Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 06:26
Static task
static1
Behavioral task
behavioral1
Sample
T10987654568900000.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
T10987654568900000.exe
Resource
win10v2004-20231023-en
General
-
Target
T10987654568900000.exe
-
Size
243KB
-
MD5
ab42940ac139ecb001ecb4069eaeca10
-
SHA1
cbc3519648660e4645c4845d59da3c4cd398e3b9
-
SHA256
163918e075f9f05489c3a68bdc7fef36651632a3c8b59817f3e0cbd1fb172b55
-
SHA512
3fe4041b1f08dfd5dbb195692364dc613c61480abe6a8eb83c218030e6bb1bae69b5af809cb05701028f9b09a1a79576891be807adfed2bfa5a5b04d14b362bb
-
SSDEEP
6144:AYa6pEVDnUE2PtG6HzwclJJMTayK+jzso6HPzXoQMQxLA:AYT6ItG+wcXmKChcbXNNx8
Malware Config
Extracted
originbotnet
https://mmelak.com/gate
-
add_startup
false
-
download_folder_name
4si50kud.vpv
-
hide_file_startup
false
-
startup_directory_name
pRcub
-
startup_environment_name
appdata
-
startup_installation_name
pRcub.exe
-
startup_registry_name
pRcub
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
Signatures
-
OriginBotnet
OriginBotnet is a remote access trojan written in C#.
-
Executes dropped EXE 2 IoCs
pid Process 2560 atujtxaw.exe 2032 atujtxaw.exe -
Loads dropped DLL 2 IoCs
pid Process 1244 T10987654568900000.exe 2560 atujtxaw.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2560 set thread context of 2032 2560 atujtxaw.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2032 atujtxaw.exe 2032 atujtxaw.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2560 atujtxaw.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2032 atujtxaw.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2560 1244 T10987654568900000.exe 28 PID 1244 wrote to memory of 2560 1244 T10987654568900000.exe 28 PID 1244 wrote to memory of 2560 1244 T10987654568900000.exe 28 PID 1244 wrote to memory of 2560 1244 T10987654568900000.exe 28 PID 2560 wrote to memory of 2032 2560 atujtxaw.exe 29 PID 2560 wrote to memory of 2032 2560 atujtxaw.exe 29 PID 2560 wrote to memory of 2032 2560 atujtxaw.exe 29 PID 2560 wrote to memory of 2032 2560 atujtxaw.exe 29 PID 2560 wrote to memory of 2032 2560 atujtxaw.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\T10987654568900000.exe"C:\Users\Admin\AppData\Local\Temp\T10987654568900000.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\atujtxaw.exe"C:\Users\Admin\AppData\Local\Temp\atujtxaw.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\atujtxaw.exe"C:\Users\Admin\AppData\Local\Temp\atujtxaw.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150KB
MD5b989f8cd3fd688cd1556d8c6737b06d8
SHA12aab018888aee67bb41930f79c0b24e51c0e82f0
SHA25658cdbf4e6b2ff930888bbabc1109487c7afe0327ca9fed259367e120dfdf1f7c
SHA5124f2879a90420b4066290ec8bd880b7d00a590876de91929386e667973a302fe944a33a63f432ab9b42496c3800f993a143fe101467869ed398c7a51b7086c521
-
Filesize
150KB
MD5b989f8cd3fd688cd1556d8c6737b06d8
SHA12aab018888aee67bb41930f79c0b24e51c0e82f0
SHA25658cdbf4e6b2ff930888bbabc1109487c7afe0327ca9fed259367e120dfdf1f7c
SHA5124f2879a90420b4066290ec8bd880b7d00a590876de91929386e667973a302fe944a33a63f432ab9b42496c3800f993a143fe101467869ed398c7a51b7086c521
-
Filesize
150KB
MD5b989f8cd3fd688cd1556d8c6737b06d8
SHA12aab018888aee67bb41930f79c0b24e51c0e82f0
SHA25658cdbf4e6b2ff930888bbabc1109487c7afe0327ca9fed259367e120dfdf1f7c
SHA5124f2879a90420b4066290ec8bd880b7d00a590876de91929386e667973a302fe944a33a63f432ab9b42496c3800f993a143fe101467869ed398c7a51b7086c521
-
Filesize
127KB
MD5ca6c9d418e2d3f038cd8b92eba29a27a
SHA1c1ffe291145d336b9c6a637baa6fcc7c16e96c29
SHA256efbafccca4a14520ef9af84db37b2e539a8b611e72be7f358cae583a022ef839
SHA512d85ba798e6d364fe0f4ae369b538d01a6464bdb48a091e252567b954f8ccac5d9d6df64c1dce44fe8fd23fb4996127ddbc06f8296967ec3c392cb95663bb368b
-
Filesize
150KB
MD5b989f8cd3fd688cd1556d8c6737b06d8
SHA12aab018888aee67bb41930f79c0b24e51c0e82f0
SHA25658cdbf4e6b2ff930888bbabc1109487c7afe0327ca9fed259367e120dfdf1f7c
SHA5124f2879a90420b4066290ec8bd880b7d00a590876de91929386e667973a302fe944a33a63f432ab9b42496c3800f993a143fe101467869ed398c7a51b7086c521
-
Filesize
150KB
MD5b989f8cd3fd688cd1556d8c6737b06d8
SHA12aab018888aee67bb41930f79c0b24e51c0e82f0
SHA25658cdbf4e6b2ff930888bbabc1109487c7afe0327ca9fed259367e120dfdf1f7c
SHA5124f2879a90420b4066290ec8bd880b7d00a590876de91929386e667973a302fe944a33a63f432ab9b42496c3800f993a143fe101467869ed398c7a51b7086c521