Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13/02/2021, 08:03
Static task
static1
Behavioral task
behavioral1
Sample
bd9f3b1b869611da4ad27ade26a7e19c0c3bc7e0aae3d21f8704ab58c59c4943.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
bd9f3b1b869611da4ad27ade26a7e19c0c3bc7e0aae3d21f8704ab58c59c4943.exe
Resource
win10v20201028
General
-
Target
bd9f3b1b869611da4ad27ade26a7e19c0c3bc7e0aae3d21f8704ab58c59c4943.exe
-
Size
1.5MB
-
MD5
e62a12e02d56fac5aa469ddb8973fa19
-
SHA1
190a33491b72b52f97d424a8a5e4c2193f5d71db
-
SHA256
bd9f3b1b869611da4ad27ade26a7e19c0c3bc7e0aae3d21f8704ab58c59c4943
-
SHA512
c89e53557e283ede3927988a1a045781fc908219f8ef46b45d11f954199b87ff2eb7d4a362d1568bf23af03b914158fa47a92208c49dca70c7d14e2854c07b12
Malware Config
Signatures
-
DiamondFox
DiamondFox is a multipurpose botnet with many capabilities.
-
DiamondFox payload 1 IoCs
Detects DiamondFox payload in file/memory.
resource yara_rule behavioral2/memory/1048-3-0x0000000000400000-0x0000000002652000-memory.dmp diamondfox -
NirSoft WebBrowserPassView 3 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/1688-16-0x0000000000400000-0x000000000047C000-memory.dmp WebBrowserPassView behavioral2/memory/1688-17-0x00000000004466F4-mapping.dmp WebBrowserPassView behavioral2/memory/1688-19-0x0000000000400000-0x000000000047C000-memory.dmp WebBrowserPassView -
Nirsoft 3 IoCs
resource yara_rule behavioral2/memory/1688-16-0x0000000000400000-0x000000000047C000-memory.dmp Nirsoft behavioral2/memory/1688-17-0x00000000004466F4-mapping.dmp Nirsoft behavioral2/memory/1688-19-0x0000000000400000-0x000000000047C000-memory.dmp Nirsoft -
Executes dropped EXE 3 IoCs
pid Process 2712 MicrosoftEdgeCPS.exe 1688 MicrosoftEdgeCPS.exe 1280 MicrosoftEdgeCPS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2712 set thread context of 1688 2712 MicrosoftEdgeCPS.exe 96 PID 2712 set thread context of 1280 2712 MicrosoftEdgeCPS.exe 97 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2712 MicrosoftEdgeCPS.exe 2712 MicrosoftEdgeCPS.exe 1688 MicrosoftEdgeCPS.exe 1688 MicrosoftEdgeCPS.exe 1688 MicrosoftEdgeCPS.exe 1688 MicrosoftEdgeCPS.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3508 wmic.exe Token: SeSecurityPrivilege 3508 wmic.exe Token: SeTakeOwnershipPrivilege 3508 wmic.exe Token: SeLoadDriverPrivilege 3508 wmic.exe Token: SeSystemProfilePrivilege 3508 wmic.exe Token: SeSystemtimePrivilege 3508 wmic.exe Token: SeProfSingleProcessPrivilege 3508 wmic.exe Token: SeIncBasePriorityPrivilege 3508 wmic.exe Token: SeCreatePagefilePrivilege 3508 wmic.exe Token: SeBackupPrivilege 3508 wmic.exe Token: SeRestorePrivilege 3508 wmic.exe Token: SeShutdownPrivilege 3508 wmic.exe Token: SeDebugPrivilege 3508 wmic.exe Token: SeSystemEnvironmentPrivilege 3508 wmic.exe Token: SeRemoteShutdownPrivilege 3508 wmic.exe Token: SeUndockPrivilege 3508 wmic.exe Token: SeManageVolumePrivilege 3508 wmic.exe Token: 33 3508 wmic.exe Token: 34 3508 wmic.exe Token: 35 3508 wmic.exe Token: 36 3508 wmic.exe Token: SeIncreaseQuotaPrivilege 3508 wmic.exe Token: SeSecurityPrivilege 3508 wmic.exe Token: SeTakeOwnershipPrivilege 3508 wmic.exe Token: SeLoadDriverPrivilege 3508 wmic.exe Token: SeSystemProfilePrivilege 3508 wmic.exe Token: SeSystemtimePrivilege 3508 wmic.exe Token: SeProfSingleProcessPrivilege 3508 wmic.exe Token: SeIncBasePriorityPrivilege 3508 wmic.exe Token: SeCreatePagefilePrivilege 3508 wmic.exe Token: SeBackupPrivilege 3508 wmic.exe Token: SeRestorePrivilege 3508 wmic.exe Token: SeShutdownPrivilege 3508 wmic.exe Token: SeDebugPrivilege 3508 wmic.exe Token: SeSystemEnvironmentPrivilege 3508 wmic.exe Token: SeRemoteShutdownPrivilege 3508 wmic.exe Token: SeUndockPrivilege 3508 wmic.exe Token: SeManageVolumePrivilege 3508 wmic.exe Token: 33 3508 wmic.exe Token: 34 3508 wmic.exe Token: 35 3508 wmic.exe Token: 36 3508 wmic.exe Token: SeIncreaseQuotaPrivilege 3612 wmic.exe Token: SeSecurityPrivilege 3612 wmic.exe Token: SeTakeOwnershipPrivilege 3612 wmic.exe Token: SeLoadDriverPrivilege 3612 wmic.exe Token: SeSystemProfilePrivilege 3612 wmic.exe Token: SeSystemtimePrivilege 3612 wmic.exe Token: SeProfSingleProcessPrivilege 3612 wmic.exe Token: SeIncBasePriorityPrivilege 3612 wmic.exe Token: SeCreatePagefilePrivilege 3612 wmic.exe Token: SeBackupPrivilege 3612 wmic.exe Token: SeRestorePrivilege 3612 wmic.exe Token: SeShutdownPrivilege 3612 wmic.exe Token: SeDebugPrivilege 3612 wmic.exe Token: SeSystemEnvironmentPrivilege 3612 wmic.exe Token: SeRemoteShutdownPrivilege 3612 wmic.exe Token: SeUndockPrivilege 3612 wmic.exe Token: SeManageVolumePrivilege 3612 wmic.exe Token: 33 3612 wmic.exe Token: 34 3612 wmic.exe Token: 35 3612 wmic.exe Token: 36 3612 wmic.exe Token: SeIncreaseQuotaPrivilege 3612 wmic.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1280 MicrosoftEdgeCPS.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2712 1048 bd9f3b1b869611da4ad27ade26a7e19c0c3bc7e0aae3d21f8704ab58c59c4943.exe 76 PID 1048 wrote to memory of 2712 1048 bd9f3b1b869611da4ad27ade26a7e19c0c3bc7e0aae3d21f8704ab58c59c4943.exe 76 PID 1048 wrote to memory of 2712 1048 bd9f3b1b869611da4ad27ade26a7e19c0c3bc7e0aae3d21f8704ab58c59c4943.exe 76 PID 2712 wrote to memory of 3508 2712 MicrosoftEdgeCPS.exe 80 PID 2712 wrote to memory of 3508 2712 MicrosoftEdgeCPS.exe 80 PID 2712 wrote to memory of 3508 2712 MicrosoftEdgeCPS.exe 80 PID 2712 wrote to memory of 3612 2712 MicrosoftEdgeCPS.exe 82 PID 2712 wrote to memory of 3612 2712 MicrosoftEdgeCPS.exe 82 PID 2712 wrote to memory of 3612 2712 MicrosoftEdgeCPS.exe 82 PID 2712 wrote to memory of 904 2712 MicrosoftEdgeCPS.exe 85 PID 2712 wrote to memory of 904 2712 MicrosoftEdgeCPS.exe 85 PID 2712 wrote to memory of 904 2712 MicrosoftEdgeCPS.exe 85 PID 2712 wrote to memory of 3592 2712 MicrosoftEdgeCPS.exe 87 PID 2712 wrote to memory of 3592 2712 MicrosoftEdgeCPS.exe 87 PID 2712 wrote to memory of 3592 2712 MicrosoftEdgeCPS.exe 87 PID 2712 wrote to memory of 3924 2712 MicrosoftEdgeCPS.exe 89 PID 2712 wrote to memory of 3924 2712 MicrosoftEdgeCPS.exe 89 PID 2712 wrote to memory of 3924 2712 MicrosoftEdgeCPS.exe 89 PID 2712 wrote to memory of 2784 2712 MicrosoftEdgeCPS.exe 91 PID 2712 wrote to memory of 2784 2712 MicrosoftEdgeCPS.exe 91 PID 2712 wrote to memory of 2784 2712 MicrosoftEdgeCPS.exe 91 PID 2712 wrote to memory of 4088 2712 MicrosoftEdgeCPS.exe 93 PID 2712 wrote to memory of 4088 2712 MicrosoftEdgeCPS.exe 93 PID 2712 wrote to memory of 4088 2712 MicrosoftEdgeCPS.exe 93 PID 2712 wrote to memory of 1688 2712 MicrosoftEdgeCPS.exe 96 PID 2712 wrote to memory of 1688 2712 MicrosoftEdgeCPS.exe 96 PID 2712 wrote to memory of 1688 2712 MicrosoftEdgeCPS.exe 96 PID 2712 wrote to memory of 1688 2712 MicrosoftEdgeCPS.exe 96 PID 2712 wrote to memory of 1688 2712 MicrosoftEdgeCPS.exe 96 PID 2712 wrote to memory of 1688 2712 MicrosoftEdgeCPS.exe 96 PID 2712 wrote to memory of 1688 2712 MicrosoftEdgeCPS.exe 96 PID 2712 wrote to memory of 1688 2712 MicrosoftEdgeCPS.exe 96 PID 2712 wrote to memory of 1688 2712 MicrosoftEdgeCPS.exe 96 PID 2712 wrote to memory of 1280 2712 MicrosoftEdgeCPS.exe 97 PID 2712 wrote to memory of 1280 2712 MicrosoftEdgeCPS.exe 97 PID 2712 wrote to memory of 1280 2712 MicrosoftEdgeCPS.exe 97 PID 2712 wrote to memory of 1280 2712 MicrosoftEdgeCPS.exe 97 PID 2712 wrote to memory of 1280 2712 MicrosoftEdgeCPS.exe 97 PID 2712 wrote to memory of 1280 2712 MicrosoftEdgeCPS.exe 97 PID 2712 wrote to memory of 1280 2712 MicrosoftEdgeCPS.exe 97 PID 2712 wrote to memory of 1280 2712 MicrosoftEdgeCPS.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd9f3b1b869611da4ad27ade26a7e19c0c3bc7e0aae3d21f8704ab58c59c4943.exe"C:\Users\Admin\AppData\Local\Temp\bd9f3b1b869611da4ad27ade26a7e19c0c3bc7e0aae3d21f8704ab58c59c4943.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe"C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" /Node:localhost /Namespace:\\root\SecurityCenter2 path AntiVirusProduct get DisplayName /FORMAT:List3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3508
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" os get caption /FORMAT:List3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3612
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_VideoController get caption /FORMAT:List3⤵PID:904
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_NetworkAdapterConfiguration where IPEnabled=1 get IPAddress /FORMAT:List3⤵PID:3592
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" LogicalDisk Where DriveType=4 get VolumeName /FORMAT:List3⤵PID:3924
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_PingStatus where address='outarcubleauded.xyz' get StatusCode /FORMAT:List3⤵PID:2784
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_PingStatus where address='outarcubleauded.xyz' get ResponseTime /FORMAT:List3⤵PID:4088
-
-
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe/scomma "C:\Users\Admin\AppData\Roaming\EdgeCP\1.log"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1688
-
-
C:\Users\Admin\AppData\Roaming\EdgeCP\MicrosoftEdgeCPS.exe/scomma "C:\Users\Admin\AppData\Roaming\EdgeCP\4.log"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1280
-
-