Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
57s -
max time network
56s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10/12/2024, 23:07
Behavioral task
behavioral1
Sample
2024-12-10_9d96bcb8b2602cda10803ef6e69692fa_cobalt-strike_cobaltstrike_poet-rat_snatch.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-12-10_9d96bcb8b2602cda10803ef6e69692fa_cobalt-strike_cobaltstrike_poet-rat_snatch.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-10_9d96bcb8b2602cda10803ef6e69692fa_cobalt-strike_cobaltstrike_poet-rat_snatch.exe
-
Size
5.0MB
-
MD5
9d96bcb8b2602cda10803ef6e69692fa
-
SHA1
1770e3b509c114a66b181b9214e14b1bad5759ae
-
SHA256
e28bd9bb817bc56f4a93384aa0059d2c3e5a083d8b3f071223e2bcfa00aee3ff
-
SHA512
86fcf6a1b00f52a48978dca8851e47fb252e7d49019e73dcf1a8f773eb6d829e3588143e44c3a4b6c82b6571f4563f616b12a8c9ae12cc1bf4efca6ca7763e4f
-
SSDEEP
49152:r56uL3pgrCEdMKPFotsgEBr6GjvzW+UBA3Gd7po52xWKQY2v2V6liK1uOCeXvpnu:r56utgpPFotBER/mQ32lU0
Malware Config
Signatures
-
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Music\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini wmplayer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wmplayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wmplayer.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\X: wmplayer.exe File opened (read-only) \??\G: wmplayer.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\Q: wmplayer.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\B: wmplayer.exe File opened (read-only) \??\H: wmplayer.exe File opened (read-only) \??\V: wmplayer.exe File opened (read-only) \??\Z: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\N: wmplayer.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\I: wmplayer.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\U: wmplayer.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpshare.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-10_9d96bcb8b2602cda10803ef6e69692fa_cobalt-strike_cobaltstrike_poet-rat_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer wmplayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-wmplayer\CLSID = "{cd3afa96-b84f-48f0-9393-7edc34128127}" wmplayer.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6 2024-12-10_9d96bcb8b2602cda10803ef6e69692fa_cobalt-strike_cobaltstrike_poet-rat_snatch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 2024-12-10_9d96bcb8b2602cda10803ef6e69692fa_cobalt-strike_cobaltstrike_poet-rat_snatch.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 wmplayer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2036 2512 wmplayer.exe 34 PID 2512 wrote to memory of 2036 2512 wmplayer.exe 34 PID 2512 wrote to memory of 2036 2512 wmplayer.exe 34 PID 2512 wrote to memory of 2036 2512 wmplayer.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-10_9d96bcb8b2602cda10803ef6e69692fa_cobalt-strike_cobaltstrike_poet-rat_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-10_9d96bcb8b2602cda10803ef6e69692fa_cobalt-strike_cobaltstrike_poet-rat_snatch.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:376
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:3000
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1272
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:11⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Windows Media Player\wmpshare.exe"C:\Program Files (x86)\Windows Media Player\wmpshare.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Media Player\Art Cache\LocalMLS\{597BF30A-61BF-4487-9266-8D09F6AC7964}.jpg
Filesize23KB
MD5fd5fd28e41676618aac733b243ad54db
SHA1b2d69ad6a2e22c30ef1806ac4f990790c3b44763
SHA256a26544648ef8ceffad6c789a3677031be3c515918627d7c8f8e0587d3033c431
SHA5124c32623796679be7066b719f231d08d24341784ecfd5d6461e8140379f5b394216e446865df56e05b5f1e36962c9d34d2b5041275366aeabcd606f4536217fe4
-
C:\Users\Admin\AppData\Local\Microsoft\Media Player\Art Cache\LocalMLS\{DDB95087-6122-4FB0-9DF3-E87E9085AB86}.jpg
Filesize22KB
MD535e787587cd3fa8ed360036c9fca3df2
SHA184c76a25c6fe336f6559c033917a4c327279886d
SHA25698c49a68ee578e10947209ebc17c0ad188ed39c7d0c91a2b505f317259c0c9b2
SHA512aeec3eed5a52670f4cc35935005bb04bb435964a1975e489b8e101adfbce278142fd1a6c475860b7ccb414afe5e24613361a66d92f457937de9b21a7a112e1f9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
200KB
MD58fe043696a932c38cb6fddf6db2dabe3
SHA1d65e1117853cbe4d8abe705506fe86db25820ebe
SHA256d3baeeef03c8869f50d7c19b9d1d671d39330ba8cd62d7d418c9afcd4b2cf0dd
SHA512288806694738696827fa6c197b8efe14341a226c674b8116fda056bf6f7004376a6ba3dc91ab896feceec5fdebf209a0eeee7bd38b913fde9ec952c86284358a
-
Filesize
127KB
MD51099be41356e5feb02e24929187404fb
SHA1d750dbcfe0e0e86eb106266af76dc156f7832428
SHA256cf748d95b580771e02a6ce1e04abce5afa9431c07ac49173d24b7be1525ec50b
SHA5121956bb7efe5bd78d58ad9f04d785974646d4f9f52c7effd74a9dd4f10ce3bfbc2151fe6b02b0e55fc27724388e4fad84880256cdd370c0a3242641678b781586
-
Filesize
113KB
MD5064d4551699a11c63125fbadc493bab8
SHA1a51a1ef599317cfe0ca41cb65a3aedf8b64b0209
SHA2560c8b5c8c5c66b497c5bd5814c991d25551d552744e921e710c9d2139222b6502
SHA512b41e64e0dd514df5f76e3ab58e3bfe141d94d78af0687233c7873f07253b52dd923c97f2808be41d756140e2fba8d657ad0d8a23a6150f6f947565e3b7b6cbc4
-
Filesize
164KB
MD55ea6ce45bf91d5c764738527de0fff21
SHA1a8283ab5e12b353fe92cd9856054032a39263bf3
SHA256a06746bd0a15d46dd763aa0c9a5a9fe1a67c6010fb4cdf5981f5f1ee4110e1e3
SHA512d7b88b6efdc2ea7ec1e8ff6015913244dafc5938910e64bc3f7436a8e855251c2184234d482ebf887dd171a65c86e619a4745b74dea32f4e740e490374f51b4a
-
Filesize
120KB
MD5a2b20373bb274fe8d8a2b855a2942568
SHA14266f843bd3914fdc02d29527dbf210699e9ea33
SHA256e4db488d3e53520141922f881b01eed78e68cb434a9ff455c70aea45fae74619
SHA512e16542310274eb6e920c8d16cb95f88c4a4479fb470fccc050f645cc9bf892b70e802a7d417af5feb6c7a930edb6dc1bf69d183eaae08f05dc17a4208091318d
-
Filesize
142KB
MD57e47bf6ab705d8808dcf056233f68ae0
SHA1a4e1c8d3836ff8827abd0a294a987f7a3939cd38
SHA2565c82be8d9ddfc8be902e30dbb47471bb70dd9f3e641a2ecd707c2eece4d115df
SHA512ab21bbdf5106338534d3cfd50c9a989ff234408f9808a2e647379a6dbc7c1438fdcef26dc91353884f889211ab5d661f4735d7a8633ac5c3cf9f3eb95b624788
-
Filesize
244KB
MD50103a9db2c98e4fe67c8799eb1a88bdb
SHA17ee7ed5fde6fad138f9c8b07acdb16c5eb9942ac
SHA25635749a48dca8730b292978563aa693186d0087026eaa5e1717f0856586abbb15
SHA512f627cea97f24e55a6d49b7ed25cd5a66056d6c928b20089914756ae390425fbab0f405cc536974fb52acf770bfde785b394f2b243fc9274dbd71637f85204b8a
-
Filesize
135KB
MD53c24eb685d8fc960ccc367889dce29de
SHA171db914b5394438a8d3cd50408f9eba9c108225d
SHA256b39422444d837d017b830a1b6b1cd68b118437b5ee99bce02cd6a9ff88586fb0
SHA512483a401fe6ec5f99b761bea7084305aa9c1bef86eb6688e4531cdf5ad7ce5d40dcc32d04ee5017a86a946a89138d1948269529d6663bdafb8eb2857328c3b6b9
-
Filesize
32KB
MD584bba83cfbc0233517407678bb842686
SHA11c617de788de380d28c52dc733ad580c3745a1c1
SHA2566ecf98adb3cd0931ec803f3a56a9563c7d60bb86ec1886b21e3d0f7eb25198d9
SHA512a6a80c00a28c43c1c427018e6fb6dac4682d299d2f50202f520af0b1bca803546c850f04094ed2f532ff8775f6d45f2a40e4f5e069937bcaa0326a80bd818e0e