Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    161s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20/05/2022, 12:42

General

  • Target

    861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe

  • Size

    1.3MB

  • MD5

    bac833939f7c29317854a27ac8edfe10

  • SHA1

    4fac9a4ec063ee0892c7a1e761a6a86097e90796

  • SHA256

    861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a

  • SHA512

    36b09d2c84de59b8d3ff99fe930545503de84479ea637564aaab4e6b0ac412ec6bc3ebbaffd05333cfeb803df39fb521d9166819b04beb8e02b809db10a03fc8

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet Payload 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe
    "C:\Users\Admin\AppData\Local\Temp\861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Users\Admin\AppData\Local\Temp\._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe"
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1552
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      PID:316
  • C:\Program Files (x86)\Ejbabmc.exe
    "C:\Program Files (x86)\Ejbabmc.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1472
    • C:\Program Files (x86)\Ejbabmc.exe
      "C:\Program Files (x86)\Ejbabmc.exe" Win7
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1708
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:756

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Ejbabmc.exe

    Filesize

    584KB

    MD5

    25b1052f544cdf4c57ae8b90d83df1ac

    SHA1

    2b1d50060504fd8ec7cbeea25ac4774128ca014e

    SHA256

    a9ff0dd4a5ee46d64169a605a859d69f39b135df8bcc8a20b5a2c693aae65666

    SHA512

    bc438cdcf7d7a8a74f57265f9bdc625373a6c0eb11ff9eac431ccf86abab4b6f18ee268108e1ef2053ca367c79385a159da80c7fa837cdf580e945c2e82cb584

  • C:\Program Files (x86)\Ejbabmc.exe

    Filesize

    584KB

    MD5

    25b1052f544cdf4c57ae8b90d83df1ac

    SHA1

    2b1d50060504fd8ec7cbeea25ac4774128ca014e

    SHA256

    a9ff0dd4a5ee46d64169a605a859d69f39b135df8bcc8a20b5a2c693aae65666

    SHA512

    bc438cdcf7d7a8a74f57265f9bdc625373a6c0eb11ff9eac431ccf86abab4b6f18ee268108e1ef2053ca367c79385a159da80c7fa837cdf580e945c2e82cb584

  • C:\Program Files (x86)\Ejbabmc.exe

    Filesize

    584KB

    MD5

    25b1052f544cdf4c57ae8b90d83df1ac

    SHA1

    2b1d50060504fd8ec7cbeea25ac4774128ca014e

    SHA256

    a9ff0dd4a5ee46d64169a605a859d69f39b135df8bcc8a20b5a2c693aae65666

    SHA512

    bc438cdcf7d7a8a74f57265f9bdc625373a6c0eb11ff9eac431ccf86abab4b6f18ee268108e1ef2053ca367c79385a159da80c7fa837cdf580e945c2e82cb584

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    751KB

    MD5

    29e1b0ddfb7e090b081d2c5b21f1f0d7

    SHA1

    2ffd30e5347bb398aa9e2901c4fb1cdac445fc4a

    SHA256

    11aa613976974b09005557a265e789da94ef8b90827f394272f8dd0905544a45

    SHA512

    c0ccf9dea3db739800ddd5e565d2b5b97fcf03345881253423d411215cf80c9ed752968116c87ec0f07ca5671b93ede8c558fba3d34e92e549f7f573be6cc72f

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    751KB

    MD5

    29e1b0ddfb7e090b081d2c5b21f1f0d7

    SHA1

    2ffd30e5347bb398aa9e2901c4fb1cdac445fc4a

    SHA256

    11aa613976974b09005557a265e789da94ef8b90827f394272f8dd0905544a45

    SHA512

    c0ccf9dea3db739800ddd5e565d2b5b97fcf03345881253423d411215cf80c9ed752968116c87ec0f07ca5671b93ede8c558fba3d34e92e549f7f573be6cc72f

  • C:\Users\Admin\AppData\Local\Temp\._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe

    Filesize

    584KB

    MD5

    25b1052f544cdf4c57ae8b90d83df1ac

    SHA1

    2b1d50060504fd8ec7cbeea25ac4774128ca014e

    SHA256

    a9ff0dd4a5ee46d64169a605a859d69f39b135df8bcc8a20b5a2c693aae65666

    SHA512

    bc438cdcf7d7a8a74f57265f9bdc625373a6c0eb11ff9eac431ccf86abab4b6f18ee268108e1ef2053ca367c79385a159da80c7fa837cdf580e945c2e82cb584

  • C:\Users\Admin\AppData\Local\Temp\._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe

    Filesize

    584KB

    MD5

    25b1052f544cdf4c57ae8b90d83df1ac

    SHA1

    2b1d50060504fd8ec7cbeea25ac4774128ca014e

    SHA256

    a9ff0dd4a5ee46d64169a605a859d69f39b135df8bcc8a20b5a2c693aae65666

    SHA512

    bc438cdcf7d7a8a74f57265f9bdc625373a6c0eb11ff9eac431ccf86abab4b6f18ee268108e1ef2053ca367c79385a159da80c7fa837cdf580e945c2e82cb584

  • C:\Users\Admin\AppData\Local\Temp\d7xErplo.xlsm

    Filesize

    17KB

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • \ProgramData\Synaptics\Synaptics.exe

    Filesize

    751KB

    MD5

    29e1b0ddfb7e090b081d2c5b21f1f0d7

    SHA1

    2ffd30e5347bb398aa9e2901c4fb1cdac445fc4a

    SHA256

    11aa613976974b09005557a265e789da94ef8b90827f394272f8dd0905544a45

    SHA512

    c0ccf9dea3db739800ddd5e565d2b5b97fcf03345881253423d411215cf80c9ed752968116c87ec0f07ca5671b93ede8c558fba3d34e92e549f7f573be6cc72f

  • \ProgramData\Synaptics\Synaptics.exe

    Filesize

    751KB

    MD5

    29e1b0ddfb7e090b081d2c5b21f1f0d7

    SHA1

    2ffd30e5347bb398aa9e2901c4fb1cdac445fc4a

    SHA256

    11aa613976974b09005557a265e789da94ef8b90827f394272f8dd0905544a45

    SHA512

    c0ccf9dea3db739800ddd5e565d2b5b97fcf03345881253423d411215cf80c9ed752968116c87ec0f07ca5671b93ede8c558fba3d34e92e549f7f573be6cc72f

  • \Users\Admin\AppData\Local\Temp\._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe

    Filesize

    584KB

    MD5

    25b1052f544cdf4c57ae8b90d83df1ac

    SHA1

    2b1d50060504fd8ec7cbeea25ac4774128ca014e

    SHA256

    a9ff0dd4a5ee46d64169a605a859d69f39b135df8bcc8a20b5a2c693aae65666

    SHA512

    bc438cdcf7d7a8a74f57265f9bdc625373a6c0eb11ff9eac431ccf86abab4b6f18ee268108e1ef2053ca367c79385a159da80c7fa837cdf580e945c2e82cb584

  • \Users\Admin\AppData\Local\Temp\._cache_861142b5a07be90c1876072d433059f957eac326fca4935812e66842f6bdd80a.exe

    Filesize

    584KB

    MD5

    25b1052f544cdf4c57ae8b90d83df1ac

    SHA1

    2b1d50060504fd8ec7cbeea25ac4774128ca014e

    SHA256

    a9ff0dd4a5ee46d64169a605a859d69f39b135df8bcc8a20b5a2c693aae65666

    SHA512

    bc438cdcf7d7a8a74f57265f9bdc625373a6c0eb11ff9eac431ccf86abab4b6f18ee268108e1ef2053ca367c79385a159da80c7fa837cdf580e945c2e82cb584

  • memory/756-79-0x000000007217D000-0x0000000072188000-memory.dmp

    Filesize

    44KB

  • memory/756-85-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/756-75-0x0000000071191000-0x0000000071193000-memory.dmp

    Filesize

    8KB

  • memory/756-95-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/756-80-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/756-81-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/756-84-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/756-94-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/756-74-0x000000002FFA1000-0x000000002FFA4000-memory.dmp

    Filesize

    12KB

  • memory/756-76-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/756-88-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/756-89-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/756-93-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/756-90-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/756-91-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/756-92-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/1292-54-0x0000000075721000-0x0000000075723000-memory.dmp

    Filesize

    8KB

  • memory/1552-65-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB