Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
129s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
07/05/2020, 11:11
Static task
static1
Behavioral task
behavioral1
Sample
8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe
Resource
win10v200430
General
-
Target
8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe
-
Size
835KB
-
MD5
2cc70c4beed0ba6db11c63bf435c6bf2
-
SHA1
18348a70148e1424ba4c30298b05f3f8820313cd
-
SHA256
8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8
-
SHA512
a455468af2b3b4793f959a31826337a89ede5117e17a7d622b1fcc12bdacd503a371742ed47e9cc89ba1e4b7819b18db75aadca6993f9bcb3515cec1964c04fd
Malware Config
Extracted
C:\_readme.txt
https://we.tl/t-xcn1Dtzak4
Signatures
-
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2804 wrote to memory of 1080 2804 8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe 68 PID 2804 wrote to memory of 1080 2804 8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe 68 PID 2804 wrote to memory of 1080 2804 8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe 68 PID 2804 wrote to memory of 2188 2804 8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe 69 PID 2804 wrote to memory of 2188 2804 8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe 69 PID 2804 wrote to memory of 2188 2804 8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe 69 PID 2188 wrote to memory of 3924 2188 8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe 71 PID 2188 wrote to memory of 3924 2188 8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe 71 PID 2188 wrote to memory of 3924 2188 8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe 71 PID 2188 wrote to memory of 3356 2188 8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe 72 PID 2188 wrote to memory of 3356 2188 8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe 72 PID 2188 wrote to memory of 3356 2188 8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe 72 PID 2188 wrote to memory of 3864 2188 8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe 73 PID 2188 wrote to memory of 3864 2188 8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe 73 PID 2188 wrote to memory of 3864 2188 8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe 73 PID 3924 wrote to memory of 3012 3924 updatewin1.exe 75 PID 3924 wrote to memory of 3012 3924 updatewin1.exe 75 PID 3924 wrote to memory of 3012 3924 updatewin1.exe 75 PID 3864 wrote to memory of 2668 3864 5.exe 78 PID 3864 wrote to memory of 2668 3864 5.exe 78 PID 3864 wrote to memory of 2668 3864 5.exe 78 PID 2668 wrote to memory of 3648 2668 cmd.exe 80 PID 2668 wrote to memory of 3648 2668 cmd.exe 80 PID 2668 wrote to memory of 3648 2668 cmd.exe 80 PID 3012 wrote to memory of 988 3012 updatewin1.exe 82 PID 3012 wrote to memory of 988 3012 updatewin1.exe 82 PID 3012 wrote to memory of 988 3012 updatewin1.exe 82 -
Program crash 1 IoCs
pid pid_target Process procid_target 1000 988 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2804 8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe 2804 8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe 2188 8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe 2188 8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe 3864 5.exe 3864 5.exe 3864 5.exe 3864 5.exe 3864 5.exe 3864 5.exe 3864 5.exe 3864 5.exe 1000 WerFault.exe 1000 WerFault.exe 1000 WerFault.exe 1000 WerFault.exe 1000 WerFault.exe 1000 WerFault.exe 1000 WerFault.exe 1000 WerFault.exe 1000 WerFault.exe 1000 WerFault.exe 1000 WerFault.exe 1000 WerFault.exe 1000 WerFault.exe 1000 WerFault.exe 1000 WerFault.exe 1000 WerFault.exe 2188 8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe 2188 8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe 2268 8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe 2268 8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3648 taskkill.exe Token: SeRestorePrivilege 1000 WerFault.exe Token: SeBackupPrivilege 1000 WerFault.exe Token: SeDebugPrivilege 1000 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts updatewin2.exe -
Makes http(s) request 21 IoCs
Contacts server via http/https, possibly for C2 communication.
description flow ioc HTTP URL 20 http://chumashpeople.com/msvcp140.dll HTTP URL 20 http://chumashpeople.com/nss3.dll HTTP URL 15 http://akbz.top/files/penelop/updatewin.exe HTTP URL 16 http://akbz.top/files/penelop/3.exe HTTP URL 20 http://chumashpeople.com/517 HTTP URL 20 http://chumashpeople.com/mozglue.dll HTTP URL 20 http://chumashpeople.com/ HTTP URL 22 http://ip-api.com/line/ HTTP URL 13 http://akbz.top/files/penelop/updatewin1.exe HTTP URL 14 http://akbz.top/files/penelop/updatewin2.exe HTTP URL 18 http://akbz.top/files/penelop/5.exe HTTP URL 20 http://chumashpeople.com/softokn3.dll HTTP URL 27 http://www.msftconnecttest.com/connecttest.txt HTTP URL 31 http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab?24fc97ab36ab0a84 HTTP URL 7 http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?d66b24bbc9e28741 HTTP URL 9 http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBR8sWZUnKvbRO5iJhat9GV793rVlAQUrb2YejS0Jvf6xCZU7wO94CTLVBoCEBPqKHBb9OztDDZjCYBhQzY%3D HTTP URL 12 http://akbz.top/ydtftysdtyftysdfsdpen3/get.php?pid=A7153D04AA7EADE6798FB6C652D89EF1&first=true HTTP URL 20 http://chumashpeople.com/vcruntime140.dll HTTP URL 9 http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEH1bUSa0droR23QWC7xTDac%3D HTTP URL 17 http://akbz.top/files/penelop/4.exe HTTP URL 20 http://chumashpeople.com/freebl3.dll -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1080 icacls.exe -
Loads dropped DLL 2 IoCs
pid Process 3864 5.exe 3864 5.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 ip-api.com -
Executes dropped EXE 5 IoCs
pid Process 3924 updatewin1.exe 3356 updatewin2.exe 3864 5.exe 3012 updatewin1.exe 2268 8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe -
Adds Run entry to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\a0964f4b-0b61-4183-9a3b-db341464d78d\\8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe\" --AutoStart" 8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868 8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868\Blob = 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 8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Checks for installed software on the system 1 TTPs 28 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2151757\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2467173\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2524860\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB982573\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\DisplayName 5.exe Key enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DXM_Runtime\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2544655\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2549743\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MPlayer2\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\WIC\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE40\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IEData\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2565063\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A03706F-666A-4037-7777-5F2748764D10}\DisplayName 5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\DisplayName 5.exe -
Kills process with taskkill 1 IoCs
pid Process 3648 taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe"C:\Users\Admin\AppData\Local\Temp\8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
- Adds Run entry to start application
- Modifies system certificate store
PID:2804 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\a0964f4b-0b61-4183-9a3b-db341464d78d" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
PID:1080
-
-
C:\Users\Admin\AppData\Local\Temp\8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe"C:\Users\Admin\AppData\Local\Temp\8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe" --Admin IsNotAutoStart IsNotTask2⤵
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
PID:2188 -
C:\Users\Admin\AppData\Local\109add55-2f19-4d86-82ab-034a7c2b13e5\updatewin1.exe"C:\Users\Admin\AppData\Local\109add55-2f19-4d86-82ab-034a7c2b13e5\updatewin1.exe"3⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:3924 -
C:\Users\Admin\AppData\Local\109add55-2f19-4d86-82ab-034a7c2b13e5\updatewin1.exe"C:\Users\Admin\AppData\Local\109add55-2f19-4d86-82ab-034a7c2b13e5\updatewin1.exe" --Admin4⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:3012 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Set-ExecutionPolicy -Scope CurrentUser RemoteSigned5⤵PID:988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 988 -s 6686⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1000
-
-
-
-
-
C:\Users\Admin\AppData\Local\109add55-2f19-4d86-82ab-034a7c2b13e5\updatewin2.exe"C:\Users\Admin\AppData\Local\109add55-2f19-4d86-82ab-034a7c2b13e5\updatewin2.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
PID:3356
-
-
C:\Users\Admin\AppData\Local\109add55-2f19-4d86-82ab-034a7c2b13e5\5.exe"C:\Users\Admin\AppData\Local\109add55-2f19-4d86-82ab-034a7c2b13e5\5.exe"3⤵
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
- Checks processor information in registry
- Loads dropped DLL
- Executes dropped EXE
- Checks for installed software on the system
PID:3864 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 5.exe /f & erase C:\Users\Admin\AppData\Local\109add55-2f19-4d86-82ab-034a7c2b13e5\5.exe & exit4⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im 5.exe /f5⤵
- Suspicious use of AdjustPrivilegeToken
- Kills process with taskkill
PID:3648
-
-
-
-
-
C:\Users\Admin\AppData\Local\a0964f4b-0b61-4183-9a3b-db341464d78d\8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exeC:\Users\Admin\AppData\Local\a0964f4b-0b61-4183-9a3b-db341464d78d\8dad2f78f4ac3756165293666361a157ecaf50e2c2c8344cccd09f018912f3a8.exe --Task1⤵
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
PID:2268