Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
09/01/2021, 22:47
210109-b1v8zws832 9Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09/01/2021, 22:47
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe
Resource
win7v20201028
General
-
Target
SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe
-
Size
610KB
-
MD5
d83cd7278c47f4f3c7884eb9593a256c
-
SHA1
026983b49e5356ed0497109de09ea43e5be9e54c
-
SHA256
9986d7d421e26cce5a64a65a7f72b757043cbe7dfe2dd0b32f66d25203922415
-
SHA512
5b84ede84c3c76795e45dcc1cc8e186be3f09d03f4965c8b88bda8294f2c0b9983dde4b37532773b07cafe3a1483c8aedd4c4230dbdc06714c5c7c097386fa1b
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Blocklisted process makes network request 8 IoCs
flow pid Process 32 4288 RUNDLL32.EXE 34 4288 RUNDLL32.EXE 36 4288 RUNDLL32.EXE 37 4288 RUNDLL32.EXE 40 4408 WScript.exe 42 4408 WScript.exe 44 4408 WScript.exe 46 4408 WScript.exe -
Executes dropped EXE 6 IoCs
pid Process 3016 File35.exe 668 4_ico.exe 3332 6_ico.exe 2244 vpn_ico.exe 2324 SmartClock.exe 1724 ggtmeosqs.exe -
resource yara_rule behavioral2/files/0x000200000001ab7f-40.dat upx behavioral2/files/0x000200000001ab7f-39.dat upx -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SmartClock.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SmartClock.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion vpn_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion vpn_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4_ico.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 4_ico.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Wine 4_ico.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Wine 6_ico.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Wine vpn_ico.exe Key opened \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Wine SmartClock.exe -
Loads dropped DLL 4 IoCs
pid Process 3016 File35.exe 4180 rundll32.exe 4180 rundll32.exe 4288 RUNDLL32.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2244 vpn_ico.exe 668 4_ico.exe 3332 6_ico.exe 2324 SmartClock.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 vpn_ico.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString vpn_ico.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 744 timeout.exe 1388 timeout.exe 4160 timeout.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings vpn_ico.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 WScript.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2324 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2244 vpn_ico.exe 2244 vpn_ico.exe 3332 6_ico.exe 3332 6_ico.exe 668 4_ico.exe 668 4_ico.exe 2324 SmartClock.exe 2324 SmartClock.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4180 rundll32.exe Token: SeDebugPrivilege 4288 RUNDLL32.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 944 SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe 944 SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 944 wrote to memory of 3016 944 SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe 78 PID 944 wrote to memory of 3016 944 SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe 78 PID 944 wrote to memory of 3016 944 SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe 78 PID 944 wrote to memory of 1984 944 SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe 79 PID 944 wrote to memory of 1984 944 SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe 79 PID 944 wrote to memory of 1984 944 SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe 79 PID 3016 wrote to memory of 668 3016 File35.exe 81 PID 3016 wrote to memory of 668 3016 File35.exe 81 PID 3016 wrote to memory of 668 3016 File35.exe 81 PID 3016 wrote to memory of 3332 3016 File35.exe 82 PID 3016 wrote to memory of 3332 3016 File35.exe 82 PID 3016 wrote to memory of 3332 3016 File35.exe 82 PID 1984 wrote to memory of 744 1984 cmd.exe 83 PID 1984 wrote to memory of 744 1984 cmd.exe 83 PID 1984 wrote to memory of 744 1984 cmd.exe 83 PID 3016 wrote to memory of 2244 3016 File35.exe 84 PID 3016 wrote to memory of 2244 3016 File35.exe 84 PID 3016 wrote to memory of 2244 3016 File35.exe 84 PID 668 wrote to memory of 2324 668 4_ico.exe 85 PID 668 wrote to memory of 2324 668 4_ico.exe 85 PID 668 wrote to memory of 2324 668 4_ico.exe 85 PID 2244 wrote to memory of 1724 2244 vpn_ico.exe 86 PID 2244 wrote to memory of 1724 2244 vpn_ico.exe 86 PID 2244 wrote to memory of 1724 2244 vpn_ico.exe 86 PID 2244 wrote to memory of 1700 2244 vpn_ico.exe 88 PID 2244 wrote to memory of 1700 2244 vpn_ico.exe 88 PID 2244 wrote to memory of 1700 2244 vpn_ico.exe 88 PID 3332 wrote to memory of 1224 3332 6_ico.exe 89 PID 3332 wrote to memory of 1224 3332 6_ico.exe 89 PID 3332 wrote to memory of 1224 3332 6_ico.exe 89 PID 1224 wrote to memory of 1388 1224 cmd.exe 91 PID 1224 wrote to memory of 1388 1224 cmd.exe 91 PID 1224 wrote to memory of 1388 1224 cmd.exe 91 PID 3332 wrote to memory of 4116 3332 6_ico.exe 92 PID 3332 wrote to memory of 4116 3332 6_ico.exe 92 PID 3332 wrote to memory of 4116 3332 6_ico.exe 92 PID 4116 wrote to memory of 4160 4116 cmd.exe 94 PID 4116 wrote to memory of 4160 4116 cmd.exe 94 PID 4116 wrote to memory of 4160 4116 cmd.exe 94 PID 1724 wrote to memory of 4180 1724 ggtmeosqs.exe 95 PID 1724 wrote to memory of 4180 1724 ggtmeosqs.exe 95 PID 1724 wrote to memory of 4180 1724 ggtmeosqs.exe 95 PID 4180 wrote to memory of 4288 4180 rundll32.exe 97 PID 4180 wrote to memory of 4288 4180 rundll32.exe 97 PID 4180 wrote to memory of 4288 4180 rundll32.exe 97 PID 2244 wrote to memory of 4408 2244 vpn_ico.exe 98 PID 2244 wrote to memory of 4408 2244 vpn_ico.exe 98 PID 2244 wrote to memory of 4408 2244 vpn_ico.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe"1⤵
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\File35.exe"C:\Users\Admin\AppData\Local\Temp\File35.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\New Feature\4_ico.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\4_ico.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Drops startup file
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"4⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:2324
-
-
-
C:\Users\Admin\AppData\Local\Temp\New Feature\6_ico.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\6_ico.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\furifhulvsgl & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\New Feature\6_ico.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\timeout.exetimeout 25⤵
- Delays execution with timeout.exe
PID:1388
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\furifhulvsgl & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\New Feature\6_ico.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\timeout.exetimeout 25⤵
- Delays execution with timeout.exe
PID:4160
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\New Feature\vpn_ico.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\vpn_ico.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\ggtmeosqs.exe"C:\Users\Admin\AppData\Local\Temp\ggtmeosqs.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\GGTMEO~1.DLL,Z C:\Users\Admin\AppData\Local\Temp\GGTMEO~1.EXE5⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\GGTMEO~1.DLL,GBQETI0=6⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4288
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\pkgnxjdlloqj.vbs"4⤵PID:1700
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\jmrdnwev.vbs"4⤵
- Blocklisted process makes network request
- Modifies system certificate store
PID:4408
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\RpJOaAkQn & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Trojan.jc.22567.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:744
-
-