Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
39s -
max time network
69s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 05:59 UTC
Static task
static1
Behavioral task
behavioral1
Sample
1151 AZKOND - KELBECER 30.01.2024.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
General
-
Target
1151 AZKOND - KELBECER 30.01.2024.exe
-
Size
1.2MB
-
MD5
9b74b84e9c07cb1b16c40914ad401add
-
SHA1
992e3d4337a8b19a7acffb178809c44d13f7e637
-
SHA256
390b6fdbe11dae817ab38e25cc9974833eccf4a04e0307729b0c8507c15ed211
-
SHA512
d45eb31685f88c755fa46a30e52c482187254f9713fdbc7d5f5deded77529bd3c801feb7804a4231d9f4201ee1e7d16dd1f6dac7dd3d0cc94b43fd513d976547
-
SSDEEP
24576:dUnj9eiATpkYWFz+59iz+hDkiUgEnTZUQplhDx3nxEWfi80HcUiAEVc:daeiATBAz+riz+JVlEnTrpfJ9f0Hd2m
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 1 IoCs
pid Process 4992 1151 AZKOND - KELBECER 30.01.2024.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Startup key = "C:\\Users\\Admin\\AppData\\Local\\Temp\\subfolder1\\Chemicking.exe" wab.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Glycolipin96.ini 1151 AZKOND - KELBECER 30.01.2024.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4992 1151 AZKOND - KELBECER 30.01.2024.exe 2304 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4992 set thread context of 2304 4992 1151 AZKOND - KELBECER 30.01.2024.exe 87 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\resources\hellboxes.mur 1151 AZKOND - KELBECER 30.01.2024.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4992 1151 AZKOND - KELBECER 30.01.2024.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4992 wrote to memory of 2304 4992 1151 AZKOND - KELBECER 30.01.2024.exe 87 PID 4992 wrote to memory of 2304 4992 1151 AZKOND - KELBECER 30.01.2024.exe 87 PID 4992 wrote to memory of 2304 4992 1151 AZKOND - KELBECER 30.01.2024.exe 87 PID 4992 wrote to memory of 2304 4992 1151 AZKOND - KELBECER 30.01.2024.exe 87 PID 4992 wrote to memory of 2304 4992 1151 AZKOND - KELBECER 30.01.2024.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\1151 AZKOND - KELBECER 30.01.2024.exe"C:\Users\Admin\AppData\Local\Temp\1151 AZKOND - KELBECER 30.01.2024.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Program Files (x86)\windows mail\wab.exe"C:\Users\Admin\AppData\Local\Temp\1151 AZKOND - KELBECER 30.01.2024.exe"2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2304
-
Network
-
Remote address:8.8.8.8:53Request154.239.44.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request104.219.191.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request209.205.72.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request15.164.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestchashni.coIN AResponsechashni.coIN A104.21.14.108chashni.coIN A172.67.158.167
-
Remote address:104.21.14.108:80RequestGET /jjTrpCQFr22.bin HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Host: chashni.co
Cache-Control: no-cache
ResponseHTTP/1.1 301 Moved Permanently
Transfer-Encoding: chunked
Connection: keep-alive
Cache-Control: max-age=3600
Expires: Thu, 01 Feb 2024 07:01:27 GMT
Location: https://chashni.co/jjTrpCQFr22.bin
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=6GTOveomWFNP43TXqQ2Si5JaowAi%2BIKTTApFuihDPDuJnxZYIJItCtPed19fKI5pg0vQMIp5oinXoCbVy0vTZ4cm0usdd6SUKZuhEF5uA5bT08GGrru3ElABV%2Fnz"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 84e7fadaa8113d8e-LHR
alt-svc: h2=":443"; ma=60
-
Remote address:8.8.8.8:53Requestx2.c.lencr.orgIN AResponsex2.c.lencr.orgIN CNAMEcrl.root-x1.letsencrypt.org.edgekey.netcrl.root-x1.letsencrypt.org.edgekey.netIN CNAMEe8652.dscx.akamaiedge.nete8652.dscx.akamaiedge.netIN A173.222.13.40
-
Remote address:173.222.13.40:80RequestGET / HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/10.0
Host: x2.c.lencr.org
ResponseHTTP/1.1 200 OK
Content-Type: application/pkix-crl
Last-Modified: Fri, 04 Aug 2023 20:57:56 GMT
ETag: "64cd6654-12c"
Cache-Control: max-age=3600
Expires: Thu, 01 Feb 2024 07:01:28 GMT
Date: Thu, 01 Feb 2024 06:01:28 GMT
Content-Length: 300
Connection: keep-alive
-
Remote address:8.8.8.8:53Request108.14.21.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request40.13.222.173.in-addr.arpaIN PTRResponse40.13.222.173.in-addr.arpaIN PTRa173-222-13-40deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request18.134.221.88.in-addr.arpaIN PTRResponse18.134.221.88.in-addr.arpaIN PTRa88-221-134-18deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requesthaps.co.mzIN AResponsehaps.co.mzIN A198.23.58.146
-
Remote address:198.23.58.146:80RequestGET /jjTrpCQFr22.bin HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
Host: haps.co.mz
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Keep-Alive: timeout=5, max=100
content-type: application/octet-stream
last-modified: Mon, 22 Jan 2024 23:51:31 GMT
accept-ranges: bytes
content-length: 494656
date: Thu, 01 Feb 2024 06:01:39 GMT
server: LiteSpeed
-
Remote address:8.8.8.8:53Request146.58.23.198.in-addr.arpaIN PTRResponse146.58.23.198.in-addr.arpaIN PTRmoz-hostingcom
-
Remote address:8.8.8.8:53Request173.178.17.96.in-addr.arpaIN PTRResponse173.178.17.96.in-addr.arpaIN PTRa96-17-178-173deploystaticakamaitechnologiescom
-
354 B 765 B 4 3
HTTP Request
GET http://chashni.co/jjTrpCQFr22.binHTTP Response
301 -
6.1kB 145.8kB 123 121
-
299 B 721 B 4 3
HTTP Request
GET http://x2.c.lencr.org/HTTP Response
200 -
17.2kB 509.7kB 370 369
HTTP Request
GET http://haps.co.mz/jjTrpCQFr22.binHTTP Response
200
-
72 B 158 B 1 1
DNS Request
154.239.44.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
104.219.191.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
209.205.72.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
15.164.165.52.in-addr.arpa
-
56 B 88 B 1 1
DNS Request
chashni.co
DNS Response
104.21.14.108172.67.158.167
-
60 B 165 B 1 1
DNS Request
x2.c.lencr.org
DNS Response
173.222.13.40
-
72 B 134 B 1 1
DNS Request
108.14.21.104.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
40.13.222.173.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
18.134.221.88.in-addr.arpa
-
56 B 72 B 1 1
DNS Request
haps.co.mz
DNS Response
198.23.58.146
-
72 B 101 B 1 1
DNS Request
146.58.23.198.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
173.178.17.96.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a4dd044bcd94e9b3370ccf095b31f896
SHA117c78201323ab2095bc53184aa8267c9187d5173
SHA2562e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc
SHA51287335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a