Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 06:11
Static task
static1
Behavioral task
behavioral1
Sample
b6b4b6e8298cf20c5b3a4c601f81cc82.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b6b4b6e8298cf20c5b3a4c601f81cc82.exe
Resource
win10v2004-20240226-en
General
-
Target
b6b4b6e8298cf20c5b3a4c601f81cc82.exe
-
Size
328KB
-
MD5
b6b4b6e8298cf20c5b3a4c601f81cc82
-
SHA1
eba6e67d96dc5a6877d57edb3bcd5ccc752c87bd
-
SHA256
7fa913754340287dd08a5c6e1623973daae180264bd25aa4bd4ee228943e2de6
-
SHA512
84c1ee603b5c8d774bf8a955393384e1c83b469c02ae6eb02e52ab366b9e4c20a062fd16fb04ecc0ae8eb81d7d5ed59e565417e8eb78a000a4ec4f33eede1d3d
-
SSDEEP
6144:dg8/U4hXgv5fEgPWkAqc0oeSikk6W35/zTBfIphJGyaXJcj+z:pHhmB+Yc0oeSikJ40JOcjc
Malware Config
Extracted
cybergate
2.6
naruto150493
cmere.no-ip.biz:8080
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Win32
-
install_file
fotito.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
La imagen no p
-
message_box_title
Imagen no valida
-
password
sasuke93
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run b6b4b6e8298cf20c5b3a4c601f81cc82.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\Win32\\fotito.exe" b6b4b6e8298cf20c5b3a4c601f81cc82.exe Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run b6b4b6e8298cf20c5b3a4c601f81cc82.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\Win32\\fotito.exe" b6b4b6e8298cf20c5b3a4c601f81cc82.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{L1RAV6JJ-NU80-H3T8-32L4-J0O14BAN40J2} b6b4b6e8298cf20c5b3a4c601f81cc82.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{L1RAV6JJ-NU80-H3T8-32L4-J0O14BAN40J2}\StubPath = "C:\\Windows\\Win32\\fotito.exe Restart" b6b4b6e8298cf20c5b3a4c601f81cc82.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{L1RAV6JJ-NU80-H3T8-32L4-J0O14BAN40J2} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{L1RAV6JJ-NU80-H3T8-32L4-J0O14BAN40J2}\StubPath = "C:\\Windows\\Win32\\fotito.exe" explorer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation b6b4b6e8298cf20c5b3a4c601f81cc82.exe -
Executes dropped EXE 2 IoCs
pid Process 2656 fotito.exe 4832 fotito.exe -
resource yara_rule behavioral2/memory/4500-3-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4500-5-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4500-7-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4500-8-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4500-12-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral2/memory/4500-72-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/memory/4580-77-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/memory/4500-95-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4884-148-0x0000000024160000-0x00000000241C2000-memory.dmp upx behavioral2/memory/4500-152-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4580-196-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/memory/4832-202-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4832-233-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4884-245-0x0000000024160000-0x00000000241C2000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\Win32\\fotito.exe" b6b4b6e8298cf20c5b3a4c601f81cc82.exe Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\Win32\\fotito.exe" b6b4b6e8298cf20c5b3a4c601f81cc82.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4988 set thread context of 4500 4988 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 99 PID 2656 set thread context of 4832 2656 fotito.exe 108 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Win32\fotito.exe b6b4b6e8298cf20c5b3a4c601f81cc82.exe File opened for modification C:\Windows\Win32\fotito.exe fotito.exe File created C:\Windows\Win32\fotito.exe b6b4b6e8298cf20c5b3a4c601f81cc82.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4856 4832 WerFault.exe 108 -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ b6b4b6e8298cf20c5b3a4c601f81cc82.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4988 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 2656 fotito.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4988 wrote to memory of 4500 4988 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 99 PID 4988 wrote to memory of 4500 4988 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 99 PID 4988 wrote to memory of 4500 4988 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 99 PID 4988 wrote to memory of 4500 4988 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 99 PID 4988 wrote to memory of 4500 4988 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 99 PID 4988 wrote to memory of 4500 4988 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 99 PID 4988 wrote to memory of 4500 4988 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 99 PID 4988 wrote to memory of 4500 4988 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 99 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56 PID 4500 wrote to memory of 3528 4500 b6b4b6e8298cf20c5b3a4c601f81cc82.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\b6b4b6e8298cf20c5b3a4c601f81cc82.exe"C:\Users\Admin\AppData\Local\Temp\b6b4b6e8298cf20c5b3a4c601f81cc82.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\b6b4b6e8298cf20c5b3a4c601f81cc82.exeC:\Users\Admin\AppData\Local\Temp\b6b4b6e8298cf20c5b3a4c601f81cc82.exe3⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Modifies Installed Components in the registry
PID:4580
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:3220
-
-
C:\Users\Admin\AppData\Local\Temp\b6b4b6e8298cf20c5b3a4c601f81cc82.exe"C:\Users\Admin\AppData\Local\Temp\b6b4b6e8298cf20c5b3a4c601f81cc82.exe"4⤵
- Checks computer location settings
- Modifies registry class
PID:4884 -
C:\Windows\Win32\fotito.exe"C:\Windows\Win32\fotito.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2656 -
C:\Windows\Win32\fotito.exeC:\Windows\Win32\fotito.exe6⤵
- Executes dropped EXE
PID:4832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4832 -s 5327⤵
- Program crash
PID:4856
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4832 -ip 48321⤵PID:1640
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3804 --field-trial-handle=2260,i,3303482231723870786,2954015409682154873,262144 --variations-seed-version /prefetch:81⤵PID:2780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5172be4b989f16cc0de6d87c76505da97
SHA1c4ee460ac851460308be8cd7cfc4e3066db6dbaa
SHA25632eb0ca4ddd208bb116cd1a4ec40c3d80c0638d325f63767c6cdb7591e17d4cd
SHA512003917b9423cb3c4c853f316a3ce847eff96115a577a1bb1581e92cc2df1acbde9b88ab20dceb8035042182f72e091f6869b9f7c84206c867dcf0d2abc47a277
-
Filesize
328KB
MD5b6b4b6e8298cf20c5b3a4c601f81cc82
SHA1eba6e67d96dc5a6877d57edb3bcd5ccc752c87bd
SHA2567fa913754340287dd08a5c6e1623973daae180264bd25aa4bd4ee228943e2de6
SHA51284c1ee603b5c8d774bf8a955393384e1c83b469c02ae6eb02e52ab366b9e4c20a062fd16fb04ecc0ae8eb81d7d5ed59e565417e8eb78a000a4ec4f33eede1d3d