Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2024, 00:04

General

  • Target

    7f0345c8a54165169260bcf0f8696f7da61524ee76d7bf696f6aa5a148701360.exe

  • Size

    8.2MB

  • MD5

    d9d4f8a0696f68e1c76a76b495e97f4d

  • SHA1

    68d2973f82d6ef3638c277b6ad3b38a119426a4d

  • SHA256

    7f0345c8a54165169260bcf0f8696f7da61524ee76d7bf696f6aa5a148701360

  • SHA512

    e94f2036160a2ed35ede6a8bc5ca379ca171392f4f59594fbc811736988eea4793d328c8f05904bf7b926a1b63fd33205cb004a90cd283087fa07df447877d6d

  • SSDEEP

    49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNeca:V8e8e8f8e8e8n

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzonerat family
  • Warzone RAT payload 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 64 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f0345c8a54165169260bcf0f8696f7da61524ee76d7bf696f6aa5a148701360.exe
    "C:\Users\Admin\AppData\Local\Temp\7f0345c8a54165169260bcf0f8696f7da61524ee76d7bf696f6aa5a148701360.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Users\Admin\AppData\Local\Temp\7f0345c8a54165169260bcf0f8696f7da61524ee76d7bf696f6aa5a148701360.exe
      "C:\Users\Admin\AppData\Local\Temp\7f0345c8a54165169260bcf0f8696f7da61524ee76d7bf696f6aa5a148701360.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2800
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2796
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3036
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:2280
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              6⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:2844
              • \??\c:\windows\system\svchost.exe
                c:\windows\system\svchost.exe
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:2860
            • C:\Windows\SysWOW64\diskperf.exe
              "C:\Windows\SysWOW64\diskperf.exe"
              6⤵
                PID:2548
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2656
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2148
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1644
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:1944
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:956
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 956 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:1368
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2780
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2500
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:1520
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2176
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2216
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:320
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2612
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 36
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:1908
          • C:\Windows\SysWOW64\diskperf.exe
            "C:\Windows\SysWOW64\diskperf.exe"
            4⤵
              PID:1296
        • C:\Windows\SysWOW64\diskperf.exe
          "C:\Windows\SysWOW64\diskperf.exe"
          2⤵
            PID:2820

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe

          Filesize

          8.2MB

          MD5

          d9d4f8a0696f68e1c76a76b495e97f4d

          SHA1

          68d2973f82d6ef3638c277b6ad3b38a119426a4d

          SHA256

          7f0345c8a54165169260bcf0f8696f7da61524ee76d7bf696f6aa5a148701360

          SHA512

          e94f2036160a2ed35ede6a8bc5ca379ca171392f4f59594fbc811736988eea4793d328c8f05904bf7b926a1b63fd33205cb004a90cd283087fa07df447877d6d

        • C:\Windows\system\explorer.exe

          Filesize

          8.2MB

          MD5

          0821099ab9330b0605a0fe9992ff71eb

          SHA1

          9a8a93f613d27b78220bf9aa0405e1ced4f1aa65

          SHA256

          4d9c6c843477b20c5627955bf2ca71a6dd6f741897ee284d8efa13d68d3e20bb

          SHA512

          ce736797d7f52ff03d266f112fad0df24b29a564ff401035d022eb49a7a1477edf34f7a69b21709e2b876b4c93e930a098f29d92e9e5460790584102074a72a7

        • C:\Windows\system\spoolsv.exe

          Filesize

          8.2MB

          MD5

          cbc51a22dfbd65782dacfec84545d9ff

          SHA1

          6ff58786e2a032d93d47b70ef1a307ad3c8286fb

          SHA256

          2d00467f6a6cc726c63df54fe4cfbcdeb9731a0742205ff1f73a4eeaa155205e

          SHA512

          5584efc8b7c550fda81497f5a11fac9e9c797b103d0ec326f61537f8f411243f8abb3287d0db171b935507a06b11c972d719257d674f89385dfbca6f97b46f8b

        • memory/1268-2-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/1268-4-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/1268-6-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB

        • memory/1268-0-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/1268-3-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB

        • memory/1268-22-0x0000000003220000-0x0000000003334000-memory.dmp

          Filesize

          1.1MB

        • memory/1268-1-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/1268-40-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/1520-191-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/1644-135-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2280-244-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2280-104-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2280-103-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2280-101-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2280-134-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2656-125-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2780-171-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2796-54-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2796-52-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2796-53-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2796-91-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2796-55-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2796-58-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/2800-10-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2800-14-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2800-49-0x00000000031A0000-0x00000000032B4000-memory.dmp

          Filesize

          1.1MB

        • memory/2800-50-0x00000000031A0000-0x00000000032B4000-memory.dmp

          Filesize

          1.1MB

        • memory/2800-24-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2800-57-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2800-25-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2800-12-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2820-39-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2820-27-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2820-29-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2820-31-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2820-36-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2844-255-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2844-235-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/2860-257-0x0000000000400000-0x0000000000514000-memory.dmp

          Filesize

          1.1MB

        • memory/3036-144-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/3036-172-0x0000000003140000-0x0000000003254000-memory.dmp

          Filesize

          1.1MB

        • memory/3036-154-0x0000000003140000-0x0000000003254000-memory.dmp

          Filesize

          1.1MB

        • memory/3036-170-0x0000000003140000-0x0000000003254000-memory.dmp

          Filesize

          1.1MB

        • memory/3036-182-0x0000000003140000-0x0000000003254000-memory.dmp

          Filesize

          1.1MB

        • memory/3036-136-0x0000000003140000-0x0000000003254000-memory.dmp

          Filesize

          1.1MB

        • memory/3036-192-0x0000000003140000-0x0000000003254000-memory.dmp

          Filesize

          1.1MB

        • memory/3036-216-0x0000000003140000-0x0000000003254000-memory.dmp

          Filesize

          1.1MB

        • memory/3036-217-0x0000000003140000-0x0000000003254000-memory.dmp

          Filesize

          1.1MB

        • memory/3036-124-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/3036-115-0x0000000003140000-0x0000000003254000-memory.dmp

          Filesize

          1.1MB

        • memory/3036-116-0x0000000003140000-0x0000000003254000-memory.dmp

          Filesize

          1.1MB

        • memory/3036-102-0x0000000003140000-0x0000000003254000-memory.dmp

          Filesize

          1.1MB

        • memory/3036-260-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB