Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 19:07
Static task
static1
Behavioral task
behavioral1
Sample
696b2374ef2ff5564406f1722f31758fb7b6bd30c3e046b628ab8126a7d06c8e.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
696b2374ef2ff5564406f1722f31758fb7b6bd30c3e046b628ab8126a7d06c8e.exe
Resource
win10v2004-20231023-en
General
-
Target
696b2374ef2ff5564406f1722f31758fb7b6bd30c3e046b628ab8126a7d06c8e.exe
-
Size
12.0MB
-
MD5
8caceb5caa0779ebb2c9767a1e0d5e80
-
SHA1
385e4b0570b66ef9ba8001f3224693cc0bfd1d54
-
SHA256
696b2374ef2ff5564406f1722f31758fb7b6bd30c3e046b628ab8126a7d06c8e
-
SHA512
a7d0064e08ffe1a73e772c04ee5121100f339ff7e8acbd39c497d18fabcbbed362dd41691f69f1898a171a04bcb2e5565fbb979f4ffb500b94e9bda53d1d77f8
-
SSDEEP
1536:IXKMn8zcQzaBCAXdEWp2xcR+R9ARBYNDW72RS1qziipd1f55iDV9V:ov0KTd3p2xcgrA4NS6jzTjyh9
Malware Config
Extracted
tofsee
103.248.137.133
59.188.74.26
115.230.124.76
111.121.193.242
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4452 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\aeubgrmr\ImagePath = "C:\\Windows\\SysWOW64\\aeubgrmr\\aobnnjrt.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\Control Panel\International\Geo\Nation 696b2374ef2ff5564406f1722f31758fb7b6bd30c3e046b628ab8126a7d06c8e.exe -
Deletes itself 1 IoCs
pid Process 380 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 3212 aobnnjrt.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3212 set thread context of 380 3212 aobnnjrt.exe 107 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4644 sc.exe 4572 sc.exe 4776 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2544 wrote to memory of 5052 2544 696b2374ef2ff5564406f1722f31758fb7b6bd30c3e046b628ab8126a7d06c8e.exe 89 PID 2544 wrote to memory of 5052 2544 696b2374ef2ff5564406f1722f31758fb7b6bd30c3e046b628ab8126a7d06c8e.exe 89 PID 2544 wrote to memory of 5052 2544 696b2374ef2ff5564406f1722f31758fb7b6bd30c3e046b628ab8126a7d06c8e.exe 89 PID 2544 wrote to memory of 1196 2544 696b2374ef2ff5564406f1722f31758fb7b6bd30c3e046b628ab8126a7d06c8e.exe 92 PID 2544 wrote to memory of 1196 2544 696b2374ef2ff5564406f1722f31758fb7b6bd30c3e046b628ab8126a7d06c8e.exe 92 PID 2544 wrote to memory of 1196 2544 696b2374ef2ff5564406f1722f31758fb7b6bd30c3e046b628ab8126a7d06c8e.exe 92 PID 2544 wrote to memory of 4644 2544 696b2374ef2ff5564406f1722f31758fb7b6bd30c3e046b628ab8126a7d06c8e.exe 95 PID 2544 wrote to memory of 4644 2544 696b2374ef2ff5564406f1722f31758fb7b6bd30c3e046b628ab8126a7d06c8e.exe 95 PID 2544 wrote to memory of 4644 2544 696b2374ef2ff5564406f1722f31758fb7b6bd30c3e046b628ab8126a7d06c8e.exe 95 PID 2544 wrote to memory of 4572 2544 696b2374ef2ff5564406f1722f31758fb7b6bd30c3e046b628ab8126a7d06c8e.exe 99 PID 2544 wrote to memory of 4572 2544 696b2374ef2ff5564406f1722f31758fb7b6bd30c3e046b628ab8126a7d06c8e.exe 99 PID 2544 wrote to memory of 4572 2544 696b2374ef2ff5564406f1722f31758fb7b6bd30c3e046b628ab8126a7d06c8e.exe 99 PID 2544 wrote to memory of 4776 2544 696b2374ef2ff5564406f1722f31758fb7b6bd30c3e046b628ab8126a7d06c8e.exe 101 PID 2544 wrote to memory of 4776 2544 696b2374ef2ff5564406f1722f31758fb7b6bd30c3e046b628ab8126a7d06c8e.exe 101 PID 2544 wrote to memory of 4776 2544 696b2374ef2ff5564406f1722f31758fb7b6bd30c3e046b628ab8126a7d06c8e.exe 101 PID 2544 wrote to memory of 4452 2544 696b2374ef2ff5564406f1722f31758fb7b6bd30c3e046b628ab8126a7d06c8e.exe 104 PID 2544 wrote to memory of 4452 2544 696b2374ef2ff5564406f1722f31758fb7b6bd30c3e046b628ab8126a7d06c8e.exe 104 PID 2544 wrote to memory of 4452 2544 696b2374ef2ff5564406f1722f31758fb7b6bd30c3e046b628ab8126a7d06c8e.exe 104 PID 3212 wrote to memory of 380 3212 aobnnjrt.exe 107 PID 3212 wrote to memory of 380 3212 aobnnjrt.exe 107 PID 3212 wrote to memory of 380 3212 aobnnjrt.exe 107 PID 3212 wrote to memory of 380 3212 aobnnjrt.exe 107 PID 3212 wrote to memory of 380 3212 aobnnjrt.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\696b2374ef2ff5564406f1722f31758fb7b6bd30c3e046b628ab8126a7d06c8e.exe"C:\Users\Admin\AppData\Local\Temp\696b2374ef2ff5564406f1722f31758fb7b6bd30c3e046b628ab8126a7d06c8e.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\aeubgrmr\2⤵PID:5052
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\aobnnjrt.exe" C:\Windows\SysWOW64\aeubgrmr\2⤵PID:1196
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create aeubgrmr binPath= "C:\Windows\SysWOW64\aeubgrmr\aobnnjrt.exe /d\"C:\Users\Admin\AppData\Local\Temp\696b2374ef2ff5564406f1722f31758fb7b6bd30c3e046b628ab8126a7d06c8e.exe\"" type= own start= auto DisplayName= "P2P Support"2⤵
- Launches sc.exe
PID:4644
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description aeubgrmr "Internet Mobile Support"2⤵
- Launches sc.exe
PID:4572
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start aeubgrmr2⤵
- Launches sc.exe
PID:4776
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:4452
-
-
C:\Windows\SysWOW64\aeubgrmr\aobnnjrt.exeC:\Windows\SysWOW64\aeubgrmr\aobnnjrt.exe /d"C:\Users\Admin\AppData\Local\Temp\696b2374ef2ff5564406f1722f31758fb7b6bd30c3e046b628ab8126a7d06c8e.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:380
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.8MB
MD525f6ea8320ca80531bca5db17875d8c2
SHA1ef3a5e47f5485f14c9d72454b5bfe2be7c4d63d9
SHA256252ea435157f2a94c59cde80de964bf1a3ebe597f36d09ecebe8542e969a59f6
SHA51243fd85c24fbc33884f8595d006a5f318740a5bcbe4bd365b34a1906ece07b2500eae736e476f6ec9568f5e634d3ee5e90ba6c1511a6d665e3d460719f8b8418c
-
Filesize
10.8MB
MD525f6ea8320ca80531bca5db17875d8c2
SHA1ef3a5e47f5485f14c9d72454b5bfe2be7c4d63d9
SHA256252ea435157f2a94c59cde80de964bf1a3ebe597f36d09ecebe8542e969a59f6
SHA51243fd85c24fbc33884f8595d006a5f318740a5bcbe4bd365b34a1906ece07b2500eae736e476f6ec9568f5e634d3ee5e90ba6c1511a6d665e3d460719f8b8418c