Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
40s -
max time network
38s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
12/04/2021, 06:37
Static task
static1
Behavioral task
behavioral1
Sample
setup(1).exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
setup(1).exe
Resource
win10v20201028
General
-
Target
setup(1).exe
-
Size
266KB
-
MD5
dcd1e195ad1945389bc4d87dae82a164
-
SHA1
7c1aed93371a31888752afd9bfc7d76379940732
-
SHA256
ac2c2e2b67deca31d1f61ff956ef8b676fa733da9c682f26fbda28b46c6e6f63
-
SHA512
52f2de83f7286655a1cb964fa76704ede980d875571d424689253757c6ec9491d25402ce9124ec825f15e3e62f4bb1b43b2675c49757b1c00e179d69a03e345b
Malware Config
Extracted
raccoon
16992cd33145ccbb6feeacb4e84400a56448fa14
-
url4cnc
https://telete.in/baudemars
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 632 99708381504.exe 980 69474879166.exe -
Deletes itself 1 IoCs
pid Process 2004 cmd.exe -
Loads dropped DLL 15 IoCs
pid Process 368 cmd.exe 368 cmd.exe 632 99708381504.exe 632 99708381504.exe 1444 cmd.exe 1444 cmd.exe 980 69474879166.exe 980 69474879166.exe 632 99708381504.exe 632 99708381504.exe 632 99708381504.exe 632 99708381504.exe 632 99708381504.exe 632 99708381504.exe 632 99708381504.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 69474879166.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 69474879166.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1740 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 1616 taskkill.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 99708381504.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 99708381504.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 99708381504.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 99708381504.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 99708381504.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 1660 setup(1).exe Token: SeBackupPrivilege 1660 setup(1).exe Token: SeDebugPrivilege 1616 taskkill.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1660 wrote to memory of 368 1660 setup(1).exe 31 PID 1660 wrote to memory of 368 1660 setup(1).exe 31 PID 1660 wrote to memory of 368 1660 setup(1).exe 31 PID 1660 wrote to memory of 368 1660 setup(1).exe 31 PID 1660 wrote to memory of 368 1660 setup(1).exe 31 PID 1660 wrote to memory of 368 1660 setup(1).exe 31 PID 1660 wrote to memory of 368 1660 setup(1).exe 31 PID 368 wrote to memory of 632 368 cmd.exe 33 PID 368 wrote to memory of 632 368 cmd.exe 33 PID 368 wrote to memory of 632 368 cmd.exe 33 PID 368 wrote to memory of 632 368 cmd.exe 33 PID 368 wrote to memory of 632 368 cmd.exe 33 PID 368 wrote to memory of 632 368 cmd.exe 33 PID 368 wrote to memory of 632 368 cmd.exe 33 PID 1660 wrote to memory of 1444 1660 setup(1).exe 34 PID 1660 wrote to memory of 1444 1660 setup(1).exe 34 PID 1660 wrote to memory of 1444 1660 setup(1).exe 34 PID 1660 wrote to memory of 1444 1660 setup(1).exe 34 PID 1660 wrote to memory of 1444 1660 setup(1).exe 34 PID 1660 wrote to memory of 1444 1660 setup(1).exe 34 PID 1660 wrote to memory of 1444 1660 setup(1).exe 34 PID 1444 wrote to memory of 980 1444 cmd.exe 36 PID 1444 wrote to memory of 980 1444 cmd.exe 36 PID 1444 wrote to memory of 980 1444 cmd.exe 36 PID 1444 wrote to memory of 980 1444 cmd.exe 36 PID 1444 wrote to memory of 980 1444 cmd.exe 36 PID 1444 wrote to memory of 980 1444 cmd.exe 36 PID 1444 wrote to memory of 980 1444 cmd.exe 36 PID 1660 wrote to memory of 2004 1660 setup(1).exe 37 PID 1660 wrote to memory of 2004 1660 setup(1).exe 37 PID 1660 wrote to memory of 2004 1660 setup(1).exe 37 PID 1660 wrote to memory of 2004 1660 setup(1).exe 37 PID 1660 wrote to memory of 2004 1660 setup(1).exe 37 PID 1660 wrote to memory of 2004 1660 setup(1).exe 37 PID 1660 wrote to memory of 2004 1660 setup(1).exe 37 PID 2004 wrote to memory of 1616 2004 cmd.exe 39 PID 2004 wrote to memory of 1616 2004 cmd.exe 39 PID 2004 wrote to memory of 1616 2004 cmd.exe 39 PID 2004 wrote to memory of 1616 2004 cmd.exe 39 PID 2004 wrote to memory of 1616 2004 cmd.exe 39 PID 2004 wrote to memory of 1616 2004 cmd.exe 39 PID 2004 wrote to memory of 1616 2004 cmd.exe 39 PID 632 wrote to memory of 1240 632 99708381504.exe 41 PID 632 wrote to memory of 1240 632 99708381504.exe 41 PID 632 wrote to memory of 1240 632 99708381504.exe 41 PID 632 wrote to memory of 1240 632 99708381504.exe 41 PID 632 wrote to memory of 1240 632 99708381504.exe 41 PID 632 wrote to memory of 1240 632 99708381504.exe 41 PID 632 wrote to memory of 1240 632 99708381504.exe 41 PID 1240 wrote to memory of 1740 1240 cmd.exe 43 PID 1240 wrote to memory of 1740 1240 cmd.exe 43 PID 1240 wrote to memory of 1740 1240 cmd.exe 43 PID 1240 wrote to memory of 1740 1240 cmd.exe 43 PID 1240 wrote to memory of 1740 1240 cmd.exe 43 PID 1240 wrote to memory of 1740 1240 cmd.exe 43 PID 1240 wrote to memory of 1740 1240 cmd.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup(1).exe"C:\Users\Admin\AppData\Local\Temp\setup(1).exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{dX0P-58zQo-wi1a-fhX9q}\99708381504.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Local\Temp\{dX0P-58zQo-wi1a-fhX9q}\99708381504.exe"C:\Users\Admin\AppData\Local\Temp\{dX0P-58zQo-wi1a-fhX9q}\99708381504.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\{dX0P-58zQo-wi1a-fhX9q}\99708381504.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK5⤵
- Delays execution with timeout.exe
PID:1740
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{dX0P-58zQo-wi1a-fhX9q}\69474879166.exe" /mix2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\{dX0P-58zQo-wi1a-fhX9q}\69474879166.exe"C:\Users\Admin\AppData\Local\Temp\{dX0P-58zQo-wi1a-fhX9q}\69474879166.exe" /mix3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:980
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "setup(1).exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\setup(1).exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "setup(1).exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-