Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 03:05

General

  • Target

    0c7824fd2d1717ce83f2c7a6522047c4.exe

  • Size

    12.7MB

  • MD5

    0c7824fd2d1717ce83f2c7a6522047c4

  • SHA1

    4849c18f94170bd876a2b0653763c04ebe61cfc4

  • SHA256

    59b5b9da2fdcee0b843246228a6eace2de8e5f20a82e2ed7df64e78f657f8772

  • SHA512

    eae3dd61afae33e900953fb0bf4f1e994c4df8bf2c3d7ed3581a8e06801857373bc2cad25a518825c62b829eb61cc286169bf3cefc43f9b818ab937b24e7cf94

  • SSDEEP

    24576:FjDuKnh7YzbKBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB5:Fnh

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c7824fd2d1717ce83f2c7a6522047c4.exe
    "C:\Users\Admin\AppData\Local\Temp\0c7824fd2d1717ce83f2c7a6522047c4.exe"
    1⤵
      PID:1256
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\uykjfino\
        2⤵
          PID:1824
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ziqohjmm.exe" C:\Windows\SysWOW64\uykjfino\
          2⤵
            PID:768
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" create uykjfino binPath= "C:\Windows\SysWOW64\uykjfino\ziqohjmm.exe /d\"C:\Users\Admin\AppData\Local\Temp\0c7824fd2d1717ce83f2c7a6522047c4.exe\"" type= own start= auto DisplayName= "wifi support"
            2⤵
            • Launches sc.exe
            PID:3660
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" description uykjfino "wifi internet conection"
            2⤵
            • Launches sc.exe
            PID:2812
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" start uykjfino
            2⤵
            • Launches sc.exe
            PID:4196
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
            2⤵
            • Modifies Windows Firewall
            PID:4448
        • C:\Windows\SysWOW64\uykjfino\ziqohjmm.exe
          C:\Windows\SysWOW64\uykjfino\ziqohjmm.exe /d"C:\Users\Admin\AppData\Local\Temp\0c7824fd2d1717ce83f2c7a6522047c4.exe"
          1⤵
            PID:4752
            • C:\Windows\SysWOW64\svchost.exe
              svchost.exe
              2⤵
                PID:3992

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1256-14-0x0000000000400000-0x000000000046E000-memory.dmp

              Filesize

              440KB

            • memory/1256-1-0x00000000004E0000-0x00000000005E0000-memory.dmp

              Filesize

              1024KB

            • memory/1256-3-0x0000000000400000-0x000000000046E000-memory.dmp

              Filesize

              440KB

            • memory/1256-23-0x00000000004E0000-0x00000000005E0000-memory.dmp

              Filesize

              1024KB

            • memory/1256-2-0x00000000004C0000-0x00000000004D3000-memory.dmp

              Filesize

              76KB

            • memory/3992-15-0x0000000000330000-0x0000000000345000-memory.dmp

              Filesize

              84KB

            • memory/3992-13-0x0000000000330000-0x0000000000345000-memory.dmp

              Filesize

              84KB

            • memory/3992-9-0x0000000000330000-0x0000000000345000-memory.dmp

              Filesize

              84KB

            • memory/3992-16-0x0000000000330000-0x0000000000345000-memory.dmp

              Filesize

              84KB

            • memory/3992-25-0x0000000000330000-0x0000000000345000-memory.dmp

              Filesize

              84KB

            • memory/4752-10-0x0000000000400000-0x000000000046E000-memory.dmp

              Filesize

              440KB

            • memory/4752-17-0x0000000000400000-0x000000000046E000-memory.dmp

              Filesize

              440KB

            • memory/4752-21-0x00000000005D0000-0x00000000005E3000-memory.dmp

              Filesize

              76KB

            • memory/4752-8-0x0000000000640000-0x0000000000740000-memory.dmp

              Filesize

              1024KB