Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
4294179s -
max time network
166s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
19/03/2022, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe
Resource
win10v2004-en-20220113
General
-
Target
82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe
-
Size
564KB
-
MD5
967d07a54d49ef152a1f0948b7962402
-
SHA1
0f29866f65465247e5b1e90ccd4c743f5907d028
-
SHA256
82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955
-
SHA512
bbf948180c9a1f03bd50e308210cff8fd42256ee1c412fdd04fe12f71391cc739d747e4e0e4073b9c1c809468130ff87fa63803beaabbcda8ef5db00fe85b2a7
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet Payload 1 IoCs
resource yara_rule behavioral1/memory/852-55-0x0000000010000000-0x0000000010017000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 1600 Cgwkska.exe 1968 Cgwkska.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe File opened (read-only) \??\O: 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe File opened (read-only) \??\R: 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe File opened (read-only) \??\V: 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe File opened (read-only) \??\W: 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe File opened (read-only) \??\B: 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe File opened (read-only) \??\H: 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe File opened (read-only) \??\K: 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe File opened (read-only) \??\Q: 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe File opened (read-only) \??\U: 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe File opened (read-only) \??\Y: 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe File opened (read-only) \??\I: 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe File opened (read-only) \??\P: 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe File opened (read-only) \??\T: 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe File opened (read-only) \??\J: 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe File opened (read-only) \??\M: 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe File opened (read-only) \??\N: 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe File opened (read-only) \??\S: 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe File opened (read-only) \??\X: 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe File opened (read-only) \??\E: 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe File opened (read-only) \??\F: 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe File opened (read-only) \??\G: 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe File opened (read-only) \??\Z: 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Cgwkska.exe 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe File created C:\Program Files (x86)\Cgwkska.exe 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 852 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe 1600 Cgwkska.exe 1968 Cgwkska.exe 852 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 852 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 852 82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe 1600 Cgwkska.exe 1968 Cgwkska.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1968 1600 Cgwkska.exe 28 PID 1600 wrote to memory of 1968 1600 Cgwkska.exe 28 PID 1600 wrote to memory of 1968 1600 Cgwkska.exe 28 PID 1600 wrote to memory of 1968 1600 Cgwkska.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe"C:\Users\Admin\AppData\Local\Temp\82f09791e34de15ed024c1cebc0d0fc7a6528088429ba5699292e1b389b3b955.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:852
-
C:\Program Files (x86)\Cgwkska.exe"C:\Program Files (x86)\Cgwkska.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Program Files (x86)\Cgwkska.exe"C:\Program Files (x86)\Cgwkska.exe" Win72⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1968
-