Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
167s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 10:49
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe
Resource
win10v2004-20230915-en
General
-
Target
SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe
-
Size
542KB
-
MD5
5f9584f6c166a954bdd76b21217bf837
-
SHA1
02a3cdf937e8a7a7f7c817a72e1506984b544604
-
SHA256
9349ee0572a4968cf3270cc6d8505e314ec98706b2de10dc1417b3b6197b7c4f
-
SHA512
8e9649882acacd8f6c62fc6cb66507b5cd4aa2c165d02098d80a2c92f178463c31266582933a55093f5ab60c13179fbf652d81e83520788bbd46886946df4c3e
-
SSDEEP
1536:6WH/84RBumqgHXKrfcR8wZT5fryc+b5HfPWuMOTIiD/InRCHlTigBVrFuOL5aZc0:XEvgHKcR8wDre5Pz3zqyluOLb
Malware Config
Extracted
originbotnet
https://nitrosoftwares.shop/gate
-
add_startup
false
-
download_folder_name
jr3qf214.fmt
-
hide_file_startup
false
-
startup_directory_name
MrmassY
-
startup_environment_name
appdata
-
startup_installation_name
MrmassY.exe
-
startup_registry_name
MrmassY
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
Signatures
-
OriginBotnet
OriginBotnet is a remote access trojan written in C#.
-
Executes dropped EXE 1 IoCs
pid Process 2516 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4408 set thread context of 3612 4408 SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe 99 -
Program crash 1 IoCs
pid pid_target Process procid_target 3940 3612 WerFault.exe 99 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4664 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3612 SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe 3612 SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3612 SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4408 wrote to memory of 3612 4408 SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe 99 PID 4408 wrote to memory of 3612 4408 SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe 99 PID 4408 wrote to memory of 3612 4408 SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe 99 PID 4408 wrote to memory of 3612 4408 SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe 99 PID 4408 wrote to memory of 3612 4408 SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe 99 PID 4408 wrote to memory of 3612 4408 SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe 99 PID 4408 wrote to memory of 3612 4408 SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe 99 PID 4408 wrote to memory of 3612 4408 SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe 99 PID 4408 wrote to memory of 3748 4408 SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe 102 PID 4408 wrote to memory of 3748 4408 SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe 102 PID 4408 wrote to memory of 3748 4408 SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe 102 PID 4408 wrote to memory of 4676 4408 SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe 101 PID 4408 wrote to memory of 4676 4408 SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe 101 PID 4408 wrote to memory of 4676 4408 SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe 101 PID 4408 wrote to memory of 4692 4408 SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe 100 PID 4408 wrote to memory of 4692 4408 SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe 100 PID 4408 wrote to memory of 4692 4408 SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe 100 PID 4676 wrote to memory of 4664 4676 cmd.exe 107 PID 4676 wrote to memory of 4664 4676 cmd.exe 107 PID 4676 wrote to memory of 4664 4676 cmd.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3612 -s 8163⤵
- Program crash
PID:3940
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.8034.27212.exe" "C:\Users\Admin\AppData\Roaming\svchost\svchost.exe"2⤵PID:4692
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\svchost\svchost.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\svchost\svchost.exe'" /f3⤵
- Creates scheduled task(s)
PID:4664
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\svchost"2⤵PID:3748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3612 -ip 36121⤵PID:3900
-
C:\Users\Admin\AppData\Roaming\svchost\svchost.exeC:\Users\Admin\AppData\Roaming\svchost\svchost.exe1⤵
- Executes dropped EXE
PID:2516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
542KB
MD55f9584f6c166a954bdd76b21217bf837
SHA102a3cdf937e8a7a7f7c817a72e1506984b544604
SHA2569349ee0572a4968cf3270cc6d8505e314ec98706b2de10dc1417b3b6197b7c4f
SHA5128e9649882acacd8f6c62fc6cb66507b5cd4aa2c165d02098d80a2c92f178463c31266582933a55093f5ab60c13179fbf652d81e83520788bbd46886946df4c3e
-
Filesize
542KB
MD55f9584f6c166a954bdd76b21217bf837
SHA102a3cdf937e8a7a7f7c817a72e1506984b544604
SHA2569349ee0572a4968cf3270cc6d8505e314ec98706b2de10dc1417b3b6197b7c4f
SHA5128e9649882acacd8f6c62fc6cb66507b5cd4aa2c165d02098d80a2c92f178463c31266582933a55093f5ab60c13179fbf652d81e83520788bbd46886946df4c3e