Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
74s -
max time network
291s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
16/09/2022, 10:32
Static task
static1
Behavioral task
behavioral1
Sample
c4122524776c195199816a4e57635c7d32f15aa2e9080feb32ae0c2b05446a23.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c4122524776c195199816a4e57635c7d32f15aa2e9080feb32ae0c2b05446a23.exe
Resource
win10-20220901-en
General
-
Target
c4122524776c195199816a4e57635c7d32f15aa2e9080feb32ae0c2b05446a23.exe
-
Size
1.3MB
-
MD5
e87958faafc944de105df5d77166543f
-
SHA1
a6624993a89299038e5cda27b48f77313d02dfd5
-
SHA256
c4122524776c195199816a4e57635c7d32f15aa2e9080feb32ae0c2b05446a23
-
SHA512
56b886f4e9dcf9629242b07e46c6619d7f7ed716c9738438c4973f1c951ff5da0be51babb7d6b49f7f1555a4810c3974d9fd6a3d591992d91b9f78f32413836f
-
SSDEEP
24576:+yIOTaHGeTylZra0y3uZIy+o87vbvLBq97N/3KjLOTR8:N3aHGeu7Py+Bf87TvLA97JsD
Malware Config
Signatures
-
Detects Arechclient2 RAT 1 IoCs
Arechclient2.
resource yara_rule behavioral2/memory/536-480-0x0000000000700000-0x00000000007A6000-memory.dmp MALWARE_Win_Arechclient -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4100 created 8 4100 Secure.exe.pif 33 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" jsc.exe -
Executes dropped EXE 1 IoCs
pid Process 4100 Secure.exe.pif -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VOURxLBXVe.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VOURxLBXVe.url cmd.exe -
Loads dropped DLL 6 IoCs
pid Process 4100 Secure.exe.pif 4100 Secure.exe.pif 4100 Secure.exe.pif 4100 Secure.exe.pif 4100 Secure.exe.pif 4100 Secure.exe.pif -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c4122524776c195199816a4e57635c7d32f15aa2e9080feb32ae0c2b05446a23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c4122524776c195199816a4e57635c7d32f15aa2e9080feb32ae0c2b05446a23.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 eth0.me -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4100 set thread context of 536 4100 Secure.exe.pif 83 -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 1348 tasklist.exe 4016 tasklist.exe -
Kills process with taskkill 1 IoCs
pid Process 4292 taskkill.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 4544 PING.EXE 928 PING.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4100 Secure.exe.pif 4100 Secure.exe.pif 4100 Secure.exe.pif 4100 Secure.exe.pif 4100 Secure.exe.pif 4100 Secure.exe.pif 4100 Secure.exe.pif 4100 Secure.exe.pif 536 jsc.exe 536 jsc.exe 536 jsc.exe 536 jsc.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 4008 robocopy.exe Token: SeRestorePrivilege 4008 robocopy.exe Token: SeSecurityPrivilege 4008 robocopy.exe Token: SeTakeOwnershipPrivilege 4008 robocopy.exe Token: SeDebugPrivilege 1348 tasklist.exe Token: SeDebugPrivilege 4016 tasklist.exe Token: SeDebugPrivilege 536 jsc.exe Token: SeDebugPrivilege 4292 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4100 Secure.exe.pif 4100 Secure.exe.pif 4100 Secure.exe.pif -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4100 Secure.exe.pif 4100 Secure.exe.pif 4100 Secure.exe.pif -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2416 wrote to memory of 4008 2416 c4122524776c195199816a4e57635c7d32f15aa2e9080feb32ae0c2b05446a23.exe 66 PID 2416 wrote to memory of 4008 2416 c4122524776c195199816a4e57635c7d32f15aa2e9080feb32ae0c2b05446a23.exe 66 PID 2416 wrote to memory of 4008 2416 c4122524776c195199816a4e57635c7d32f15aa2e9080feb32ae0c2b05446a23.exe 66 PID 2416 wrote to memory of 3408 2416 c4122524776c195199816a4e57635c7d32f15aa2e9080feb32ae0c2b05446a23.exe 68 PID 2416 wrote to memory of 3408 2416 c4122524776c195199816a4e57635c7d32f15aa2e9080feb32ae0c2b05446a23.exe 68 PID 2416 wrote to memory of 3408 2416 c4122524776c195199816a4e57635c7d32f15aa2e9080feb32ae0c2b05446a23.exe 68 PID 3408 wrote to memory of 4932 3408 cmd.exe 70 PID 3408 wrote to memory of 4932 3408 cmd.exe 70 PID 3408 wrote to memory of 4932 3408 cmd.exe 70 PID 4932 wrote to memory of 1348 4932 cmd.exe 71 PID 4932 wrote to memory of 1348 4932 cmd.exe 71 PID 4932 wrote to memory of 1348 4932 cmd.exe 71 PID 4932 wrote to memory of 1128 4932 cmd.exe 72 PID 4932 wrote to memory of 1128 4932 cmd.exe 72 PID 4932 wrote to memory of 1128 4932 cmd.exe 72 PID 4932 wrote to memory of 4016 4932 cmd.exe 74 PID 4932 wrote to memory of 4016 4932 cmd.exe 74 PID 4932 wrote to memory of 4016 4932 cmd.exe 74 PID 4932 wrote to memory of 4088 4932 cmd.exe 75 PID 4932 wrote to memory of 4088 4932 cmd.exe 75 PID 4932 wrote to memory of 4088 4932 cmd.exe 75 PID 4932 wrote to memory of 3600 4932 cmd.exe 76 PID 4932 wrote to memory of 3600 4932 cmd.exe 76 PID 4932 wrote to memory of 3600 4932 cmd.exe 76 PID 4932 wrote to memory of 4100 4932 cmd.exe 77 PID 4932 wrote to memory of 4100 4932 cmd.exe 77 PID 4932 wrote to memory of 4100 4932 cmd.exe 77 PID 4932 wrote to memory of 4544 4932 cmd.exe 78 PID 4932 wrote to memory of 4544 4932 cmd.exe 78 PID 4932 wrote to memory of 4544 4932 cmd.exe 78 PID 4100 wrote to memory of 1156 4100 Secure.exe.pif 79 PID 4100 wrote to memory of 1156 4100 Secure.exe.pif 79 PID 4100 wrote to memory of 1156 4100 Secure.exe.pif 79 PID 3408 wrote to memory of 928 3408 cmd.exe 81 PID 3408 wrote to memory of 928 3408 cmd.exe 81 PID 3408 wrote to memory of 928 3408 cmd.exe 81 PID 4100 wrote to memory of 536 4100 Secure.exe.pif 83 PID 4100 wrote to memory of 536 4100 Secure.exe.pif 83 PID 4100 wrote to memory of 536 4100 Secure.exe.pif 83 PID 4100 wrote to memory of 536 4100 Secure.exe.pif 83 PID 4100 wrote to memory of 536 4100 Secure.exe.pif 83 PID 536 wrote to memory of 4292 536 jsc.exe 84 PID 536 wrote to memory of 4292 536 jsc.exe 84 PID 536 wrote to memory of 4292 536 jsc.exe 84
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\c4122524776c195199816a4e57635c7d32f15aa2e9080feb32ae0c2b05446a23.exe"C:\Users\Admin\AppData\Local\Temp\c4122524776c195199816a4e57635c7d32f15aa2e9080feb32ae0c2b05446a23.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\robocopy.exerobocopy 89273873764872637456726738462763749829384862735682793849823849728343⤵
- Suspicious use of AdjustPrivilegeToken
PID:4008
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Fold.xltm & ping -n 5 localhost3⤵
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\SysWOW64\cmd.execmd4⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq AvastUI.exe"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1348
-
-
C:\Windows\SysWOW64\find.exefind /I /N "avastui.exe"5⤵PID:1128
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq AVGUI.exe"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4016
-
-
C:\Windows\SysWOW64\find.exefind /I /N "avgui.exe"5⤵PID:4088
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^fnEMjhsMHNjDK$" Moments.xltm5⤵PID:3600
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Secure.exe.pifSecure.exe.pif v5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe6⤵
- UAC bypass
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /im chrome.exe /f7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4292
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 55⤵
- Runs ping.exe
PID:4544
-
-
-
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost4⤵
- Runs ping.exe
PID:928
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VOURxLBXVe.url" & echo URL="C:\Users\Admin\AppData\Local\Temp\CXKBMOwtux\xjofqU.vbs" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VOURxLBXVe.url"2⤵
- Drops startup file
PID:1156
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD590d8f5e3ac6018518f62e956d2880e7b
SHA10c990d51199f360b1b92b2ecf59e2fcbf271370d
SHA2562d94baac5ea323a4c8e5b85086b3d633bc0665cf519b9125e54d21f23bdca29a
SHA5126cec14f3814fe2663fdac8018c96e751f7e3dcb0352e675965a5ea608f50f48674cc271875ae1ac3a4bf7a29dbdab7447afc7c9f8dc718869b7f2f0a21678593
-
Filesize
924KB
MD5fdeac3f6ababd1a476ea5439e32c1644
SHA1567d87f642781f6928652cd7a84e08b490a3d8ba
SHA2569c1c55b4be77c21d1d1cf7976c4db12f7cb7da9651da5acb8fdaebdc2496d824
SHA5125098d26edef958b6e5428dcd83240096012449534a9cf7d35d4cf90beb1770ec729744045c10cf245dc3ea18186790032d879a899399193ddaf009b956f5539a
-
Filesize
924KB
MD56987e4cd3f256462f422326a7ef115b9
SHA171672a495b4603ecfec40a65254cb3ba8766bbe0
SHA2563e26723394ade92f8163b5643960189cb07358b0f96529a477d37176d68aa0a0
SHA5124b1d7f7ffee39a2d65504767beeddd4c3374807a93889b14e7e73db11e478492dec349aedca03ce828f21a66bb666a68d3735443f4249556e10825a4cd7dfeb4
-
Filesize
924KB
MD56987e4cd3f256462f422326a7ef115b9
SHA171672a495b4603ecfec40a65254cb3ba8766bbe0
SHA2563e26723394ade92f8163b5643960189cb07358b0f96529a477d37176d68aa0a0
SHA5124b1d7f7ffee39a2d65504767beeddd4c3374807a93889b14e7e73db11e478492dec349aedca03ce828f21a66bb666a68d3735443f4249556e10825a4cd7dfeb4
-
Filesize
1.6MB
MD54cc5098b13c4399f6ff959497462f327
SHA1676d5607891bad100eda09913e239b0b0a0024b8
SHA256621e7010c0c2e6b361cb3c2e8cce4c514c91f2fe62e211e1f0992f796bef114f
SHA512614ca78a7aaecc9bb823e644a9f581b9ee95a27023c117ad07d7479bcc7782295146ad4309fddfb159e72181b95dfb325a3162b75a12d181c9f7539e00fe3b20
-
Filesize
1.5MB
MD550741b3f2d7debf5d2bed63d88404029
SHA156210388a627b926162b36967045be06ffb1aad3
SHA256f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c
SHA512fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3
-
Filesize
1.5MB
MD550741b3f2d7debf5d2bed63d88404029
SHA156210388a627b926162b36967045be06ffb1aad3
SHA256f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c
SHA512fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3
-
Filesize
1.5MB
MD550741b3f2d7debf5d2bed63d88404029
SHA156210388a627b926162b36967045be06ffb1aad3
SHA256f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c
SHA512fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3
-
Filesize
1.5MB
MD550741b3f2d7debf5d2bed63d88404029
SHA156210388a627b926162b36967045be06ffb1aad3
SHA256f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c
SHA512fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3
-
Filesize
1.5MB
MD550741b3f2d7debf5d2bed63d88404029
SHA156210388a627b926162b36967045be06ffb1aad3
SHA256f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c
SHA512fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3
-
Filesize
1.5MB
MD550741b3f2d7debf5d2bed63d88404029
SHA156210388a627b926162b36967045be06ffb1aad3
SHA256f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c
SHA512fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3