Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
186s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 11:53
Static task
static1
Behavioral task
behavioral1
Sample
a1cdfab5a4af43636fe8141ba9bb2215.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a1cdfab5a4af43636fe8141ba9bb2215.exe
Resource
win10v2004-20240221-en
General
-
Target
a1cdfab5a4af43636fe8141ba9bb2215.exe
-
Size
14.8MB
-
MD5
a1cdfab5a4af43636fe8141ba9bb2215
-
SHA1
fe8e0d854dee3d741167f4c302b5f05c71e23189
-
SHA256
a492284b3b05e75509bd1b8b6e7f73b5bf7f78263d5725082a8c76bb782b3c63
-
SHA512
9dca7bbfbcc6178eecc0221afae418b5012d27b4023e754d0db54811d57074b21583f400408fe06790869585eee163ece122dfd064050287ce7d3561c151e37f
-
SSDEEP
12288:F1vfanyphPu2xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFz:zvfEyph
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3052 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\zlwpfhru\ImagePath = "C:\\Windows\\SysWOW64\\zlwpfhru\\xgafxwrn.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3538781373-1545967067-4263767959-1000\Control Panel\International\Geo\Nation a1cdfab5a4af43636fe8141ba9bb2215.exe -
Deletes itself 1 IoCs
pid Process 5000 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 3184 xgafxwrn.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3184 set thread context of 5000 3184 xgafxwrn.exe 108 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4860 sc.exe 4548 sc.exe 4964 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2404 688 WerFault.exe 88 4492 3184 WerFault.exe 107 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 688 wrote to memory of 2348 688 a1cdfab5a4af43636fe8141ba9bb2215.exe 93 PID 688 wrote to memory of 2348 688 a1cdfab5a4af43636fe8141ba9bb2215.exe 93 PID 688 wrote to memory of 2348 688 a1cdfab5a4af43636fe8141ba9bb2215.exe 93 PID 688 wrote to memory of 2060 688 a1cdfab5a4af43636fe8141ba9bb2215.exe 95 PID 688 wrote to memory of 2060 688 a1cdfab5a4af43636fe8141ba9bb2215.exe 95 PID 688 wrote to memory of 2060 688 a1cdfab5a4af43636fe8141ba9bb2215.exe 95 PID 688 wrote to memory of 4860 688 a1cdfab5a4af43636fe8141ba9bb2215.exe 97 PID 688 wrote to memory of 4860 688 a1cdfab5a4af43636fe8141ba9bb2215.exe 97 PID 688 wrote to memory of 4860 688 a1cdfab5a4af43636fe8141ba9bb2215.exe 97 PID 688 wrote to memory of 4548 688 a1cdfab5a4af43636fe8141ba9bb2215.exe 99 PID 688 wrote to memory of 4548 688 a1cdfab5a4af43636fe8141ba9bb2215.exe 99 PID 688 wrote to memory of 4548 688 a1cdfab5a4af43636fe8141ba9bb2215.exe 99 PID 688 wrote to memory of 4964 688 a1cdfab5a4af43636fe8141ba9bb2215.exe 101 PID 688 wrote to memory of 4964 688 a1cdfab5a4af43636fe8141ba9bb2215.exe 101 PID 688 wrote to memory of 4964 688 a1cdfab5a4af43636fe8141ba9bb2215.exe 101 PID 688 wrote to memory of 3052 688 a1cdfab5a4af43636fe8141ba9bb2215.exe 103 PID 688 wrote to memory of 3052 688 a1cdfab5a4af43636fe8141ba9bb2215.exe 103 PID 688 wrote to memory of 3052 688 a1cdfab5a4af43636fe8141ba9bb2215.exe 103 PID 3184 wrote to memory of 5000 3184 xgafxwrn.exe 108 PID 3184 wrote to memory of 5000 3184 xgafxwrn.exe 108 PID 3184 wrote to memory of 5000 3184 xgafxwrn.exe 108 PID 3184 wrote to memory of 5000 3184 xgafxwrn.exe 108 PID 3184 wrote to memory of 5000 3184 xgafxwrn.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1cdfab5a4af43636fe8141ba9bb2215.exe"C:\Users\Admin\AppData\Local\Temp\a1cdfab5a4af43636fe8141ba9bb2215.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\zlwpfhru\2⤵PID:2348
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\xgafxwrn.exe" C:\Windows\SysWOW64\zlwpfhru\2⤵PID:2060
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create zlwpfhru binPath= "C:\Windows\SysWOW64\zlwpfhru\xgafxwrn.exe /d\"C:\Users\Admin\AppData\Local\Temp\a1cdfab5a4af43636fe8141ba9bb2215.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:4860
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description zlwpfhru "wifi internet conection"2⤵
- Launches sc.exe
PID:4548
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start zlwpfhru2⤵
- Launches sc.exe
PID:4964
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:3052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 688 -s 10362⤵
- Program crash
PID:2404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 688 -ip 6881⤵PID:1872
-
C:\Windows\SysWOW64\zlwpfhru\xgafxwrn.exeC:\Windows\SysWOW64\zlwpfhru\xgafxwrn.exe /d"C:\Users\Admin\AppData\Local\Temp\a1cdfab5a4af43636fe8141ba9bb2215.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 5162⤵
- Program crash
PID:4492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3184 -ip 31841⤵PID:2452
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.0MB
MD5b6360eacb54417b4f1a31c929b72e7a6
SHA1b328a6d3335f78381943f34ea5fd9026045c4542
SHA2569b447a43b31755e2af5ff2369fb018ca782ebcfcb5132db662b781dde15e13bf
SHA5129fd601e089d4d9ead081d26dbafb424bfde41c3f94886b29fffa7a0c4b72e00a8fdc12850255af232fcc115a177bc24980bd67ae3cbdc06bb69a68e8de4702cf
-
Filesize
8.2MB
MD56411987b6006bcbb10426d9646457a84
SHA13cfd44882ed2321aa4928a77e65a3683832b1e25
SHA25669cb3af247f724c8bf2e924fb817625eaf3e15d7f884a825d3b7b8216f94fdf1
SHA512a8283b903b25f71a70df67e1e0e3aac9defd4db890910239559f2a120ae202893c9efee6bb6d0933fec34c0ed524194dffb0c710fdfa2379ec8567622d3bbda7