Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24/05/2022, 22:42
Static task
static1
Behavioral task
behavioral1
Sample
ac0bff3a87acefe245899d7f908a0e400d49d56b75b9ee6400ac58ea180e3e20.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ac0bff3a87acefe245899d7f908a0e400d49d56b75b9ee6400ac58ea180e3e20.exe
Resource
win10v2004-20220414-en
General
-
Target
ac0bff3a87acefe245899d7f908a0e400d49d56b75b9ee6400ac58ea180e3e20.exe
-
Size
932KB
-
MD5
2a3b3da0fbdfbcc9fafcce4708954170
-
SHA1
13e48a6734e0d1f2275ad42ad5630ca22ca130c9
-
SHA256
ac0bff3a87acefe245899d7f908a0e400d49d56b75b9ee6400ac58ea180e3e20
-
SHA512
dae7c463ed3b01b23611470aae2d6125a428471f4b75dc2e390d1ef2bab5ba069b3775b97739627ce9c63be58d7e42f909bd6e7859fdb58e1b0dbd3b104dd3b9
Malware Config
Extracted
raccoon
180d3985eb74eacf2de83c771fbf30a60f670ec0
-
url4cnc
https://telete.in/jrikitiki
Extracted
oski
levitt.ug
Extracted
azorult
http://195.245.112.115/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Raccoon Stealer Payload 1 IoCs
resource yara_rule behavioral1/memory/2016-85-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon -
Executes dropped EXE 4 IoCs
pid Process 908 KdacfF.exe.exe 1664 OpacaF.exe 1156 KdacfF.exe.exe 696 OpacaF.exe -
Loads dropped DLL 9 IoCs
pid Process 1100 ac0bff3a87acefe245899d7f908a0e400d49d56b75b9ee6400ac58ea180e3e20.exe 1100 ac0bff3a87acefe245899d7f908a0e400d49d56b75b9ee6400ac58ea180e3e20.exe 1100 ac0bff3a87acefe245899d7f908a0e400d49d56b75b9ee6400ac58ea180e3e20.exe 1100 ac0bff3a87acefe245899d7f908a0e400d49d56b75b9ee6400ac58ea180e3e20.exe 964 WerFault.exe 964 WerFault.exe 964 WerFault.exe 964 WerFault.exe 964 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 908 set thread context of 1156 908 KdacfF.exe.exe 28 PID 1100 set thread context of 2016 1100 ac0bff3a87acefe245899d7f908a0e400d49d56b75b9ee6400ac58ea180e3e20.exe 27 PID 1664 set thread context of 696 1664 OpacaF.exe 26 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 964 696 WerFault.exe 26 -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 908 KdacfF.exe.exe 1100 ac0bff3a87acefe245899d7f908a0e400d49d56b75b9ee6400ac58ea180e3e20.exe 1664 OpacaF.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1100 ac0bff3a87acefe245899d7f908a0e400d49d56b75b9ee6400ac58ea180e3e20.exe 908 KdacfF.exe.exe 1664 OpacaF.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1100 wrote to memory of 908 1100 ac0bff3a87acefe245899d7f908a0e400d49d56b75b9ee6400ac58ea180e3e20.exe 30 PID 1100 wrote to memory of 908 1100 ac0bff3a87acefe245899d7f908a0e400d49d56b75b9ee6400ac58ea180e3e20.exe 30 PID 1100 wrote to memory of 908 1100 ac0bff3a87acefe245899d7f908a0e400d49d56b75b9ee6400ac58ea180e3e20.exe 30 PID 1100 wrote to memory of 908 1100 ac0bff3a87acefe245899d7f908a0e400d49d56b75b9ee6400ac58ea180e3e20.exe 30 PID 1100 wrote to memory of 1664 1100 ac0bff3a87acefe245899d7f908a0e400d49d56b75b9ee6400ac58ea180e3e20.exe 29 PID 1100 wrote to memory of 1664 1100 ac0bff3a87acefe245899d7f908a0e400d49d56b75b9ee6400ac58ea180e3e20.exe 29 PID 1100 wrote to memory of 1664 1100 ac0bff3a87acefe245899d7f908a0e400d49d56b75b9ee6400ac58ea180e3e20.exe 29 PID 1100 wrote to memory of 1664 1100 ac0bff3a87acefe245899d7f908a0e400d49d56b75b9ee6400ac58ea180e3e20.exe 29 PID 908 wrote to memory of 1156 908 KdacfF.exe.exe 28 PID 908 wrote to memory of 1156 908 KdacfF.exe.exe 28 PID 908 wrote to memory of 1156 908 KdacfF.exe.exe 28 PID 908 wrote to memory of 1156 908 KdacfF.exe.exe 28 PID 908 wrote to memory of 1156 908 KdacfF.exe.exe 28 PID 1100 wrote to memory of 2016 1100 ac0bff3a87acefe245899d7f908a0e400d49d56b75b9ee6400ac58ea180e3e20.exe 27 PID 1100 wrote to memory of 2016 1100 ac0bff3a87acefe245899d7f908a0e400d49d56b75b9ee6400ac58ea180e3e20.exe 27 PID 1100 wrote to memory of 2016 1100 ac0bff3a87acefe245899d7f908a0e400d49d56b75b9ee6400ac58ea180e3e20.exe 27 PID 1100 wrote to memory of 2016 1100 ac0bff3a87acefe245899d7f908a0e400d49d56b75b9ee6400ac58ea180e3e20.exe 27 PID 1100 wrote to memory of 2016 1100 ac0bff3a87acefe245899d7f908a0e400d49d56b75b9ee6400ac58ea180e3e20.exe 27 PID 1664 wrote to memory of 696 1664 OpacaF.exe 26 PID 1664 wrote to memory of 696 1664 OpacaF.exe 26 PID 1664 wrote to memory of 696 1664 OpacaF.exe 26 PID 1664 wrote to memory of 696 1664 OpacaF.exe 26 PID 1664 wrote to memory of 696 1664 OpacaF.exe 26 PID 696 wrote to memory of 964 696 OpacaF.exe 37 PID 696 wrote to memory of 964 696 OpacaF.exe 37 PID 696 wrote to memory of 964 696 OpacaF.exe 37 PID 696 wrote to memory of 964 696 OpacaF.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac0bff3a87acefe245899d7f908a0e400d49d56b75b9ee6400ac58ea180e3e20.exe"C:\Users\Admin\AppData\Local\Temp\ac0bff3a87acefe245899d7f908a0e400d49d56b75b9ee6400ac58ea180e3e20.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\ac0bff3a87acefe245899d7f908a0e400d49d56b75b9ee6400ac58ea180e3e20.exe"C:\Users\Admin\AppData\Local\Temp\ac0bff3a87acefe245899d7f908a0e400d49d56b75b9ee6400ac58ea180e3e20.exe"2⤵PID:2016
-
-
C:\Users\Admin\AppData\Roaming\OpacaF.exe"C:\Users\Admin\AppData\Roaming\OpacaF.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664
-
-
C:\Users\Admin\AppData\Roaming\KdacfF.exe.exe"C:\Users\Admin\AppData\Roaming\KdacfF.exe.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:908
-
-
C:\Users\Admin\AppData\Roaming\OpacaF.exe"C:\Users\Admin\AppData\Roaming\OpacaF.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 696 -s 6322⤵
- Loads dropped DLL
- Program crash
PID:964
-
-
C:\Users\Admin\AppData\Roaming\KdacfF.exe.exe"C:\Users\Admin\AppData\Roaming\KdacfF.exe.exe"1⤵
- Executes dropped EXE
PID:1156
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5bba648d5b17554cb4556f7f839914ef4
SHA1b042cb93b7629159000d1fbbd70d3536bda47d2b
SHA256da23ff82f0cb0e77e3f38a2a6fa342fdc0ff190fbf3a6042cae8fcc73d0f2788
SHA5124d9ab7d9c6f8adec998d8924cc318a06e833fbe6230ed795e66ddc2bb26a7f028f2b18542d6f7805eda95914491e0e273cd6e4b673fa5f42431acce1887563f7
-
Filesize
204KB
MD5bba648d5b17554cb4556f7f839914ef4
SHA1b042cb93b7629159000d1fbbd70d3536bda47d2b
SHA256da23ff82f0cb0e77e3f38a2a6fa342fdc0ff190fbf3a6042cae8fcc73d0f2788
SHA5124d9ab7d9c6f8adec998d8924cc318a06e833fbe6230ed795e66ddc2bb26a7f028f2b18542d6f7805eda95914491e0e273cd6e4b673fa5f42431acce1887563f7
-
Filesize
204KB
MD5bba648d5b17554cb4556f7f839914ef4
SHA1b042cb93b7629159000d1fbbd70d3536bda47d2b
SHA256da23ff82f0cb0e77e3f38a2a6fa342fdc0ff190fbf3a6042cae8fcc73d0f2788
SHA5124d9ab7d9c6f8adec998d8924cc318a06e833fbe6230ed795e66ddc2bb26a7f028f2b18542d6f7805eda95914491e0e273cd6e4b673fa5f42431acce1887563f7
-
Filesize
248KB
MD58d6db869797db1841460c4ebd0806a84
SHA1860985f7eaebeb1fd30fd0cf67a3ffdc85b0d054
SHA2566da2e5337a76c07118f45ee40f9e98448bc5644b6ba79c709475de55fee1155e
SHA512f22c4988e177521b09227559318144c386bac7eef5a877454e283967437582600ff26c9abc2b185a82b64b4f6c324cb68287bc76c956ea71758da2ad03a33d10
-
Filesize
248KB
MD58d6db869797db1841460c4ebd0806a84
SHA1860985f7eaebeb1fd30fd0cf67a3ffdc85b0d054
SHA2566da2e5337a76c07118f45ee40f9e98448bc5644b6ba79c709475de55fee1155e
SHA512f22c4988e177521b09227559318144c386bac7eef5a877454e283967437582600ff26c9abc2b185a82b64b4f6c324cb68287bc76c956ea71758da2ad03a33d10
-
Filesize
248KB
MD58d6db869797db1841460c4ebd0806a84
SHA1860985f7eaebeb1fd30fd0cf67a3ffdc85b0d054
SHA2566da2e5337a76c07118f45ee40f9e98448bc5644b6ba79c709475de55fee1155e
SHA512f22c4988e177521b09227559318144c386bac7eef5a877454e283967437582600ff26c9abc2b185a82b64b4f6c324cb68287bc76c956ea71758da2ad03a33d10
-
Filesize
204KB
MD5bba648d5b17554cb4556f7f839914ef4
SHA1b042cb93b7629159000d1fbbd70d3536bda47d2b
SHA256da23ff82f0cb0e77e3f38a2a6fa342fdc0ff190fbf3a6042cae8fcc73d0f2788
SHA5124d9ab7d9c6f8adec998d8924cc318a06e833fbe6230ed795e66ddc2bb26a7f028f2b18542d6f7805eda95914491e0e273cd6e4b673fa5f42431acce1887563f7
-
Filesize
204KB
MD5bba648d5b17554cb4556f7f839914ef4
SHA1b042cb93b7629159000d1fbbd70d3536bda47d2b
SHA256da23ff82f0cb0e77e3f38a2a6fa342fdc0ff190fbf3a6042cae8fcc73d0f2788
SHA5124d9ab7d9c6f8adec998d8924cc318a06e833fbe6230ed795e66ddc2bb26a7f028f2b18542d6f7805eda95914491e0e273cd6e4b673fa5f42431acce1887563f7
-
Filesize
248KB
MD58d6db869797db1841460c4ebd0806a84
SHA1860985f7eaebeb1fd30fd0cf67a3ffdc85b0d054
SHA2566da2e5337a76c07118f45ee40f9e98448bc5644b6ba79c709475de55fee1155e
SHA512f22c4988e177521b09227559318144c386bac7eef5a877454e283967437582600ff26c9abc2b185a82b64b4f6c324cb68287bc76c956ea71758da2ad03a33d10
-
Filesize
248KB
MD58d6db869797db1841460c4ebd0806a84
SHA1860985f7eaebeb1fd30fd0cf67a3ffdc85b0d054
SHA2566da2e5337a76c07118f45ee40f9e98448bc5644b6ba79c709475de55fee1155e
SHA512f22c4988e177521b09227559318144c386bac7eef5a877454e283967437582600ff26c9abc2b185a82b64b4f6c324cb68287bc76c956ea71758da2ad03a33d10