Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/01/2024, 00:29

General

  • Target

    setup_installer.exe

  • Size

    1.5MB

  • MD5

    c0e6ffa5d96ec511f8fc16576f576d7f

  • SHA1

    cf96fcb912c1d7cea6e9840aefcfe2d0f5ad1846

  • SHA256

    f93e49425c33932d4adda4e5ff0818a0970280a22883824d806e4cf4f511a82f

  • SHA512

    f43d0c695f8be14a6f4758fc7a91e88564e2ce1ac58f964cd4b4528e8bd8541ce6e9e3172b8ee17de3305ac6132e9a67fa6f74532933fc48e13cae62d1bdff23

  • SSDEEP

    49152:xcBvCpZgu2X0EwJ84vLRaBtIl9mTM8VswpNm0jz:xDZ2XjCvLUBsK7ZpUs

Malware Config

Extracted

Family

nullmixer

C2

http://marisana.xyz/

Extracted

Family

smokeloader

Botnet

pub6

Extracted

Family

smokeloader

Version

2020

C2

http://conceitosseg.com/upload/

http://integrasidata.com/upload/

http://ozentekstil.com/upload/

http://finbelportal.com/upload/

http://telanganadigital.com/upload/

rc4.i32
rc4.i32

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
  • NullMixer

    NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • ASPack v2.12-2.42 8 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
    "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:968
    • C:\Users\Admin\AppData\Local\Temp\7zS8C3349B7\setup_install.exe
      "C:\Users\Admin\AppData\Local\Temp\7zS8C3349B7\setup_install.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1220
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c karotima_2.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:924
        • C:\Users\Admin\AppData\Local\Temp\7zS8C3349B7\karotima_2.exe
          karotima_2.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          PID:432
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c karotima_1.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2188
        • C:\Users\Admin\AppData\Local\Temp\7zS8C3349B7\karotima_1.exe
          karotima_1.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          PID:3720
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1220 -s 504
        3⤵
        • Program crash
        PID:3784
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1220 -ip 1220
    1⤵
      PID:2908

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\7zS8C3349B7\karotima_1.exe

      Filesize

      64KB

      MD5

      30c503e2033b3f5faaa4170aefe2639d

      SHA1

      0dc846ef9adf0b0addcb62b3ed6e0146581f73ac

      SHA256

      586737a7e7dd058740d28ff60e5fb4aea260fbe83788e97bebd1123cfe2d1960

      SHA512

      af094095a4b5f5249de6d1497d932ac222b10d1d7e2e2c02fc034412056698b53736904b522ac3d963e104bdba32c23a4ce5d1b152fea44ad2af79114cb09710

    • C:\Users\Admin\AppData\Local\Temp\7zS8C3349B7\karotima_1.txt

      Filesize

      7KB

      MD5

      70e97a19778d673b3e693cbe5e49ea86

      SHA1

      f19b178cef58c89b1f9fafca12264cb700337a49

      SHA256

      039e5c17eefd9b7f0345d230b771fdbacc6bf0b65ab7f2970ccfe4fa1d67b226

      SHA512

      6a364abb9b91717d59683eabc425f956c4fd870b00104d40e8b0723dc054f084370edf45b61aea30eddd02944872ff551749f8520cacc1dcbca2b2ded14eb0a4

    • C:\Users\Admin\AppData\Local\Temp\7zS8C3349B7\karotima_2.exe

      Filesize

      132KB

      MD5

      eebcab8eadfd0e1454d61b4429c7e0ae

      SHA1

      d9671fce8ce14fa6f69de20bfb7b0724c908232e

      SHA256

      373e780c2f19f88898b12b36886d2adfcec0e0bdc059ee89265acbb46dea0e55

      SHA512

      bc4dc6fa1190b2f375c3f273815c51db3d9f338ff0f5622af14e1d6548e2f82c6051dcbe1531ba59b2aa84f1bb01727e9b4f4065fb2ded62089d335e0424afa3

    • C:\Users\Admin\AppData\Local\Temp\7zS8C3349B7\karotima_2.txt

      Filesize

      70KB

      MD5

      a3ccf08c15c6d4d515a8344f7d9aec11

      SHA1

      3a2b957c234c477318db3fd11f2253283841fb76

      SHA256

      dc3cba954ecaed747f53a7853e52e805576b09fb892be88b9b1f2cfa96e11691

      SHA512

      9450f0e7771f6f7cfe2c0a3c59991a0e74acc46e042d7038242094e16bba768c6f77f5d0203143458dc81b0b6a44ebdd1c328e760393729afc3a696438ddeb65

    • C:\Users\Admin\AppData\Local\Temp\7zS8C3349B7\libcurl.dll

      Filesize

      218KB

      MD5

      d09be1f47fd6b827c81a4812b4f7296f

      SHA1

      028ae3596c0790e6d7f9f2f3c8e9591527d267f7

      SHA256

      0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

      SHA512

      857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

    • C:\Users\Admin\AppData\Local\Temp\7zS8C3349B7\libcurl.dll

      Filesize

      90KB

      MD5

      7947a3ef4a38ab46254f3f328aa2edeb

      SHA1

      7a4f63605aacfa1141f674f2f48b3419a89895c6

      SHA256

      85a470497454d21a0fa696558688f4353704263bed4d6968a98ba0d7b8e79612

      SHA512

      518ac0b60602f28035c16956896765c56f0277e2f7fc98fd67517dd513ef45aec3b62566f37830f8663c5bb6bb8a8c83e62397b6bc0a11b2c5a6ad737387a825

    • C:\Users\Admin\AppData\Local\Temp\7zS8C3349B7\libcurlpp.dll

      Filesize

      54KB

      MD5

      e6e578373c2e416289a8da55f1dc5e8e

      SHA1

      b601a229b66ec3d19c2369b36216c6f6eb1c063e

      SHA256

      43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

      SHA512

      9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

    • C:\Users\Admin\AppData\Local\Temp\7zS8C3349B7\libgcc_s_dw2-1.dll

      Filesize

      113KB

      MD5

      9aec524b616618b0d3d00b27b6f51da1

      SHA1

      64264300801a353db324d11738ffed876550e1d3

      SHA256

      59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

      SHA512

      0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

    • C:\Users\Admin\AppData\Local\Temp\7zS8C3349B7\libgcc_s_dw2-1.dll

      Filesize

      103KB

      MD5

      1480739d43aa5f0a5b4b265e5a7e109f

      SHA1

      c8d5444c03e4d45ed23e81a58288e2d26990c2fb

      SHA256

      6bf0c7930a96bb415a3f03dbf82ddb4647de432c4427c068121eb6552bdc9844

      SHA512

      6a745a5a1474dadc5e205506fa505f4769df4dcf807fd58f7de6b4b2037625f94720debfa089c50d7c70670405142a11a3b71762fb30e668fef3c3a7b98b7aeb

    • C:\Users\Admin\AppData\Local\Temp\7zS8C3349B7\libstdc++-6.dll

      Filesize

      171KB

      MD5

      70d627e2148b703e848dce63c063f2dd

      SHA1

      a53f357e4ce0b9b1416cb05bafb5f63cfda47d03

      SHA256

      7534086d3f0127e434e06042d4f61cd41d639e8a5b3baab5e215a2b7997ac762

      SHA512

      fcd3ab1cf98f552d4c0d9e64f4be8fc4d279af9ca908da42fa09f13781036b1c700870988d1084aec78ce06fcc139b053287af2248d0791925eb20deba81f9b9

    • C:\Users\Admin\AppData\Local\Temp\7zS8C3349B7\libstdc++-6.dll

      Filesize

      249KB

      MD5

      a17908e6ee1167c9da4620c8d305ac46

      SHA1

      352cc5c4bcad6c260d3d3dc79575a5db7fb3f5c7

      SHA256

      06938caee5242a06b4d2bc315e7c4ac81bb17f176fa8292b7b98f7e0942c9ecd

      SHA512

      f457fcb5cea8c558b67f2c1c8a8186a1409c103d5d508a5e9bb0f22b3d3032902fbdc7ef794cf1a10e4696b6a4309b7fd8bfda409a2e0444ba400b833320c192

    • C:\Users\Admin\AppData\Local\Temp\7zS8C3349B7\libwinpthread-1.dll

      Filesize

      69KB

      MD5

      1e0d62c34ff2e649ebc5c372065732ee

      SHA1

      fcfaa36ba456159b26140a43e80fbd7e9d9af2de

      SHA256

      509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

      SHA512

      3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

    • C:\Users\Admin\AppData\Local\Temp\7zS8C3349B7\setup_install.exe

      Filesize

      281KB

      MD5

      4a69861e4b3850f31158d54f17572dfd

      SHA1

      96402c8baa66276eccb29455512d008559711541

      SHA256

      7faa79746f887851826537934ec4f57d12becf9e99927c37a5b5971683eedda1

      SHA512

      7ee784cd5ea1dd4eaf6a2b8d389929d3bd3cfcb12385f1518898df7b98082de639cff5e552b9d5198367f5bc7d966d7d5cf54fa8cd3916e88e08055a017179e6

    • C:\Users\Admin\AppData\Local\Temp\7zS8C3349B7\setup_install.exe

      Filesize

      194KB

      MD5

      bebb07efe93b4063146ee1ea29d1aa1c

      SHA1

      9424495fd67cb3e757b05de1600437ef6535434c

      SHA256

      54acbfca93711925c55cc48958d717c8350957d50db8d0f80a4884cb7ffce28e

      SHA512

      deffc19a2972c5fbf11170862ff6355af4a163514bc19adf3dfca8bd0d0b736ead5b5dcebc6b56b011fb6a7eadd0b1c6d49bfbd33b0dde97bae36e89a97acae5

    • C:\Users\Admin\AppData\Local\Temp\7zS8C3349B7\setup_install.exe

      Filesize

      287KB

      MD5

      525ac099d70602763bd7f9f9e8518b07

      SHA1

      e963393e9ec19249adea507cd54c731a16227980

      SHA256

      cc78e389c7a8fed598e312f2e150ffb8a99d9bffdfa4982bd59ae6ce7693efbf

      SHA512

      fc4cd5120656fd80f66e689786cbcce1d9259e0bb7b37f653b5e130463f128f38c024b0e84f8561bad48d7b066dd965a9a94a7bbcb0dbecb2bc3468902293d67

    • C:\Users\Admin\AppData\Local\Temp\CC4F.tmp

      Filesize

      104KB

      MD5

      4e63d75321019dfad9219b092662f16b

      SHA1

      45edf4ea338d0df80fb185d84833a8bca64bd5ea

      SHA256

      6de202dc486d6acd93893562f035f9ca10dbdd6762b904260ff732a4c8124ca0

      SHA512

      6c26b6bd4887b8fe33b0882458404c1882a366d0106a95e65b2078e433448d4706b3fda0f668af2827dda3447a186bf5fe640cafa7d47b7d23658ce6e17054ed

    • C:\Users\Admin\AppData\Roaming\vdcasjs

      Filesize

      328KB

      MD5

      6f7f47269f92b58955a6714ddba7fcd4

      SHA1

      e92a5ec35e1900af4849fe54da71abc939b58ab3

      SHA256

      2c7607aeadea3ed5a9c4f6c0f25b097d5219b2ed16697cd5bd06407906098569

      SHA512

      a04a2919ad8a21d994460c73ccd36e1694c101078126e9add60dced76b87efae2eb7f7c71f997779645fbef78c9aff8475943cc8b81e8c2830c90a695c9d4152

    • memory/432-75-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB

    • memory/432-67-0x0000000002070000-0x0000000002079000-memory.dmp

      Filesize

      36KB

    • memory/432-66-0x00000000004B0000-0x00000000005B0000-memory.dmp

      Filesize

      1024KB

    • memory/432-69-0x0000000000400000-0x000000000046D000-memory.dmp

      Filesize

      436KB

    • memory/1220-38-0x000000006B440000-0x000000006B4CF000-memory.dmp

      Filesize

      572KB

    • memory/1220-44-0x000000006FE40000-0x000000006FFC6000-memory.dmp

      Filesize

      1.5MB

    • memory/1220-49-0x0000000000400000-0x000000000051E000-memory.dmp

      Filesize

      1.1MB

    • memory/1220-50-0x0000000000400000-0x000000000051E000-memory.dmp

      Filesize

      1.1MB

    • memory/1220-53-0x0000000000400000-0x000000000051E000-memory.dmp

      Filesize

      1.1MB

    • memory/1220-52-0x0000000000400000-0x000000000051E000-memory.dmp

      Filesize

      1.1MB

    • memory/1220-51-0x0000000000400000-0x000000000051E000-memory.dmp

      Filesize

      1.1MB

    • memory/1220-47-0x000000006B280000-0x000000006B2A6000-memory.dmp

      Filesize

      152KB

    • memory/1220-30-0x000000006B440000-0x000000006B4CF000-memory.dmp

      Filesize

      572KB

    • memory/1220-48-0x000000006B280000-0x000000006B2A6000-memory.dmp

      Filesize

      152KB

    • memory/1220-46-0x000000006FE40000-0x000000006FFC6000-memory.dmp

      Filesize

      1.5MB

    • memory/1220-45-0x000000006FE40000-0x000000006FFC6000-memory.dmp

      Filesize

      1.5MB

    • memory/1220-41-0x000000006B440000-0x000000006B4CF000-memory.dmp

      Filesize

      572KB

    • memory/1220-54-0x0000000000400000-0x000000000051E000-memory.dmp

      Filesize

      1.1MB

    • memory/1220-43-0x000000006FE40000-0x000000006FFC6000-memory.dmp

      Filesize

      1.5MB

    • memory/1220-60-0x0000000000400000-0x000000000051E000-memory.dmp

      Filesize

      1.1MB

    • memory/1220-61-0x000000006B440000-0x000000006B4CF000-memory.dmp

      Filesize

      572KB

    • memory/1220-64-0x000000006EB40000-0x000000006EB63000-memory.dmp

      Filesize

      140KB

    • memory/1220-65-0x000000006FE40000-0x000000006FFC6000-memory.dmp

      Filesize

      1.5MB

    • memory/1220-63-0x000000006B280000-0x000000006B2A6000-memory.dmp

      Filesize

      152KB

    • memory/1220-62-0x0000000064940000-0x0000000064959000-memory.dmp

      Filesize

      100KB

    • memory/1220-42-0x000000006FE40000-0x000000006FFC6000-memory.dmp

      Filesize

      1.5MB

    • memory/1220-40-0x000000006B440000-0x000000006B4CF000-memory.dmp

      Filesize

      572KB

    • memory/1220-39-0x0000000064940000-0x0000000064959000-memory.dmp

      Filesize

      100KB

    • memory/1220-37-0x0000000064940000-0x0000000064959000-memory.dmp

      Filesize

      100KB

    • memory/1220-22-0x0000000000400000-0x000000000051E000-memory.dmp

      Filesize

      1.1MB

    • memory/1220-35-0x000000006B280000-0x000000006B2A6000-memory.dmp

      Filesize

      152KB

    • memory/3592-73-0x0000000002880000-0x0000000002895000-memory.dmp

      Filesize

      84KB