
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50ffd81f6b70e9b24a5bf044b98442b77
SHA1bb98efb192c37c5149df3020493527dc72718be8
SHA256576887a7b9237155e036175c7be47be03ad8b6ef267fa689d799509c1f7ce1d7
SHA512b1ddb2b53480078b77b78b4406aa2d664dbdb5216fce1b1cceeb98e552622882d907b93b8731258bc97826d2d1609a7040d87e54cb9a2797d3388d84e48f4e76