Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10ABO.exe
windows7-x64
8ABO.exe
windows10-2004-x64
8ABO.exe
windows7-x64
8ABO.exe
windows10-2004-x64
10Adobe.exe
windows7-x64
8Adobe.exe
windows10-2004-x64
10CGserver.exe
windows7-x64
10CGserver.exe
windows10-2004-x64
10COON.exe
windows7-x64
10COON.exe
windows10-2004-x64
8FFA.exe
windows7-x64
10FFA.exe
windows10-2004-x64
8FIle Rustyz bot.exe
windows7-x64
8FIle Rustyz bot.exe
windows10-2004-x64
8FrostBot v1.exe
windows7-x64
10FrostBot v1.exe
windows10-2004-x64
10Google.exe
windows7-x64
10Google.exe
windows10-2004-x64
10MORPH_9359...79.exe
windows7-x64
3MORPH_9359...79.exe
windows10-2004-x64
3Mycrypt.exe
windows7-x64
8Mycrypt.exe
windows10-2004-x64
10PortChecker.exe
windows7-x64
8PortChecker.exe
windows10-2004-x64
10R.exe
windows7-x64
10R.exe
windows10-2004-x64
10RSBOT.exe
windows7-x64
RSBOT.exe
windows10-2004-x64
Rustyz.exe
windows7-x64
8Rustyz.exe
windows10-2004-x64
10Rustyzzbot.exe
windows7-x64
8Rustyzzbot.exe
windows10-2004-x64
1Analysis
-
max time kernel
0s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 07:05
Behavioral task
behavioral1
Sample
ABO.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ABO.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
ABO.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
ABO.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Adobe.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Adobe.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
CGserver.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
CGserver.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
COON.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
COON.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
FFA.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
FFA.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
FIle Rustyz bot.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
FIle Rustyz bot.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
FrostBot v1.exe
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
FrostBot v1.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
Google.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
Google.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
MORPH_93594C2E8879.exe
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
MORPH_93594C2E8879.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral21
Sample
Mycrypt.exe
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
Mycrypt.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
PortChecker.exe
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
PortChecker.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
R.exe
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
R.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral27
Sample
RSBOT.exe
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
RSBOT.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
Rustyz.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
Rustyz.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
Rustyzzbot.exe
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
Rustyzzbot.exe
Resource
win10v2004-20231222-en
General
-
Target
FFA.exe
-
Size
652KB
-
MD5
7589fe75123045e6f30eab511e55bc3a
-
SHA1
34e473bb2385e923feccb4aa5375a56924893a31
-
SHA256
747f15512f3b04420d0bc2264192fb1f8a4cdf81993afb191ae835d86b650cd8
-
SHA512
fba1f53b6c2e8954e906ba2343e2b1a9f0f88ae69df0eab567af3ece4bc93d6b5291cc55e0aaf2b3d7e7d4e5457ac95eaacbd027425e3fff9df467e28627adcf
-
SSDEEP
12288:sRvnERMs3azRIMbcr6ZwchpZJmdhBPrx4PkAd5EBgv5gBjl:s5nm3fe5bMprx4c05EBgxgb
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1548 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation FFA.exe -
Executes dropped EXE 2 IoCs
pid Process 3972 gabberoneshay.exe 736 server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3972 gabberoneshay.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1748 wrote to memory of 3972 1748 FFA.exe 29 PID 1748 wrote to memory of 3972 1748 FFA.exe 29 PID 1748 wrote to memory of 3972 1748 FFA.exe 29 PID 1748 wrote to memory of 736 1748 FFA.exe 28 PID 1748 wrote to memory of 736 1748 FFA.exe 28 PID 1748 wrote to memory of 736 1748 FFA.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\FFA.exe"C:\Users\Admin\AppData\Local\Temp\FFA.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Executes dropped EXE
PID:736
-
-
C:\Users\Admin\AppData\Local\Temp\gabberoneshay.exe"C:\Users\Admin\AppData\Local\Temp\gabberoneshay.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3972 -
C:\Users\Admin\AppData\Roaming\spoolsv.exe/d C:\Users\Admin\AppData\Local\Temp\gabberoneshay.exe3⤵PID:3996
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\spoolsv.exe" CityScape Enable3⤵
- Modifies Windows Firewall
PID:1548
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD508dff461780f398b24c1cf2e05cca282
SHA1e25ab2aef86e8f04a999c558885c04695195fd7c
SHA256542b205ce9d2521234751f85e0069f63102386dedacd8e008811862be6dba90c
SHA5124a8f38eb7347d24dd2a7ab2e975151325d668aa4a3562738f81617c9bfc13e6ba3b514fd4644448f2cdc92abe098499558249fb5a9a88f0673341d001aee663a
-
Filesize
47KB
MD5271e737e14afa557a2bfd66400456360
SHA13b0c96ed2baeec8cbd16246882f62b5f24a940c2
SHA25678b8f7fb6255586c71fffad468840d5c6d65f3ece7b78818dcdf942c6b69f53b
SHA512f0f389c72bc356200fbe42d213a0aff6c58af400c0286caab1e88b54505be945e823dd457de366d2e642c229837c7b522a6dd5f3063c642f26ec6df22b96d4fb
-
Filesize
51KB
MD5a1053244845e2ddb37cb70fd73e0aaf4
SHA1ef8a2df5b425d06305b0a3bd9688502c98225d3f
SHA256514748b7ddd43595ed5b55727bb1d4eb1f51930c602a81b5df2e602c4f4e577d
SHA512d910a9466855c6b8fc7ece58712ffa695718de99761421fb9768613037cf665fccbb02b1fb1ca08c654883a583e57cb21248dccb05caae0028b0aac497c4b818
-
Filesize
31KB
MD5f630e1933e6d7c5e40cd7f2deb32119c
SHA1ed19cf8905f3fccfd0f0bf4caea421efd6555413
SHA2566399a56d336a4749a47b92655025b4de4860efa232ea3d70c51a6a8ff96c8fe9
SHA512e4a543cc0393fb60553259a11980062b9561beb19c893e9664b574a453c54f4ca246cd62a78c49676ff984197262a808f15cddb7212e9a7c38fefcfeaa805e25
-
Filesize
57KB
MD5f50d42d0a24c166e0fbcd5386b20ab61
SHA13ca2af5d8aa863d3dd83fba92bd5f8d42a0427ec
SHA25678c0759d27399c5f4d1b646a3dc6827f32c6945171877e273c211eb4b7493b4f
SHA51288e4643673d8d51ac6804e1792ae130b4cd9ff94bd65008a0182e68fb72924d455d22c83ca508801d3fdfe5a7465426b6623cb01f71dc2d54ed8a1d8510a7760
-
Filesize
19KB
MD5903521a64fd0fb65aa933901fec12f2d
SHA1b0affc70b17e31cc34ce5fda1a3ce0bfdee2f058
SHA2565daf035e2d6d3b62c1d68624612c9383272fd4a3363c6462ae9440ec06cb22ba
SHA512f85e9cd035d61b6deb39de079103da405bda141a6c4cf6b8b2b6afb053df317dfed77dac6e9296d7369ee4d56fc3e4db0e77714cc8c7ca80d75ccd6ff2f684ce
-
Filesize
39KB
MD5560d988d6371a692d48670a652b16f10
SHA17ad5c1f0f05ef1ba8291b0554e776a066015ef3d
SHA25625a6cde14ee6a6dd49c41b246b6de26c70ef82109b421bdbca8661af308e0b7a
SHA51278352c128e8f78b2e566062f8e3e73e27e606d0a5a301264c42b59d6b9a3b2856e927d74ed3a9ba57e6fef72376db10159dc00e76b102a8cf7e72292b4070729
-
Filesize
89KB
MD50e0a28d69ce5ab108a1b6944fd57d773
SHA15dc867c7016582ebc2c1a12472b0fca3f2d1b2d4
SHA2565592a1aaf424c829b42f869d1302ec485bfe4e8e27663c54c82d04ccf7eacc9b
SHA512810da7630b7d1154b2703723c0df1ff32b6e2f224d8752090db2481ad2058f18e705b93a91f20a89cc5444012cc51367369fd506808f4caeb56b1173b6911dc1
-
Filesize
128KB
MD59565b3b763601164d276ec2011c90b38
SHA16b9428b9874657d199c83b497411035f4943495d
SHA256671f261902715279b9e3143c01d5e5c73fd32ba9366d648992144d6d3c5439c4
SHA512bb7d24ca4643ba3ab9a0ac646f4ea35a5f7ee8ae417bdd9c7ca3620c3c7a22e97399b87b245bee1a616fcab8d411231a14b7d1b38c7fde3513a6fd0504aeecb9