Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
156s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 15:54
Static task
static1
Behavioral task
behavioral1
Sample
7d622157c4c9861a2bb4a1c5ffd85106.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7d622157c4c9861a2bb4a1c5ffd85106.exe
Resource
win10v2004-20231215-en
General
-
Target
7d622157c4c9861a2bb4a1c5ffd85106.exe
-
Size
12.5MB
-
MD5
7d622157c4c9861a2bb4a1c5ffd85106
-
SHA1
8950e8c7908624eecf9c59f978446f1cafa2fded
-
SHA256
8dd3ef051e815d7e2e7bd153477614356dac6f34f6510a06e5a19a4f84a0fb9e
-
SHA512
38d6ba9613e13f07e91db844d856fc87da698dadacc0086a0b63e2ad365292fbbbad571099d0c70ce73f682df8fc46e1a33a5614d8010a400d4d2af05f2c8db7
-
SSDEEP
49152:BaBVqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqm:4
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2200 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\cqgwrkja\ImagePath = "C:\\Windows\\SysWOW64\\cqgwrkja\\vvsnqhyq.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 7d622157c4c9861a2bb4a1c5ffd85106.exe -
Deletes itself 1 IoCs
pid Process 3004 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 3756 vvsnqhyq.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3756 set thread context of 3004 3756 vvsnqhyq.exe 105 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2632 sc.exe 2500 sc.exe 3480 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2412 1028 WerFault.exe 83 2552 3756 WerFault.exe 98 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1028 wrote to memory of 4216 1028 7d622157c4c9861a2bb4a1c5ffd85106.exe 84 PID 1028 wrote to memory of 4216 1028 7d622157c4c9861a2bb4a1c5ffd85106.exe 84 PID 1028 wrote to memory of 4216 1028 7d622157c4c9861a2bb4a1c5ffd85106.exe 84 PID 1028 wrote to memory of 1484 1028 7d622157c4c9861a2bb4a1c5ffd85106.exe 86 PID 1028 wrote to memory of 1484 1028 7d622157c4c9861a2bb4a1c5ffd85106.exe 86 PID 1028 wrote to memory of 1484 1028 7d622157c4c9861a2bb4a1c5ffd85106.exe 86 PID 1028 wrote to memory of 2632 1028 7d622157c4c9861a2bb4a1c5ffd85106.exe 91 PID 1028 wrote to memory of 2632 1028 7d622157c4c9861a2bb4a1c5ffd85106.exe 91 PID 1028 wrote to memory of 2632 1028 7d622157c4c9861a2bb4a1c5ffd85106.exe 91 PID 1028 wrote to memory of 2500 1028 7d622157c4c9861a2bb4a1c5ffd85106.exe 94 PID 1028 wrote to memory of 2500 1028 7d622157c4c9861a2bb4a1c5ffd85106.exe 94 PID 1028 wrote to memory of 2500 1028 7d622157c4c9861a2bb4a1c5ffd85106.exe 94 PID 1028 wrote to memory of 3480 1028 7d622157c4c9861a2bb4a1c5ffd85106.exe 96 PID 1028 wrote to memory of 3480 1028 7d622157c4c9861a2bb4a1c5ffd85106.exe 96 PID 1028 wrote to memory of 3480 1028 7d622157c4c9861a2bb4a1c5ffd85106.exe 96 PID 1028 wrote to memory of 2200 1028 7d622157c4c9861a2bb4a1c5ffd85106.exe 100 PID 1028 wrote to memory of 2200 1028 7d622157c4c9861a2bb4a1c5ffd85106.exe 100 PID 1028 wrote to memory of 2200 1028 7d622157c4c9861a2bb4a1c5ffd85106.exe 100 PID 3756 wrote to memory of 3004 3756 vvsnqhyq.exe 105 PID 3756 wrote to memory of 3004 3756 vvsnqhyq.exe 105 PID 3756 wrote to memory of 3004 3756 vvsnqhyq.exe 105 PID 3756 wrote to memory of 3004 3756 vvsnqhyq.exe 105 PID 3756 wrote to memory of 3004 3756 vvsnqhyq.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d622157c4c9861a2bb4a1c5ffd85106.exe"C:\Users\Admin\AppData\Local\Temp\7d622157c4c9861a2bb4a1c5ffd85106.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\cqgwrkja\2⤵PID:4216
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\vvsnqhyq.exe" C:\Windows\SysWOW64\cqgwrkja\2⤵PID:1484
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create cqgwrkja binPath= "C:\Windows\SysWOW64\cqgwrkja\vvsnqhyq.exe /d\"C:\Users\Admin\AppData\Local\Temp\7d622157c4c9861a2bb4a1c5ffd85106.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2632
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description cqgwrkja "wifi internet conection"2⤵
- Launches sc.exe
PID:2500
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start cqgwrkja2⤵
- Launches sc.exe
PID:3480
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1028 -s 7922⤵
- Program crash
PID:2412
-
-
C:\Windows\SysWOW64\cqgwrkja\vvsnqhyq.exeC:\Windows\SysWOW64\cqgwrkja\vvsnqhyq.exe /d"C:\Users\Admin\AppData\Local\Temp\7d622157c4c9861a2bb4a1c5ffd85106.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:3004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 5562⤵
- Program crash
PID:2552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1028 -ip 10281⤵PID:4604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3756 -ip 37561⤵PID:4368
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.4MB
MD5cc1d1153f6fefc2bd04e759cbf6d58e2
SHA1dd2aee1f7973146d57853e03e7708848f1fc2785
SHA256e3430b0aedc2ae6686bec1e427e2202b56e6abe24971e2d340ffe99134c45ad9
SHA5128f90236a590f322d7905c7ccbb38df027238886c47196afe511591425e735a72cdfa8dbfbaa5b9b1800e78282a1a8cadcfad77a958fe57008ffccf58c7c668a0
-
Filesize
6.1MB
MD5cab15c9efaa0afcf5a9b314ec480370a
SHA1e8b4f15721d8d3e2fa21c552f8672f7408cb1552
SHA256d93c7308803597b89f463a02d6e61f23f285a17643278ff908d3ac6c5d9cb2e5
SHA5120f5058482b85948035553774a8b70f137c7ceda9e1883df0ce50761743fd0c2264aa49fe43e29c47db75669dee72fb60ca9a986aefe9752a8407ed523ee911a5