Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
189s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 15:35
Static task
static1
Behavioral task
behavioral1
Sample
34bff3c86bab235df8de3120cbbfe1fc20f0095ba672a8e0b6835bead54bffa1.exe
Resource
win7-20220901-en
General
-
Target
34bff3c86bab235df8de3120cbbfe1fc20f0095ba672a8e0b6835bead54bffa1.exe
-
Size
320KB
-
MD5
050bfe6233ad8f88876f37f07e781206
-
SHA1
3da936628ef3f233d033aa9a71b77d36e4cf6253
-
SHA256
34bff3c86bab235df8de3120cbbfe1fc20f0095ba672a8e0b6835bead54bffa1
-
SHA512
e5de15eda37710b031537378d310d92a0fb06d3b82d041c839be891251a189ef126f9928edf0f596e649f68b478d4d034da4c6b87a7790638686fc41b1b2544d
-
SSDEEP
6144:EbYdvk4qmBurvEwmnGW6Du7lu6wj31EqsD0dW8WqUTJjh6hVu7zbUuiPb:EEdc9H8fnGW6DuxNc31EGoTr6hVYiPb
Malware Config
Extracted
cybergate
2.7 Beta 02
vítima
teamlime.no-ip.biz:81
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
sockc.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
título da mensagem
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\install\\sockc.exe" 1.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\install\\sockc.exe" 1.exe -
Executes dropped EXE 3 IoCs
pid Process 4824 1.exe 2540 1.exe 4572 sockc.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{7UP5O63E-00R1-MP7U-D5W2-1CP2S3USH5HU} 1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7UP5O63E-00R1-MP7U-D5W2-1CP2S3USH5HU}\StubPath = "C:\\Windows\\install\\sockc.exe Restart" 1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{7UP5O63E-00R1-MP7U-D5W2-1CP2S3USH5HU} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7UP5O63E-00R1-MP7U-D5W2-1CP2S3USH5HU}\StubPath = "C:\\Windows\\install\\sockc.exe" explorer.exe -
resource yara_rule behavioral2/files/0x0006000000022e47-133.dat upx behavioral2/files/0x0006000000022e47-134.dat upx behavioral2/memory/4824-135-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4824-137-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral2/memory/4824-142-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4824-143-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/memory/4112-146-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/files/0x0006000000022e49-148.dat upx behavioral2/memory/4112-149-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/memory/4824-151-0x00000000240F0000-0x0000000024152000-memory.dmp upx behavioral2/files/0x0006000000022e47-156.dat upx behavioral2/memory/4824-157-0x0000000024160000-0x00000000241C2000-memory.dmp upx behavioral2/memory/2540-160-0x0000000024160000-0x00000000241C2000-memory.dmp upx behavioral2/memory/2540-162-0x0000000024160000-0x00000000241C2000-memory.dmp upx behavioral2/memory/4824-161-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/files/0x0006000000022e49-164.dat upx behavioral2/memory/4572-165-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/2540-166-0x0000000024160000-0x00000000241C2000-memory.dmp upx -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 34bff3c86bab235df8de3120cbbfe1fc20f0095ba672a8e0b6835bead54bffa1.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 1.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\install\\sockc.exe" 1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\install\\sockc.exe" 1.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run 1.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\install\sockc.exe 1.exe File opened for modification C:\Windows\install\sockc.exe 1.exe File opened for modification C:\Windows\install\sockc.exe 1.exe File opened for modification C:\Windows\install\ 1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 5116 4572 WerFault.exe 85 -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4824 1.exe 4824 1.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2540 1.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2540 1.exe Token: SeDebugPrivilege 2540 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4824 1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3128 wrote to memory of 4824 3128 34bff3c86bab235df8de3120cbbfe1fc20f0095ba672a8e0b6835bead54bffa1.exe 81 PID 3128 wrote to memory of 4824 3128 34bff3c86bab235df8de3120cbbfe1fc20f0095ba672a8e0b6835bead54bffa1.exe 81 PID 3128 wrote to memory of 4824 3128 34bff3c86bab235df8de3120cbbfe1fc20f0095ba672a8e0b6835bead54bffa1.exe 81 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54 PID 4824 wrote to memory of 2832 4824 1.exe 54
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\34bff3c86bab235df8de3120cbbfe1fc20f0095ba672a8e0b6835bead54bffa1.exe"C:\Users\Admin\AppData\Local\Temp\34bff3c86bab235df8de3120cbbfe1fc20f0095ba672a8e0b6835bead54bffa1.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Roaming\1.exe"C:\Users\Admin\AppData\Roaming\1.exe"3⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Modifies Installed Components in the registry
PID:4112
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:3240
-
-
C:\Users\Admin\AppData\Roaming\1.exe"C:\Users\Admin\AppData\Roaming\1.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2540 -
C:\Windows\install\sockc.exe"C:\Windows\install\sockc.exe"5⤵
- Executes dropped EXE
PID:4572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 5646⤵
- Program crash
PID:5116
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4572 -ip 45721⤵PID:1524
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230KB
MD55b3a40045f0e005effce2a2e528fbc22
SHA109cd78f62e1550279e5c28a17540c7aefdc33f25
SHA256f0c7a329596c375bcb1849ac79124a5bd4b72e7cd52b79ab74edcf2d850e46e5
SHA51257633089b7cb6b48c35f317827b840c5f6e0fbbc2e60afee6fdcdf38293569900e232baef2cbbd8ff4edf6f1a34c7c4817533b29e2ca7af346e781a8eecae5b4
-
Filesize
277KB
MD5eac902cb126f51ebcaa7fb486c36d0d9
SHA1e2d9b4e25aa0eaf46a7e52e5b2dded1da2a5a707
SHA2569618ed882bca42bead99d337ea0166705730aa2115cb9e622b53ffca1f82c564
SHA512a961eca4ee82b7c3eab3d7c28b73276a56741cbfe8cbe067b540f0126747b2a990034441bfb1e9e64c482cdb3f4267f641a5d6cc51fd3bb8afad476d685faf60
-
Filesize
277KB
MD5eac902cb126f51ebcaa7fb486c36d0d9
SHA1e2d9b4e25aa0eaf46a7e52e5b2dded1da2a5a707
SHA2569618ed882bca42bead99d337ea0166705730aa2115cb9e622b53ffca1f82c564
SHA512a961eca4ee82b7c3eab3d7c28b73276a56741cbfe8cbe067b540f0126747b2a990034441bfb1e9e64c482cdb3f4267f641a5d6cc51fd3bb8afad476d685faf60
-
Filesize
277KB
MD5eac902cb126f51ebcaa7fb486c36d0d9
SHA1e2d9b4e25aa0eaf46a7e52e5b2dded1da2a5a707
SHA2569618ed882bca42bead99d337ea0166705730aa2115cb9e622b53ffca1f82c564
SHA512a961eca4ee82b7c3eab3d7c28b73276a56741cbfe8cbe067b540f0126747b2a990034441bfb1e9e64c482cdb3f4267f641a5d6cc51fd3bb8afad476d685faf60
-
Filesize
277KB
MD5eac902cb126f51ebcaa7fb486c36d0d9
SHA1e2d9b4e25aa0eaf46a7e52e5b2dded1da2a5a707
SHA2569618ed882bca42bead99d337ea0166705730aa2115cb9e622b53ffca1f82c564
SHA512a961eca4ee82b7c3eab3d7c28b73276a56741cbfe8cbe067b540f0126747b2a990034441bfb1e9e64c482cdb3f4267f641a5d6cc51fd3bb8afad476d685faf60
-
Filesize
277KB
MD5eac902cb126f51ebcaa7fb486c36d0d9
SHA1e2d9b4e25aa0eaf46a7e52e5b2dded1da2a5a707
SHA2569618ed882bca42bead99d337ea0166705730aa2115cb9e622b53ffca1f82c564
SHA512a961eca4ee82b7c3eab3d7c28b73276a56741cbfe8cbe067b540f0126747b2a990034441bfb1e9e64c482cdb3f4267f641a5d6cc51fd3bb8afad476d685faf60