Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2022, 05:48
Static task
static1
Behavioral task
behavioral1
Sample
bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d.exe
Resource
win10v2004-20220901-en
General
-
Target
bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d.exe
-
Size
1.5MB
-
MD5
82a0a0bd6084c5a28081310e75e7f608
-
SHA1
e5ce952e62af7efc484826c512a6f9b363b21877
-
SHA256
bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d
-
SHA512
19f0465a25d4fb885d42df63fa29191e2316a2acb35f1885d21d20d6706f1c1240a15a5dae618ee78ca98d9b5d11ce937d2f108740d0adbfd962eb28e1a9c27c
-
SSDEEP
24576:Fs50MV0ORVeA8iFZwkyIVH8oPMp4ySs50MIpNSlzqs50M0IW9KK5jNSDUXNSW1:Fs5VXh8lkHVHLMSs5IpIlzqs50h9KajX
Malware Config
Extracted
raccoon
1.7.1-hotfix
5e4db353b88c002ba6466c06437973619aad03b3
-
url4cnc
https://telete.in/brikitiki
Extracted
oski
taenaiaa.ac.ug
Extracted
azorult
http://195.245.112.115/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Raccoon Stealer payload 1 IoCs
resource yara_rule behavioral2/memory/1320-146-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon -
Executes dropped EXE 4 IoCs
pid Process 1932 FGbfttrev.exe 3568 FDvbcgfert.exe 4520 FGbfttrev.exe 3784 FDvbcgfert.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 1320 bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d.exe 1320 bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d.exe 4520 FGbfttrev.exe 4520 FGbfttrev.exe 3784 FDvbcgfert.exe 3784 FDvbcgfert.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3808 set thread context of 1320 3808 bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d.exe 86 PID 1932 set thread context of 4520 1932 FGbfttrev.exe 87 PID 3568 set thread context of 3784 3568 FDvbcgfert.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3496 3784 WerFault.exe 88 -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 3808 bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d.exe 1932 FGbfttrev.exe 3568 FDvbcgfert.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3808 bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d.exe 1932 FGbfttrev.exe 3568 FDvbcgfert.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3808 wrote to memory of 1932 3808 bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d.exe 84 PID 3808 wrote to memory of 1932 3808 bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d.exe 84 PID 3808 wrote to memory of 1932 3808 bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d.exe 84 PID 3808 wrote to memory of 3568 3808 bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d.exe 85 PID 3808 wrote to memory of 3568 3808 bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d.exe 85 PID 3808 wrote to memory of 3568 3808 bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d.exe 85 PID 3808 wrote to memory of 1320 3808 bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d.exe 86 PID 3808 wrote to memory of 1320 3808 bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d.exe 86 PID 3808 wrote to memory of 1320 3808 bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d.exe 86 PID 3808 wrote to memory of 1320 3808 bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d.exe 86 PID 1932 wrote to memory of 4520 1932 FGbfttrev.exe 87 PID 1932 wrote to memory of 4520 1932 FGbfttrev.exe 87 PID 1932 wrote to memory of 4520 1932 FGbfttrev.exe 87 PID 1932 wrote to memory of 4520 1932 FGbfttrev.exe 87 PID 3568 wrote to memory of 3784 3568 FDvbcgfert.exe 88 PID 3568 wrote to memory of 3784 3568 FDvbcgfert.exe 88 PID 3568 wrote to memory of 3784 3568 FDvbcgfert.exe 88 PID 3568 wrote to memory of 3784 3568 FDvbcgfert.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d.exe"C:\Users\Admin\AppData\Local\Temp\bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe"C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe"C:\Users\Admin\AppData\Local\Temp\FGbfttrev.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4520
-
-
-
C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe"C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe"C:\Users\Admin\AppData\Local\Temp\FDvbcgfert.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 13244⤵
- Program crash
PID:3496
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d.exe"C:\Users\Admin\AppData\Local\Temp\bad1feef0055835db4f894b4885b48d596788458bc9095d4c0af9ec36a97077d.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3784 -ip 37841⤵PID:3340
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
420KB
MD5d049fbafad4b2c9b7b87f1829bf7fbd3
SHA10f278439d7f8a2d2b59f7f2bcc170f95a73a801c
SHA25621fcc232b455d672de28438316b81c83e8b76ae49f018e4ba9cb8591aafa5a75
SHA5126fa0636060f30cdad98895e9619d8bb242fd99aea45e03e693193f0bf4f1de9d64dcb6c90126eeafe10eaf1f728ce82bcb7266fb1953042dc121af44bc9e107c
-
Filesize
420KB
MD5d049fbafad4b2c9b7b87f1829bf7fbd3
SHA10f278439d7f8a2d2b59f7f2bcc170f95a73a801c
SHA25621fcc232b455d672de28438316b81c83e8b76ae49f018e4ba9cb8591aafa5a75
SHA5126fa0636060f30cdad98895e9619d8bb242fd99aea45e03e693193f0bf4f1de9d64dcb6c90126eeafe10eaf1f728ce82bcb7266fb1953042dc121af44bc9e107c
-
Filesize
420KB
MD5d049fbafad4b2c9b7b87f1829bf7fbd3
SHA10f278439d7f8a2d2b59f7f2bcc170f95a73a801c
SHA25621fcc232b455d672de28438316b81c83e8b76ae49f018e4ba9cb8591aafa5a75
SHA5126fa0636060f30cdad98895e9619d8bb242fd99aea45e03e693193f0bf4f1de9d64dcb6c90126eeafe10eaf1f728ce82bcb7266fb1953042dc121af44bc9e107c
-
Filesize
372KB
MD54063022826bcef08b84ff49f7fe4a985
SHA164a404f2a549d3e3652366c5b1dcb974385d5172
SHA2561c41167bea31c704e8882e3bbd6af9e76b51969a6a1c3294ad8a6f911aa496d9
SHA51232e95a50153f9b5a40314791acd894851551de222dd5ed42f05067cef49fcff0da8d6ecfc2c828f0c886dc28abb570123b79f9be641ba07ddaa589093b9ea0e4
-
Filesize
372KB
MD54063022826bcef08b84ff49f7fe4a985
SHA164a404f2a549d3e3652366c5b1dcb974385d5172
SHA2561c41167bea31c704e8882e3bbd6af9e76b51969a6a1c3294ad8a6f911aa496d9
SHA51232e95a50153f9b5a40314791acd894851551de222dd5ed42f05067cef49fcff0da8d6ecfc2c828f0c886dc28abb570123b79f9be641ba07ddaa589093b9ea0e4
-
Filesize
372KB
MD54063022826bcef08b84ff49f7fe4a985
SHA164a404f2a549d3e3652366c5b1dcb974385d5172
SHA2561c41167bea31c704e8882e3bbd6af9e76b51969a6a1c3294ad8a6f911aa496d9
SHA51232e95a50153f9b5a40314791acd894851551de222dd5ed42f05067cef49fcff0da8d6ecfc2c828f0c886dc28abb570123b79f9be641ba07ddaa589093b9ea0e4