Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
863s -
max time network
1219s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
31/10/2022, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
evwvwet543yc0.dll
Resource
win7-20220901-en
10 signatures
1200 seconds
General
-
Target
evwvwet543yc0.dll
-
Size
2.8MB
-
MD5
63a316eba32ceedb0a6f2c02499fee0d
-
SHA1
c95091727e0b80206bc08fe6f5419f7fa0b6a719
-
SHA256
5c15151a29fab8a2d58fa55aa6c88a58a456b0a6bc959b843e9ceb2295c61885
-
SHA512
9d17db2d937cffee92c1897e26db01bc1d41262f4aae4fcb6746ddc897a00e901686dab876a3fa48a682efcd617b05dfaa0522f066f6dfca7a54fbda921917ac
-
SSDEEP
49152:AY1LnDpAyAelZQtflyyyuSXfiCC8M7vZ+x1BxkJj52DTUFPRAK8hVgi:3pDAZlyyyuSXfiCC8M7vZ+x1BxkJjKUq
Malware Config
Extracted
Family
bumblebee
Botnet
2809
C2
224.56.150.48:443
209.141.41.150:443
192.119.68.104:443
51.83.249.124:443
rc4.plain
Signatures
-
Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
pid Process 2932 rundll32.exe 4512 rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4036 2932 WerFault.exe 71 2988 4512 WerFault.exe 76 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 520 wrote to memory of 2932 520 cmd.exe 71 PID 520 wrote to memory of 2932 520 cmd.exe 71 PID 4600 wrote to memory of 4512 4600 cmd.exe 76 PID 4600 wrote to memory of 4512 4600 cmd.exe 76
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\evwvwet543yc0.dll,#11⤵PID:4616
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\system32\rundll32.exerundll32 evwvwet543yc0.dll,#32⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:2932 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2932 -s 763⤵
- Program crash
PID:4036
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\system32\rundll32.exerundll32 evwvwet543yc0.dll,#32⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:4512 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4512 -s 1003⤵
- Program crash
PID:2988
-
-