Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 05:13
Static task
static1
Behavioral task
behavioral1
Sample
570cb3c8f1b4128dccabb856d58cce88.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
570cb3c8f1b4128dccabb856d58cce88.exe
Resource
win10v2004-20231222-en
General
-
Target
570cb3c8f1b4128dccabb856d58cce88.exe
-
Size
13.7MB
-
MD5
570cb3c8f1b4128dccabb856d58cce88
-
SHA1
13a367d5217658076dea133c23f77b38d72c7e7a
-
SHA256
ed12839b6d59af224c0160bb7431a252658952672b23436f0da75343ad30d9bb
-
SHA512
5ceb0ab5dda28c22dca372a537270ad386e52a7ffefba94f508141641e6c0abd73e45dd5387b1640de2575d6c11fa808cfcca2d27ae93cae75065e265fafde1d
-
SSDEEP
24576:kjDuKnh7YzbKBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBX:knh
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4528 netsh.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4264 sc.exe 3404 sc.exe 4104 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Users\Admin\AppData\Local\Temp\570cb3c8f1b4128dccabb856d58cce88.exe"C:\Users\Admin\AppData\Local\Temp\570cb3c8f1b4128dccabb856d58cce88.exe"1⤵PID:3584
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\tsezhles\2⤵PID:868
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\bbytwnew.exe" C:\Windows\SysWOW64\tsezhles\2⤵PID:3612
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create tsezhles binPath= "C:\Windows\SysWOW64\tsezhles\bbytwnew.exe /d\"C:\Users\Admin\AppData\Local\Temp\570cb3c8f1b4128dccabb856d58cce88.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:4264
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description tsezhles "wifi internet conection"2⤵
- Launches sc.exe
PID:3404
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start tsezhles2⤵
- Launches sc.exe
PID:4104
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:4528
-
-
C:\Windows\SysWOW64\tsezhles\bbytwnew.exeC:\Windows\SysWOW64\tsezhles\bbytwnew.exe /d"C:\Users\Admin\AppData\Local\Temp\570cb3c8f1b4128dccabb856d58cce88.exe"1⤵PID:2360
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:4780
-