Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
140s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
19/01/2021, 18:09
Static task
static1
Behavioral task
behavioral1
Sample
63dac056d672b1987462b41f44987cb470e5b94fd528e521040e98c70de2732a.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
63dac056d672b1987462b41f44987cb470e5b94fd528e521040e98c70de2732a.exe
Resource
win10v20201028
General
-
Target
63dac056d672b1987462b41f44987cb470e5b94fd528e521040e98c70de2732a.exe
-
Size
579KB
-
MD5
de4b296cb2891bd1c3ed085ed648a62d
-
SHA1
73aaa5d6869bd25abb78ba5beb27ec8c5ee71e57
-
SHA256
63dac056d672b1987462b41f44987cb470e5b94fd528e521040e98c70de2732a
-
SHA512
122402092f03e9ee35ad0fa5128e4d50795894790f088918d0ca3f6e128d85c8b6b7f64eaecdf6d66b2a8d41f921a1446056129d7b9eb28822afb8eacb20d453
Malware Config
Signatures
-
DiamondFox
DiamondFox is a multipurpose botnet with many capabilities.
-
DiamondFox payload 1 IoCs
Detects DiamondFox payload in file/memory.
resource yara_rule behavioral1/memory/1604-5-0x0000000000400000-0x0000000000470000-memory.dmp diamondfox -
NirSoft WebBrowserPassView 3 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/988-92-0x0000000000400000-0x0000000000477000-memory.dmp WebBrowserPassView behavioral1/memory/988-93-0x0000000000447D8A-mapping.dmp WebBrowserPassView behavioral1/memory/988-97-0x0000000000400000-0x0000000000477000-memory.dmp WebBrowserPassView -
Nirsoft 6 IoCs
resource yara_rule behavioral1/memory/988-92-0x0000000000400000-0x0000000000477000-memory.dmp Nirsoft behavioral1/memory/988-93-0x0000000000447D8A-mapping.dmp Nirsoft behavioral1/memory/988-97-0x0000000000400000-0x0000000000477000-memory.dmp Nirsoft behavioral1/memory/2024-100-0x0000000000400000-0x0000000000422000-memory.dmp Nirsoft behavioral1/memory/2024-101-0x0000000000413E10-mapping.dmp Nirsoft behavioral1/memory/2024-104-0x0000000000400000-0x0000000000422000-memory.dmp Nirsoft -
Executes dropped EXE 3 IoCs
pid Process 864 audiodg.exe 988 audiodg.exe 2024 audiodg.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodg.lnk powershell.exe -
Loads dropped DLL 5 IoCs
pid Process 316 powershell.exe 316 powershell.exe 812 powershell.exe 864 audiodg.exe 864 audiodg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 864 set thread context of 988 864 audiodg.exe 38 PID 864 set thread context of 2024 864 audiodg.exe 40 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 audiodg.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 040000000100000010000000410352dc0ff7501b16f0028eba6f45c50f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131900000001000000100000006cf252fec3e8f20996de5d4dd9aef42420000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 audiodg.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 316 powershell.exe 316 powershell.exe 812 powershell.exe 812 powershell.exe 656 Powershell.exe 656 Powershell.exe 988 audiodg.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 316 powershell.exe Token: SeDebugPrivilege 812 powershell.exe Token: SeDebugPrivilege 656 Powershell.exe Token: SeDebugPrivilege 2024 audiodg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1604 63dac056d672b1987462b41f44987cb470e5b94fd528e521040e98c70de2732a.exe 864 audiodg.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1604 wrote to memory of 316 1604 63dac056d672b1987462b41f44987cb470e5b94fd528e521040e98c70de2732a.exe 29 PID 1604 wrote to memory of 316 1604 63dac056d672b1987462b41f44987cb470e5b94fd528e521040e98c70de2732a.exe 29 PID 1604 wrote to memory of 316 1604 63dac056d672b1987462b41f44987cb470e5b94fd528e521040e98c70de2732a.exe 29 PID 1604 wrote to memory of 316 1604 63dac056d672b1987462b41f44987cb470e5b94fd528e521040e98c70de2732a.exe 29 PID 316 wrote to memory of 864 316 powershell.exe 31 PID 316 wrote to memory of 864 316 powershell.exe 31 PID 316 wrote to memory of 864 316 powershell.exe 31 PID 316 wrote to memory of 864 316 powershell.exe 31 PID 864 wrote to memory of 812 864 audiodg.exe 32 PID 864 wrote to memory of 812 864 audiodg.exe 32 PID 864 wrote to memory of 812 864 audiodg.exe 32 PID 864 wrote to memory of 812 864 audiodg.exe 32 PID 864 wrote to memory of 656 864 audiodg.exe 35 PID 864 wrote to memory of 656 864 audiodg.exe 35 PID 864 wrote to memory of 656 864 audiodg.exe 35 PID 864 wrote to memory of 656 864 audiodg.exe 35 PID 864 wrote to memory of 988 864 audiodg.exe 38 PID 864 wrote to memory of 988 864 audiodg.exe 38 PID 864 wrote to memory of 988 864 audiodg.exe 38 PID 864 wrote to memory of 988 864 audiodg.exe 38 PID 864 wrote to memory of 988 864 audiodg.exe 38 PID 864 wrote to memory of 988 864 audiodg.exe 38 PID 864 wrote to memory of 988 864 audiodg.exe 38 PID 864 wrote to memory of 988 864 audiodg.exe 38 PID 864 wrote to memory of 988 864 audiodg.exe 38 PID 864 wrote to memory of 988 864 audiodg.exe 38 PID 864 wrote to memory of 2024 864 audiodg.exe 40 PID 864 wrote to memory of 2024 864 audiodg.exe 40 PID 864 wrote to memory of 2024 864 audiodg.exe 40 PID 864 wrote to memory of 2024 864 audiodg.exe 40 PID 864 wrote to memory of 2024 864 audiodg.exe 40 PID 864 wrote to memory of 2024 864 audiodg.exe 40 PID 864 wrote to memory of 2024 864 audiodg.exe 40 PID 864 wrote to memory of 2024 864 audiodg.exe 40 PID 864 wrote to memory of 2024 864 audiodg.exe 40 PID 864 wrote to memory of 2024 864 audiodg.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\63dac056d672b1987462b41f44987cb470e5b94fd528e521040e98c70de2732a.exe"C:\Users\Admin\AppData\Local\Temp\63dac056d672b1987462b41f44987cb470e5b94fd528e521040e98c70de2732a.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Copy-Item -Path 'C:\Users\Admin\AppData\Local\Temp\63dac056d672b1987462b41f44987cb470e5b94fd528e521040e98c70de2732a.exe' -Destination 'C:\Users\Admin\AppData\Local\gadoiud\audiodg.exe';Start-Sleep -s 60;Start-Process 'C:\Users\Admin\AppData\Local\gadoiud\audiodg.exe'2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\gadoiud\audiodg.exe"C:\Users\Admin\AppData\Local\gadoiud\audiodg.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell $shell = New-Object -ComObject WScript.Shell;$shortcut = $shell.CreateShortcut('C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\audiodg.lnk');$shortcut.TargetPath = 'C:\Users\Admin\AppData\Local\gadoiud\audiodg.exe';$shortcut.Save()4⤵
- Drops startup file
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:812
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exePowershell Set-MpPreference -DisableRealtimeMonitoring 14⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:656
-
-
C:\Users\Admin\AppData\Local\gadoiud\audiodg.exe/scomma C:\Users\Admin\AppData\Local\gadoiud\1.log4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:988
-
-
C:\Users\Admin\AppData\Local\gadoiud\audiodg.exe/scomma C:\Users\Admin\AppData\Local\gadoiud\2.log4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
-