Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/02/2023, 07:01
Static task
static1
Behavioral task
behavioral1
Sample
._cache_b6b7ba4c887c5bbacb8643b62f29b951.exe
Resource
win7-20220812-en
General
-
Target
._cache_b6b7ba4c887c5bbacb8643b62f29b951.exe
-
Size
1.8MB
-
MD5
afe2eeb9c39fe0aaf3b98b1a570fd77c
-
SHA1
ca42099bfeafd1a5c79180e0b406679eb5cae47d
-
SHA256
cb751923695b52f799d7c20ca696069059187258021c9d8f8035e83180e8087d
-
SHA512
0a15dc447ab97a2129c3d4fddac9b1f6473e5108275053961baf0f4a36a78b50583ee675a1753a300ac9a90cf01447353ca69bba845aa7a78294b1e381969243
-
SSDEEP
49152:t5+hFlevtNUzY7WawmPzyxMAqpDHd5h419Pu0hO/k5:t5aFlevtw9uzCMdBf4xVhOY
Malware Config
Extracted
cryptbot
abruszgy25.top
-
payload_url
http://petroscd11.top/download.php?file=lv.exe
Signatures
-
CryptBot payload 2 IoCs
resource yara_rule behavioral2/memory/4476-148-0x0000000000200000-0x0000000000633000-memory.dmp family_cryptbot behavioral2/memory/4476-149-0x0000000000200000-0x0000000000633000-memory.dmp family_cryptbot -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation ._cache_b6b7ba4c887c5bbacb8643b62f29b951.exe -
Executes dropped EXE 2 IoCs
pid Process 2164 Negli.com 4476 Negli.com -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Negli.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Negli.com -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4100 PING.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4476 Negli.com 4476 Negli.com -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4856 wrote to memory of 4124 4856 ._cache_b6b7ba4c887c5bbacb8643b62f29b951.exe 81 PID 4856 wrote to memory of 4124 4856 ._cache_b6b7ba4c887c5bbacb8643b62f29b951.exe 81 PID 4856 wrote to memory of 4124 4856 ._cache_b6b7ba4c887c5bbacb8643b62f29b951.exe 81 PID 4856 wrote to memory of 4884 4856 ._cache_b6b7ba4c887c5bbacb8643b62f29b951.exe 83 PID 4856 wrote to memory of 4884 4856 ._cache_b6b7ba4c887c5bbacb8643b62f29b951.exe 83 PID 4856 wrote to memory of 4884 4856 ._cache_b6b7ba4c887c5bbacb8643b62f29b951.exe 83 PID 4884 wrote to memory of 4300 4884 cmd.exe 85 PID 4884 wrote to memory of 4300 4884 cmd.exe 85 PID 4884 wrote to memory of 4300 4884 cmd.exe 85 PID 4300 wrote to memory of 3136 4300 cmd.exe 86 PID 4300 wrote to memory of 3136 4300 cmd.exe 86 PID 4300 wrote to memory of 3136 4300 cmd.exe 86 PID 4300 wrote to memory of 2164 4300 cmd.exe 87 PID 4300 wrote to memory of 2164 4300 cmd.exe 87 PID 4300 wrote to memory of 2164 4300 cmd.exe 87 PID 4300 wrote to memory of 4100 4300 cmd.exe 88 PID 4300 wrote to memory of 4100 4300 cmd.exe 88 PID 4300 wrote to memory of 4100 4300 cmd.exe 88 PID 2164 wrote to memory of 4476 2164 Negli.com 89 PID 2164 wrote to memory of 4476 2164 Negli.com 89 PID 2164 wrote to memory of 4476 2164 Negli.com 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\._cache_b6b7ba4c887c5bbacb8643b62f29b951.exe"C:\Users\Admin\AppData\Local\Temp\._cache_b6b7ba4c887c5bbacb8643b62f29b951.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo XtGExU2⤵PID:4124
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Altezza.mpeg2⤵
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^lAbNkOShiVjJRNtfJIzMjyQMVxTwAkDFIexxkoUhUizBsGTCjfGOnbgtJLRQUQNVsHqPaJtBNyRtMfcfBsOlFPukNdKmdratxbpJFrpDlyqzFlaxdCfD$" Seguente.mp34⤵PID:3136
-
-
C:\Users\Admin\AppData\Local\Temp\LuUMABtmHExLGJjQG\Negli.comNegli.com Uno.pptx4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\LuUMABtmHExLGJjQG\Negli.comC:\Users\Admin\AppData\Local\Temp\LuUMABtmHExLGJjQG\Negli.com Uno.pptx5⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
PID:4476
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 304⤵
- Runs ping.exe
PID:4100
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD52a844be752dd3f88eb8fde52cc17eb93
SHA116566b1e6de6c561163bd70a78d0b5e3e80ecd8c
SHA256ab34e814b57599376c9fecdc4204c82673bb2b17d5fe9d1f4d3de3e1eecf08c1
SHA512a98fcdb9be93342539cd6c356f89ffaba14d6b9c8ad3b4436897ea4bbf5c2f373e7708d32edf216a5892849c1946f18767b0142c234a5036d319d601bcfd293c
-
Filesize
921KB
MD578ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
Filesize
921KB
MD578ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
Filesize
888KB
MD53e4a7482443e38011d4aaa0d47df63a4
SHA18357eedda93630634d0b06398354ac17a2f7e68f
SHA256fb5be8cdcdad4a8b8879fbe39b7b6547219e1c0b1e087ff49c5c82b20cab74e9
SHA512e12413b37ef61090d5a542d9ad85db6383d8a3c437d0e7e2582fcb4944e9c47f7e126ffc4fceeedfa60eb47802668874cb5317f3f9b22ee9849650eb1bc6825e
-
Filesize
921KB
MD5dff7a2df04830caeefb707eb16347978
SHA1b246254d21482c383097d0dc5a0073d64a7b99b7
SHA256421b0ef0e2d2a87b9afe1bcd7b3a3ca0eda311ee4a3a93c4d72e7c18acf5c490
SHA51296ae714f2be8166f19ff3a3c9a250e0b12b0fa02b29e0d1f305e74e3f8d88e0f7c9a9b63a37add2caab72cf28c42cb1126098ce91348ca5de86d8a7e9a8611a3
-
Filesize
696KB
MD5a23ec366a0caa4e8a15e9c890076ac93
SHA1a4d0cedc500237fcde5e616931ab10e5909cd789
SHA2568872a4b96f95e298893f6242c993ad18d59d8ecdbb5addec72ce3c94caf0d9c5
SHA512f63ccd65ffb1a23d2cebff458a6d4c7c706f8673f74c97d92d46676546b99780d92c778b7ff070d88caffd9ab4d47df69e279e8223be5b2f6802aad7c43ad286