Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
champ.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
champ.exe
Resource
win10v2004-20230915-en
General
-
Target
champ.exe
-
Size
382KB
-
MD5
1ac6fd0301c47ecb144702fd7a9ffe22
-
SHA1
5282863ed30d9ce822657957774dd2109b07108d
-
SHA256
b48656a73f039dfc48e237f13a15133739b2f26af136b9540f038e922f98b2c0
-
SHA512
85fe94b89498d4fa62a865566bbf3e643825bd59eb6a875418f041fcf780970f2acfba18f79fd4ef94e618d714c3c31d7a803a078bbd7efeabbf0d251c7da6a1
-
SSDEEP
6144:6M2Pj8FwLjp4/8Af3Dmw2OWD07Zv7gR2z5za/7RZZ039F1VTGxVKOY31NXbxaMSW:6MAj8FwLm/SlD07Zv7ggz5G/7HZ039FY
Malware Config
Extracted
originbotnet
http://wjjiutia.com/gate
-
add_startup
true
-
download_folder_name
phjjylsh.agr
-
hide_file_startup
true
-
startup_directory_name
snuXV
-
startup_environment_name
appdata
-
startup_installation_name
snuXV.exe
-
startup_registry_name
snuXV
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
Signatures
-
OriginBotnet
OriginBotnet is a remote access trojan written in C#.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Roaming\\snuXV\\snuXV.exe" champ.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1260 set thread context of 2764 1260 champ.exe 30 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1260 champ.exe 1260 champ.exe 2764 champ.exe 2764 champ.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1260 champ.exe Token: SeDebugPrivilege 2764 champ.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1260 wrote to memory of 2764 1260 champ.exe 30 PID 1260 wrote to memory of 2764 1260 champ.exe 30 PID 1260 wrote to memory of 2764 1260 champ.exe 30 PID 1260 wrote to memory of 2764 1260 champ.exe 30 PID 1260 wrote to memory of 2764 1260 champ.exe 30 PID 1260 wrote to memory of 2764 1260 champ.exe 30 PID 1260 wrote to memory of 2764 1260 champ.exe 30 PID 1260 wrote to memory of 2764 1260 champ.exe 30 PID 1260 wrote to memory of 2764 1260 champ.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\champ.exe"C:\Users\Admin\AppData\Local\Temp\champ.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\champ.exe"C:\Users\Admin\AppData\Local\Temp\champ.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2764
-