Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
71s -
max time network
115s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
12/04/2021, 06:37
Static task
static1
Behavioral task
behavioral1
Sample
output(1).exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
output(1).exe
Resource
win10v20201028
General
-
Target
output(1).exe
-
Size
1.1MB
-
MD5
6f23faff2a32f16a2a3cfb3dfe4d2e38
-
SHA1
d52ded952a66428f282811dafb651d124b7b05ea
-
SHA256
8e9d0e52d976ff21f930c8c032b94b394738fb652db616eebaa18fb0ab5fcde7
-
SHA512
bf4c7f8db3f743b2f4f75588425eb3922e926704b2e9b0474389369e95d3f9247a48e7b99e8754862db3f8d6cc65bbd74a7745abc6e16683bfd0f47e622f0fd0
Malware Config
Extracted
raccoon
f55f17175de492dccaffeb57cb41e8ca951c34c4
-
url4cnc
https://tttttt.me/umiumitfr3
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 2172 output(1).exe 2172 output(1).exe 2172 output(1).exe 2172 output(1).exe 2172 output(1).exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4644 set thread context of 2172 4644 output(1).exe 77 -
Delays execution with timeout.exe 1 IoCs
pid Process 568 timeout.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4644 wrote to memory of 2172 4644 output(1).exe 77 PID 4644 wrote to memory of 2172 4644 output(1).exe 77 PID 4644 wrote to memory of 2172 4644 output(1).exe 77 PID 4644 wrote to memory of 2172 4644 output(1).exe 77 PID 4644 wrote to memory of 2172 4644 output(1).exe 77 PID 2172 wrote to memory of 3252 2172 output(1).exe 78 PID 2172 wrote to memory of 3252 2172 output(1).exe 78 PID 2172 wrote to memory of 3252 2172 output(1).exe 78 PID 3252 wrote to memory of 568 3252 cmd.exe 80 PID 3252 wrote to memory of 568 3252 cmd.exe 80 PID 3252 wrote to memory of 568 3252 cmd.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\output(1).exe"C:\Users\Admin\AppData\Local\Temp\output(1).exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\output(1).exe"C:\Users\Admin\AppData\Local\Temp\output(1).exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\output(1).exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:568
-
-
-