Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
243s -
max time network
276s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 22:39
Static task
static1
Behavioral task
behavioral1
Sample
CA3 FreeSetupFileV02 - Pa$$word 2022/SetUP.exe
Resource
win7-20220812-en
4 signatures
150 seconds
General
-
Target
CA3 FreeSetupFileV02 - Pa$$word 2022/SetUP.exe
-
Size
918.4MB
-
MD5
a488674798590aed684cdc8c2fdd16ff
-
SHA1
aae82c45080a258098cfa0fa66036c9dbbfac127
-
SHA256
c1d4d437ff34ec90c2511201a6ad6565c5ce07243fcd58b03984a49e3828229a
-
SHA512
6a8aa6d4a14219adcd4b67c05b3a5a49fe2ab26109cd68033fd6b413d459346bed4af91d657401e5d0d598b927312f491f2ddf262196e83f6be88df83b5a5c0f
-
SSDEEP
98304:49aDr969NYW68s8FXbRMZoQV9/l82s5jzpDC/YC5v3nN0M86HKAQYKIIQRbtjnIK:VDr94qBlB/kdvau7F
Malware Config
Extracted
Family
vidar
Version
55.3
Botnet
1707
C2
https://t.me/slivetalks
https://c.im/@xinibin420
Attributes
-
profile_id
1707
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3992 set thread context of 2940 3992 SetUP.exe 79 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4 SetUP.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 SetUP.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3992 wrote to memory of 2940 3992 SetUP.exe 79 PID 3992 wrote to memory of 2940 3992 SetUP.exe 79 PID 3992 wrote to memory of 2940 3992 SetUP.exe 79 PID 3992 wrote to memory of 2940 3992 SetUP.exe 79 PID 3992 wrote to memory of 2940 3992 SetUP.exe 79 PID 3992 wrote to memory of 2940 3992 SetUP.exe 79 PID 3992 wrote to memory of 2940 3992 SetUP.exe 79 PID 3992 wrote to memory of 2940 3992 SetUP.exe 79 PID 3992 wrote to memory of 2940 3992 SetUP.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\CA3 FreeSetupFileV02 - Pa$$word 2022\SetUP.exe"C:\Users\Admin\AppData\Local\Temp\CA3 FreeSetupFileV02 - Pa$$word 2022\SetUP.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\CA3 FreeSetupFileV02 - Pa$$word 2022\SetUP.exe"C:\Users\Admin\AppData\Local\Temp\CA3 FreeSetupFileV02 - Pa$$word 2022\SetUP.exe"2⤵
- Modifies system certificate store
PID:2940
-