Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 10:49
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe
Resource
win10v2004-20230915-en
General
-
Target
SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe
-
Size
542KB
-
MD5
4b4b3b837140b27b5e762b8e89c70238
-
SHA1
1728ce83835298f3ef404a54c97ebaba4ff90fb8
-
SHA256
b07ba32d65a7a6c5998e443c6fa47a7ee00e4c97be7c318bd583351c73777876
-
SHA512
1894cc91df20361dd55c595bd286e4be016e809cc85803f6265294bd368dfa6b8a308ed972d01dc8831189979fe475135138e966cf3eb04d759ea7b214450029
-
SSDEEP
3072:dY3YyB0j6WYDuvgPYSeACGXN4QyluOLb:suvoJWR
Malware Config
Extracted
originbotnet
https://nice.nitrosoftwares.shop/gate
-
add_startup
false
-
download_folder_name
fjppipxw.1a3
-
hide_file_startup
false
-
startup_directory_name
zzZdP
-
startup_environment_name
appdata
-
startup_installation_name
zzZdP.exe
-
startup_registry_name
zzZdP
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
Signatures
-
OriginBotnet
OriginBotnet is a remote access trojan written in C#.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4188 set thread context of 1908 4188 SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe 99 -
Program crash 1 IoCs
pid pid_target Process procid_target 856 1908 WerFault.exe 99 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1004 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1908 SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe 1908 SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1908 SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4188 wrote to memory of 1908 4188 SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe 99 PID 4188 wrote to memory of 1908 4188 SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe 99 PID 4188 wrote to memory of 1908 4188 SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe 99 PID 4188 wrote to memory of 1908 4188 SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe 99 PID 4188 wrote to memory of 1908 4188 SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe 99 PID 4188 wrote to memory of 1908 4188 SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe 99 PID 4188 wrote to memory of 1908 4188 SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe 99 PID 4188 wrote to memory of 1908 4188 SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe 99 PID 4188 wrote to memory of 228 4188 SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe 100 PID 4188 wrote to memory of 228 4188 SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe 100 PID 4188 wrote to memory of 228 4188 SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe 100 PID 4188 wrote to memory of 4660 4188 SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe 103 PID 4188 wrote to memory of 4660 4188 SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe 103 PID 4188 wrote to memory of 4660 4188 SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe 103 PID 4188 wrote to memory of 1320 4188 SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe 102 PID 4188 wrote to memory of 1320 4188 SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe 102 PID 4188 wrote to memory of 1320 4188 SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe 102 PID 4660 wrote to memory of 1004 4660 cmd.exe 107 PID 4660 wrote to memory of 1004 4660 cmd.exe 107 PID 4660 wrote to memory of 1004 4660 cmd.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 8083⤵
- Program crash
PID:856
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\svchost"2⤵PID:228
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.5427.26591.exe" "C:\Users\Admin\AppData\Roaming\svchost\svchost.exe"2⤵PID:1320
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\svchost\svchost.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\svchost\svchost.exe'" /f3⤵
- Creates scheduled task(s)
PID:1004
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1908 -ip 19081⤵PID:4196