Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1800s -
max time network
1796s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2023, 07:25
Static task
static1
Behavioral task
behavioral1
Sample
cfgtbvh.exe
Resource
win10v2004-20230220-en
General
-
Target
cfgtbvh.exe
-
Size
237KB
-
MD5
51b3cddd75069bda9deb36fd539442e2
-
SHA1
a5183c20f329a3ea3726ce2c8300b0f2654ab531
-
SHA256
f0098ef0f31aa50b097bfb3ac7e420c518a697394a0ffed54640a55045263fa9
-
SHA512
50e78682a53f0ef631e7faaf2892057b35e5895afee8d8520f2a3a49f99e239912bef67e8ebe70b099528b5a1753a06aad0675bc3dec64b9a2e7b605ced2d06c
-
SSDEEP
6144:DL3v+mWnRzxvqRYwqgft1rSVsMAdaV/BaW:D7v+myRtqRYRgX20di/F
Malware Config
Extracted
smokeloader
pub4
Extracted
smokeloader
2022
http://aapu.at/tmp/
http://poudineh.com/tmp/
http://firsttrusteedrx.ru/tmp/
http://kingpirate.ru/tmp/
Extracted
bumblebee
inst
194.15.216.247:443
23.106.215.141:443
104.168.244.96:443
51.83.255.85:443
192.119.81.86:443
Signatures
-
Detect rhadamanthys stealer shellcode 4 IoCs
resource yara_rule behavioral1/memory/4672-151-0x0000000002000000-0x000000000201C000-memory.dmp family_rhadamanthys behavioral1/memory/4672-152-0x0000000002000000-0x000000000201C000-memory.dmp family_rhadamanthys behavioral1/memory/4672-154-0x0000000002000000-0x000000000201C000-memory.dmp family_rhadamanthys behavioral1/memory/4672-161-0x0000000002000000-0x000000000201C000-memory.dmp family_rhadamanthys -
resource yara_rule behavioral1/memory/2468-172-0x000001C863160000-0x000001C8632C1000-memory.dmp win_bumblebee_auto behavioral1/memory/2468-174-0x000001C863160000-0x000001C8632C1000-memory.dmp win_bumblebee_auto behavioral1/memory/2468-175-0x000001C863160000-0x000001C8632C1000-memory.dmp win_bumblebee_auto -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 4672 CC4D.exe 2468 3693.exe 2500 gvafvhc 4060 gvafvhc 2748 gvafvhc -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2468 3693.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2332 4672 WerFault.exe 95 -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gvafvhc Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gvafvhc Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gvafvhc Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cfgtbvh.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cfgtbvh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gvafvhc Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gvafvhc Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gvafvhc Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gvafvhc Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gvafvhc Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cfgtbvh.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gvafvhc -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dllhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dllhost.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1680 cfgtbvh.exe 1680 cfgtbvh.exe 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found 3248 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3248 Process not Found -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 1680 cfgtbvh.exe 2500 gvafvhc 4060 gvafvhc 2748 gvafvhc -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeShutdownPrivilege 3248 Process not Found Token: SeCreatePagefilePrivilege 3248 Process not Found Token: SeShutdownPrivilege 3248 Process not Found Token: SeCreatePagefilePrivilege 3248 Process not Found Token: SeShutdownPrivilege 3248 Process not Found Token: SeCreatePagefilePrivilege 3248 Process not Found Token: SeShutdownPrivilege 3248 Process not Found Token: SeCreatePagefilePrivilege 3248 Process not Found Token: SeShutdownPrivilege 3248 Process not Found Token: SeCreatePagefilePrivilege 3248 Process not Found Token: SeShutdownPrivilege 3248 Process not Found Token: SeCreatePagefilePrivilege 3248 Process not Found Token: SeShutdownPrivilege 3248 Process not Found Token: SeCreatePagefilePrivilege 3248 Process not Found Token: SeShutdownPrivilege 3248 Process not Found Token: SeCreatePagefilePrivilege 3248 Process not Found Token: SeShutdownPrivilege 3248 Process not Found Token: SeCreatePagefilePrivilege 3248 Process not Found Token: SeShutdownPrivilege 3248 Process not Found Token: SeCreatePagefilePrivilege 3248 Process not Found Token: SeShutdownPrivilege 3248 Process not Found Token: SeCreatePagefilePrivilege 3248 Process not Found Token: SeShutdownPrivilege 3248 Process not Found Token: SeCreatePagefilePrivilege 3248 Process not Found Token: SeShutdownPrivilege 3248 Process not Found Token: SeCreatePagefilePrivilege 3248 Process not Found Token: SeShutdownPrivilege 3248 Process not Found Token: SeCreatePagefilePrivilege 3248 Process not Found Token: SeShutdownPrivilege 3248 Process not Found Token: SeCreatePagefilePrivilege 3248 Process not Found -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3248 wrote to memory of 4672 3248 Process not Found 95 PID 3248 wrote to memory of 4672 3248 Process not Found 95 PID 3248 wrote to memory of 4672 3248 Process not Found 95 PID 4672 wrote to memory of 1932 4672 CC4D.exe 97 PID 4672 wrote to memory of 1932 4672 CC4D.exe 97 PID 4672 wrote to memory of 1932 4672 CC4D.exe 97 PID 4672 wrote to memory of 1932 4672 CC4D.exe 97 PID 3248 wrote to memory of 2468 3248 Process not Found 102 PID 3248 wrote to memory of 2468 3248 Process not Found 102 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfgtbvh.exe"C:\Users\Admin\AppData\Local\Temp\cfgtbvh.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1680
-
C:\Users\Admin\AppData\Local\Temp\CC4D.exeC:\Users\Admin\AppData\Local\Temp\CC4D.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\system32\dllhost.exe"C:\Windows\system32\dllhost.exe"2⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- outlook_office_path
- outlook_win_path
PID:1932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4672 -s 7282⤵
- Program crash
PID:2332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4672 -ip 46721⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\3693.exeC:\Users\Admin\AppData\Local\Temp\3693.exe1⤵
- Executes dropped EXE
- Suspicious use of NtCreateThreadExHideFromDebugger
PID:2468
-
C:\Users\Admin\AppData\Roaming\gvafvhcC:\Users\Admin\AppData\Roaming\gvafvhc1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2500
-
C:\Users\Admin\AppData\Roaming\gvafvhcC:\Users\Admin\AppData\Roaming\gvafvhc1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4060
-
C:\Users\Admin\AppData\Roaming\gvafvhcC:\Users\Admin\AppData\Roaming\gvafvhc1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2748
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD51eb4bd24c3d02a38a333eaeee4b9b49d
SHA13c85c03088b07bfcbbe969af0cbdde9bd26e69d8
SHA25635f2ec59313bbe5b78e4b043f06f8961f6f3e77b870544d15ee7cc1fca987d8c
SHA5123581aa74972f21bf22191181a9db68ec6db1071b153ee4a40519129b34c6be3cdbe32e3a65d4ad64f20bd224fb2d2f91e72139b250b69a0c80456f80a3c2cff5
-
Filesize
1.6MB
MD51eb4bd24c3d02a38a333eaeee4b9b49d
SHA13c85c03088b07bfcbbe969af0cbdde9bd26e69d8
SHA25635f2ec59313bbe5b78e4b043f06f8961f6f3e77b870544d15ee7cc1fca987d8c
SHA5123581aa74972f21bf22191181a9db68ec6db1071b153ee4a40519129b34c6be3cdbe32e3a65d4ad64f20bd224fb2d2f91e72139b250b69a0c80456f80a3c2cff5
-
Filesize
273KB
MD59cd6224b6ba301601ffe3fee81c5e287
SHA17579d8bc7349029572179f446aa0851bcdd99a97
SHA2564ae5240ae6b5a8d2cdea30394ed31319bbd703e906b6ecdf009769d8defcd9d8
SHA5126d50408beaef63dc159be894c38572b54fe92a78c41ea1eb6556e34af2332a391e5d5a8c8d1264656e4e4af06c84c9e3c093d6d232795ccdd6a735f4c10cb758
-
Filesize
273KB
MD59cd6224b6ba301601ffe3fee81c5e287
SHA17579d8bc7349029572179f446aa0851bcdd99a97
SHA2564ae5240ae6b5a8d2cdea30394ed31319bbd703e906b6ecdf009769d8defcd9d8
SHA5126d50408beaef63dc159be894c38572b54fe92a78c41ea1eb6556e34af2332a391e5d5a8c8d1264656e4e4af06c84c9e3c093d6d232795ccdd6a735f4c10cb758
-
Filesize
237KB
MD551b3cddd75069bda9deb36fd539442e2
SHA1a5183c20f329a3ea3726ce2c8300b0f2654ab531
SHA256f0098ef0f31aa50b097bfb3ac7e420c518a697394a0ffed54640a55045263fa9
SHA51250e78682a53f0ef631e7faaf2892057b35e5895afee8d8520f2a3a49f99e239912bef67e8ebe70b099528b5a1753a06aad0675bc3dec64b9a2e7b605ced2d06c
-
Filesize
237KB
MD551b3cddd75069bda9deb36fd539442e2
SHA1a5183c20f329a3ea3726ce2c8300b0f2654ab531
SHA256f0098ef0f31aa50b097bfb3ac7e420c518a697394a0ffed54640a55045263fa9
SHA51250e78682a53f0ef631e7faaf2892057b35e5895afee8d8520f2a3a49f99e239912bef67e8ebe70b099528b5a1753a06aad0675bc3dec64b9a2e7b605ced2d06c
-
Filesize
237KB
MD551b3cddd75069bda9deb36fd539442e2
SHA1a5183c20f329a3ea3726ce2c8300b0f2654ab531
SHA256f0098ef0f31aa50b097bfb3ac7e420c518a697394a0ffed54640a55045263fa9
SHA51250e78682a53f0ef631e7faaf2892057b35e5895afee8d8520f2a3a49f99e239912bef67e8ebe70b099528b5a1753a06aad0675bc3dec64b9a2e7b605ced2d06c
-
Filesize
237KB
MD551b3cddd75069bda9deb36fd539442e2
SHA1a5183c20f329a3ea3726ce2c8300b0f2654ab531
SHA256f0098ef0f31aa50b097bfb3ac7e420c518a697394a0ffed54640a55045263fa9
SHA51250e78682a53f0ef631e7faaf2892057b35e5895afee8d8520f2a3a49f99e239912bef67e8ebe70b099528b5a1753a06aad0675bc3dec64b9a2e7b605ced2d06c