Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 01:56
Static task
static1
Behavioral task
behavioral1
Sample
docrw20230914.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
docrw20230914.exe
Resource
win10v2004-20230915-en
General
-
Target
docrw20230914.exe
-
Size
699KB
-
MD5
e6f17e5433dcdd4ca662c8dbf32639db
-
SHA1
0ce524d7110e18fba4d45623813bc85bc52c3b67
-
SHA256
0c45c035d97ecfff230ad1e43e48fede7dfa12de465bedb69b75884e16bf2113
-
SHA512
6ac3b42fac3733ea486354baaf47294eef45021835c7c42a4a5ca95f0ccbdd71cddeccfdee2c1b6d4d9e8ea021f8660ca116f7fed3f58dc7fadcc5205be35aed
-
SSDEEP
12288:xP1loubhci5aaVy8vgwxMKhNxnZb7zmgMIQSGTFe8DKrUO:V1losyGaen9MkHZb7vQJTFen
Malware Config
Extracted
originbotnet
https://nitrosoftwares.shop/gate
-
add_startup
false
-
download_folder_name
jr3qf214.fmt
-
hide_file_startup
false
-
startup_directory_name
MrmassY
-
startup_environment_name
appdata
-
startup_installation_name
MrmassY.exe
-
startup_registry_name
MrmassY
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
Signatures
-
OriginBotnet
OriginBotnet is a remote access trojan written in C#.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3388 set thread context of 4100 3388 docrw20230914.exe 99 -
Program crash 1 IoCs
pid pid_target Process procid_target 2632 4100 WerFault.exe 99 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4100 docrw20230914.exe 4100 docrw20230914.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4100 docrw20230914.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3388 wrote to memory of 4100 3388 docrw20230914.exe 99 PID 3388 wrote to memory of 4100 3388 docrw20230914.exe 99 PID 3388 wrote to memory of 4100 3388 docrw20230914.exe 99 PID 3388 wrote to memory of 4100 3388 docrw20230914.exe 99 PID 3388 wrote to memory of 4100 3388 docrw20230914.exe 99 PID 3388 wrote to memory of 4100 3388 docrw20230914.exe 99 PID 3388 wrote to memory of 4100 3388 docrw20230914.exe 99 PID 3388 wrote to memory of 4100 3388 docrw20230914.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\docrw20230914.exe"C:\Users\Admin\AppData\Local\Temp\docrw20230914.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\docrw20230914.exe"C:\Users\Admin\AppData\Local\Temp\docrw20230914.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 13843⤵
- Program crash
PID:2632
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4100 -ip 41001⤵PID:2720