Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2024, 04:54

General

  • Target

    ff147c7568a96c58adaedb4164bec2feda7abb98f8d092d2ae7b834ce53b31c9.exe

  • Size

    8.2MB

  • MD5

    87f8189455bf33a4a0b16b16f444069f

  • SHA1

    e5b7f2d614929fc8d0964eab9ae80b3f3e486d59

  • SHA256

    ff147c7568a96c58adaedb4164bec2feda7abb98f8d092d2ae7b834ce53b31c9

  • SHA512

    d31a66a02b6355ca7f841fcba388b9e8e49aad37b77f6c1be2a2728939de0941bac2c94646528c5e069ce41f42c433152bc6641b8cac2abd1de5e7b7d6221fad

  • SSDEEP

    49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecw:V8e8e8f8e8e8n

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzonerat family
  • Warzone RAT payload 3 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 64 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 8 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff147c7568a96c58adaedb4164bec2feda7abb98f8d092d2ae7b834ce53b31c9.exe
    "C:\Users\Admin\AppData\Local\Temp\ff147c7568a96c58adaedb4164bec2feda7abb98f8d092d2ae7b834ce53b31c9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Users\Admin\AppData\Local\Temp\ff147c7568a96c58adaedb4164bec2feda7abb98f8d092d2ae7b834ce53b31c9.exe
      "C:\Users\Admin\AppData\Local\Temp\ff147c7568a96c58adaedb4164bec2feda7abb98f8d092d2ae7b834ce53b31c9.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2656
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2928
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:984
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:2196
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              6⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:2448
              • \??\c:\windows\system\svchost.exe
                c:\windows\system\svchost.exe
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:1484
            • C:\Windows\SysWOW64\diskperf.exe
              "C:\Windows\SysWOW64\diskperf.exe"
              6⤵
                PID:748
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2116
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:448
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1340
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1340 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:3068
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1780
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:1300
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:1052
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1052 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:628
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:884
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 884 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:1616
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:1272
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1272 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2936
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2720
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2804
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2612
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 36
                6⤵
                • Program crash
                PID:2680
          • C:\Windows\SysWOW64\diskperf.exe
            "C:\Windows\SysWOW64\diskperf.exe"
            4⤵
              PID:1772
        • C:\Windows\SysWOW64\diskperf.exe
          "C:\Windows\SysWOW64\diskperf.exe"
          2⤵
            PID:2044

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe

          Filesize

          8.2MB

          MD5

          87f8189455bf33a4a0b16b16f444069f

          SHA1

          e5b7f2d614929fc8d0964eab9ae80b3f3e486d59

          SHA256

          ff147c7568a96c58adaedb4164bec2feda7abb98f8d092d2ae7b834ce53b31c9

          SHA512

          d31a66a02b6355ca7f841fcba388b9e8e49aad37b77f6c1be2a2728939de0941bac2c94646528c5e069ce41f42c433152bc6641b8cac2abd1de5e7b7d6221fad

        • C:\Windows\system\explorer.exe

          Filesize

          8.2MB

          MD5

          5b68e8045d38b6fdf868c5c0ffe8ebf4

          SHA1

          c1a73371d0c6a5958c7f28f71b8143f62be6d394

          SHA256

          1066d88d71dca1b917e4352031e1247b88f5cdb65f797717419678052de24358

          SHA512

          c568694b69715e3f74704e372baf9ebbf3c8bcbd54ed527447f51ab5c5ed03f908e540b6171beb0308cf62e475ee45cb9b4e53c28193d852ebfb9dd4fab181f4

        • \Windows\system\spoolsv.exe

          Filesize

          8.2MB

          MD5

          da01e7de235c112a3010960581291572

          SHA1

          c59798ce1886de5f9092e77e03db8c5363f48659

          SHA256

          910528a78a5e5c355568d8933b68ff865623607c1c414724b16277130a29eed2

          SHA512

          55601f47d24d759dd6f6d817e4b0e25d3fbea91ee74c3006445e613f07c15115086e8a74fa514f3dfb3b81f67cb7ff43740d5c083cac1d684006442ac85f2c3e

        • memory/984-144-0x00000000032E0000-0x00000000033F4000-memory.dmp

          Filesize

          1.1MB

        • memory/984-99-0x00000000032E0000-0x00000000033F4000-memory.dmp

          Filesize

          1.1MB

        • memory/984-263-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/984-152-0x00000000032E0000-0x00000000033F4000-memory.dmp

          Filesize

          1.1MB

        • memory/984-142-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/984-133-0x00000000032E0000-0x00000000033F4000-memory.dmp

          Filesize

          1.1MB

        • memory/984-122-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/984-112-0x00000000032E0000-0x00000000033F4000-memory.dmp

          Filesize

          1.1MB

        • memory/984-113-0x00000000032E0000-0x00000000033F4000-memory.dmp

          Filesize

          1.1MB

        • memory/984-203-0x00000000032E0000-0x00000000033F4000-memory.dmp

          Filesize

          1.1MB

        • memory/984-189-0x00000000032E0000-0x00000000033F4000-memory.dmp

          Filesize

          1.1MB

        • memory/984-89-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/984-162-0x00000000032E0000-0x00000000033F4000-memory.dmp

          Filesize

          1.1MB

        • memory/984-179-0x00000000032E0000-0x00000000033F4000-memory.dmp

          Filesize

          1.1MB

        • memory/984-180-0x00000000032E0000-0x00000000033F4000-memory.dmp

          Filesize

          1.1MB

        • memory/1272-209-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/1484-261-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/1772-81-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/1780-154-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2044-31-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2044-39-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2044-29-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2044-27-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2044-34-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2116-124-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2116-115-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2196-134-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2196-100-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2196-250-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2196-102-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2196-101-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2448-238-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2448-259-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2656-48-0x00000000032F0000-0x0000000003404000-memory.dmp

          Filesize

          1.1MB

        • memory/2656-12-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2656-14-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2656-55-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2656-18-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2656-24-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2656-10-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2708-3-0x0000000000300000-0x0000000000301000-memory.dmp

          Filesize

          4KB

        • memory/2708-2-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2708-4-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2708-1-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2708-6-0x0000000000300000-0x0000000000301000-memory.dmp

          Filesize

          4KB

        • memory/2708-38-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2708-0-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2720-216-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2928-53-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2928-51-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2928-50-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2928-52-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2928-56-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2928-88-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB