Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/02/2023, 13:46
Static task
static1
Behavioral task
behavioral1
Sample
a95ce284875645f9a3d03d5df48b51a04f6933b2cf10a.exe
Resource
win7-20221111-en
General
-
Target
a95ce284875645f9a3d03d5df48b51a04f6933b2cf10a.exe
-
Size
5.8MB
-
MD5
d00f2fedb3b345812dbeb9931d4806b6
-
SHA1
361648d679b3c2f8957fa45c2f29fe922204f542
-
SHA256
a95ce284875645f9a3d03d5df48b51a04f6933b2cf10aff3cb0a094fb1e3f89d
-
SHA512
be65349f5f85026fe4e1892b90d7f11f3a9e39440fb821391e67c4776aa638cb6086952adb719d223180f1cc345deb6977c882141afc31baab2b47aad539bcda
-
SSDEEP
98304:omyYbPZoUnM0BznCOKDxRWxnvNWJAq6R+Yxkzi0os:fZMcu0xVWJiVp0os
Malware Config
Signatures
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/3484-154-0x0000000000400000-0x00000000004E0000-memory.dmp family_sectoprat -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" InstallUtil.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation a95ce284875645f9a3d03d5df48b51a04f6933b2cf10a.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tokikahamiq.url a95ce284875645f9a3d03d5df48b51a04f6933b2cf10a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tokikahamiq.url a95ce284875645f9a3d03d5df48b51a04f6933b2cf10a.exe -
Executes dropped EXE 1 IoCs
pid Process 996 xaroqu.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 41 eth0.me -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3300 a95ce284875645f9a3d03d5df48b51a04f6933b2cf10a.exe 3300 a95ce284875645f9a3d03d5df48b51a04f6933b2cf10a.exe 996 xaroqu.exe 996 xaroqu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 996 set thread context of 3484 996 xaroqu.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1908 PING.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3300 a95ce284875645f9a3d03d5df48b51a04f6933b2cf10a.exe 3300 a95ce284875645f9a3d03d5df48b51a04f6933b2cf10a.exe 3300 a95ce284875645f9a3d03d5df48b51a04f6933b2cf10a.exe 3300 a95ce284875645f9a3d03d5df48b51a04f6933b2cf10a.exe 3300 a95ce284875645f9a3d03d5df48b51a04f6933b2cf10a.exe 3300 a95ce284875645f9a3d03d5df48b51a04f6933b2cf10a.exe 996 xaroqu.exe 996 xaroqu.exe 996 xaroqu.exe 996 xaroqu.exe 996 xaroqu.exe 996 xaroqu.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3484 InstallUtil.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3300 wrote to memory of 996 3300 a95ce284875645f9a3d03d5df48b51a04f6933b2cf10a.exe 87 PID 3300 wrote to memory of 996 3300 a95ce284875645f9a3d03d5df48b51a04f6933b2cf10a.exe 87 PID 3300 wrote to memory of 996 3300 a95ce284875645f9a3d03d5df48b51a04f6933b2cf10a.exe 87 PID 3300 wrote to memory of 3660 3300 a95ce284875645f9a3d03d5df48b51a04f6933b2cf10a.exe 88 PID 3300 wrote to memory of 3660 3300 a95ce284875645f9a3d03d5df48b51a04f6933b2cf10a.exe 88 PID 3300 wrote to memory of 3660 3300 a95ce284875645f9a3d03d5df48b51a04f6933b2cf10a.exe 88 PID 3660 wrote to memory of 1908 3660 cmd.exe 90 PID 3660 wrote to memory of 1908 3660 cmd.exe 90 PID 3660 wrote to memory of 1908 3660 cmd.exe 90 PID 996 wrote to memory of 3484 996 xaroqu.exe 91 PID 996 wrote to memory of 3484 996 xaroqu.exe 91 PID 996 wrote to memory of 3484 996 xaroqu.exe 91 PID 996 wrote to memory of 3484 996 xaroqu.exe 91 PID 996 wrote to memory of 3484 996 xaroqu.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\a95ce284875645f9a3d03d5df48b51a04f6933b2cf10a.exe"C:\Users\Admin\AppData\Local\Temp\a95ce284875645f9a3d03d5df48b51a04f6933b2cf10a.exe"1⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\ProgramData\bitame\xaroqu.exe"C:\ProgramData\bitame\xaroqu.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- UAC bypass
- Suspicious use of AdjustPrivilegeToken
PID:3484
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c @echo off & ping 127.0.0.1 -n 5 -w 1000 > nul & del "C:\Users\Admin\AppData\Local\Temp\a95ce284875645f9a3d03d5df48b51a04f6933b2cf10a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 5 -w 10003⤵
- Runs ping.exe
PID:1908
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
374.6MB
MD509a9724757029ac1f2b2c2dc66246a5f
SHA136356e8c9fbc101513944316278bb6597927a868
SHA25633cb589660843c5c138e1d09436644e007cd87bc198a7077375885d0e5b23602
SHA51227fbd7c524812cc6f7af933bcba20dd2009aeb67350bc49987bb797971ccf6af64d8edd7c2e45f518abbbe6443b740d28a1cf2bb6155dd7e10fdb9a9974c4335
-
Filesize
372.6MB
MD5d7becde35f9774ace31fd5984244931c
SHA1d8006b3af01ba454fa3eb269477cacdfa0438a68
SHA256aa2b39b66a6257fa41be5559b72d9a85c57dd951dea02744ce6cadff66af6265
SHA5126401d72176223b2f346163cda9cdccde49e4085d8455922d9317017921e1d1e038802c31f52fef34894aeaa2ce743fb9d8e73b5c1beb0898fb37d77be3bfab72