Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
417s -
max time network
415s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240226-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
06/03/2024, 21:09
Static task
static1
Behavioral task
behavioral1
Sample
CTFarmSetup-Dl0r1S07Eu.exe
Resource
win10v2004-20240226-ja
General
-
Target
CTFarmSetup-Dl0r1S07Eu.exe
-
Size
5.7MB
-
MD5
fbe57e7ad749b7446da15a3009c1dbda
-
SHA1
5fe1d65462acd362681c611ce0f832c0a74a6e70
-
SHA256
af2157afdb3d8390e7a8649e64a3108753f90f1c59837f8bd9895780c1e95d12
-
SHA512
555f40f23aa5151d5a2ef3c0edf0d57f5e56fe50b0cc0884f0fb900044223e649252061394de53a60e1db0267abf98929931d4ad8c4243ae10e40fc118ba6bc3
-
SSDEEP
98304:IsaZ+xj0ghxlL8nVU18k0xlVxCtq5xv00dre4+7PDsIEU+B9KpNGwPUlUQb0+YUE:Ir+xj0ghxlwWGVxCE5vr+7ZEUU9aNGp4
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CTFarm = "C:\\Program Files\\CTFarm\\CTFarm.exe /tray" CTFarmSetup-Dl0r1S07Eu.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation CTFarmSetup-Dl0r1S07Eu.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files\CTFarm\CTFarmUpdater.exe CTFarmSetup-Dl0r1S07Eu.exe File created C:\Program Files\CTFarm\sciter.dll CTFarmSetup-Dl0r1S07Eu.exe File created C:\Program Files\CTFarm\CTFarmHWMon.sys CTFarmSetup-Dl0r1S07Eu.exe File created C:\Program Files\CTFarm\Uninstall.exe CTFarmSetup-Dl0r1S07Eu.exe File created C:\Program Files\CTFarm\CTFarm.exe CTFarmSetup-Dl0r1S07Eu.exe File created C:\Program Files\CTFarm\CTFarmService.exe CTFarmSetup-Dl0r1S07Eu.exe -
Executes dropped EXE 5 IoCs
pid Process 1952 CTFarmService.exe 2488 CTFarmService.exe 3164 CTFarmUpdater.exe 1452 CTFarm.exe 3788 CTFarm.exe -
Loads dropped DLL 6 IoCs
pid Process 264 CTFarmSetup-Dl0r1S07Eu.exe 264 CTFarmSetup-Dl0r1S07Eu.exe 264 CTFarmSetup-Dl0r1S07Eu.exe 264 CTFarmSetup-Dl0r1S07Eu.exe 1452 CTFarm.exe 3788 CTFarm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 672 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 1452 CTFarm.exe Token: SeLockMemoryPrivilege 3788 CTFarm.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1452 CTFarm.exe 1452 CTFarm.exe 3788 CTFarm.exe 3788 CTFarm.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1452 CTFarm.exe 3788 CTFarm.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1452 CTFarm.exe 3788 CTFarm.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 264 wrote to memory of 1952 264 CTFarmSetup-Dl0r1S07Eu.exe 93 PID 264 wrote to memory of 1952 264 CTFarmSetup-Dl0r1S07Eu.exe 93 PID 264 wrote to memory of 3164 264 CTFarmSetup-Dl0r1S07Eu.exe 96 PID 264 wrote to memory of 3164 264 CTFarmSetup-Dl0r1S07Eu.exe 96 PID 264 wrote to memory of 3164 264 CTFarmSetup-Dl0r1S07Eu.exe 96 PID 264 wrote to memory of 1452 264 CTFarmSetup-Dl0r1S07Eu.exe 102 PID 264 wrote to memory of 1452 264 CTFarmSetup-Dl0r1S07Eu.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\CTFarmSetup-Dl0r1S07Eu.exe"C:\Users\Admin\AppData\Local\Temp\CTFarmSetup-Dl0r1S07Eu.exe"1⤵
- Adds Run key to start application
- Checks computer location settings
- Drops file in Program Files directory
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Program Files\CTFarm\CTFarmService.exe"C:\Program Files\CTFarm\CTFarmService.exe" install2⤵
- Executes dropped EXE
PID:1952
-
-
C:\Program Files\CTFarm\CTFarmUpdater.exe"C:\Program Files\CTFarm\CTFarmUpdater.exe" /install2⤵
- Executes dropped EXE
PID:3164
-
-
C:\Program Files\CTFarm\CTFarm.exe"C:\Program Files\CTFarm\CTFarm.exe" /first_launch2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1452
-
-
C:\Program Files\CTFarm\CTFarmService.exe"C:\Program Files\CTFarm\CTFarmService.exe"1⤵
- Executes dropped EXE
PID:2488
-
C:\Program Files\CTFarm\CTFarm.exe"C:\Program Files\CTFarm\CTFarm.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5a4bc34026e06c5a582b992f20a7508cd
SHA1af331a3ac56c88f220e26f1596d17bd6cef5b328
SHA25696df47f390e273f03ec9d18eed724689559d2b244033ebec2a657d1b5d34ff41
SHA5122232d8a206ba26ba5b2a082ceff5c5ec1a2dcaabe52ba8fbe08115654db627b6955fb6a93c07aafcf97a70990614785995dacc681a747b2fca61ca27db6d26d8
-
Filesize
384KB
MD5585b7905252960e8d42e77f967bf1896
SHA18dfec72fcd8831b7e903eac4d0f0ec90b2dd659a
SHA256d5499e62f9fd8a391a40506d5b61c5db1112b74d2bc730d277d4f6d5d583b660
SHA5120c9e94e4ad99a667264664fb50e22da2a2330e16c3eec27a899c879ed789ddd7b7f68ce2285b1044f42f1e95d3fddfc18fec8b07a22d4b87232d8d2420808dbb
-
Filesize
2.4MB
MD5297e98b83754d01a27afc3c544da0c99
SHA1786596cae9a84ee46e585f5964edcb74c84a2348
SHA256dee9ed2b2398634e7bc3e4389502a590e84e07a7752a64e157db1dbb1d68234c
SHA5123386bd83f4c901c33ebe91e8551de812be38d335f35ddc627e1769df7735c4c15fd91a5ab4a8d1fa206817c28a09b6c7b70830a6121e8399c668a10340c5f037
-
Filesize
1.3MB
MD508aff5b6d36ca823e696a30e0b93401f
SHA102aad91af49b94a204cc772401e8d0fd7e16a66c
SHA2564ec6ac54141f8498ffd48f849518dd9a315b7f5b55942fef7c0d4ada46c84429
SHA512363571ecf82552c3ae0304f1ab0e2e45916ae7d890dc41f00a2eb9a3d5b2ccf1a2e4fdf965ddd33eaf52f4cbc61ba54821cc462b539dcd17abd82356cfb3e75d
-
Filesize
435KB
MD51736c08d3c266bbaceeb14ee6badc1d1
SHA10890ec3a38b75f93d67ff7a1778ed461c87cb1e0
SHA2568c632f0fda9d746e18c7e5327620a3cd918903f972cead9a5aaf85cb81d70f2a
SHA512c918a8c4309b1402658b7413b1035df722bf82ed9ef2b06ca7ea79d859f9a70c560ff4ac5a2c6ffca8c158e297ec66ddee5b39d3c890e07b59f456224f4d7e60
-
Filesize
8.3MB
MD56961d5db2a9797108e6e33bea6a82118
SHA183abdb392bcc34db70697340d8bada2d888a64a3
SHA25645aee2005b54a39b45073483ed7906eed5495ef42d85c19083ddf5a25fa12e7d
SHA51264f3130e668467282e978d7fb29dc07dd3c55c4708869168132e9383988f822d677f8b80eec2bc1b4de868008cb485aeb28bacffb5997a10f1931a64da3e0dd1
-
Filesize
7KB
MD56b7073967487c24d08e88c208a1626fa
SHA1f75f9dd095558b3c03b1647fe23c0869634bd9cc
SHA256c91c61861cf22d1e9cd14dbba163573b2bd3d03dc72fcb1512879e4f3ab3b276
SHA51231e1962b761bb0304905287f8ef33bf244b05ce1490723b98134dff0cc55956295d979086c350457fa5f6618868e431f1fc2d34afb4437ada15839ae4836f6f7
-
Filesize
12KB
MD5564bb0373067e1785cba7e4c24aab4bf
SHA17c9416a01d821b10b2eef97b80899d24014d6fc1
SHA2567a9ddee34562cd3703f1502b5c70e99cd5bba15de2b6845a3555033d7f6cb2a5
SHA51222c61a323cb9293d7ec5c7e7e60674d0e2f7b29d55be25eb3c128ea2cd7440a1400cee17c43896b996278007c0d247f331a9b8964e3a40a0eb1404a9596c4472
-
Filesize
24KB
MD5c5add6be93b13965cb474227f6dfe299
SHA1c8f0ffc6ee182d2b54fad661a8522932825b2e52
SHA256b12568139bdd8621aa9ca3e2dd29bbfa110068c21a9f89289372192517122502
SHA512e49eb6c20e442143c01c9ab20be9b4fbca84a25333a8a9ce6c28d63f5419e659898225994a6e319c3f5be2c2d880b93fb2e078d2c1861be813702226c888a27a
-
Filesize
14KB
MD5e878829aff6cef7ebd750ae65356c1e1
SHA19f82f6f63227e5de04e90d40e39c66c881b412a6
SHA256c1b2bfdb73777481c605973b724be6d043a92d498eac947b42ddaa879f262992
SHA51241ea21726792c039b9014aac94862f5ef16a2207fd0e0e3b47b6509afa9e7a6829737705b3c5b29ab5033abae84dbb37eadc1d2ba0cc5b8b51cac6a2c6ff3213
-
Filesize
9KB
MD548f3e7860e1de2b4e63ec744a5e9582a
SHA1420c64d802a637c75a53efc8f748e1aede3d6dc6
SHA2566bf9cccd8a600f4d442efe201e8c07b49605ba35f49a4b3ab22fa2641748e156
SHA51228716ddea580eeb23d93d1ff6ea0cf79a725e13c8f8a17ec9dfacb1fe29c7981ad84c03aed05663adc52365d63d19ec2f366762d1c685e3a9d93037570c3c583
-
Filesize
218B
MD53d362fd72df9b9498ac20511892af533
SHA1496b30a45dfb7b0867afa02ebc3d0134cde5d0da
SHA2568d36fc6fe9744d3edcfbc0123e6112bd7873678024606c1ce7059428371ed835
SHA5126d4fb523842068cd6dc22c3c23d2dcc2d91fb1f2924d03be8fa872e42050ac38acb8aa5e482ef951d6b734aafcaa3f04ed1b876f06df62846fe3228bf885b95a
-
Filesize
507B
MD52c8e2c7d42df1146de6ad02592a45272
SHA1034036805f5a7007d07fd8a075f5673afbe01340
SHA2561adc31270020a904cd2f1cbbe5fe40b793ded02bd546c433aae2b06640185388
SHA51239e8d31ab7a94f15e466f4bcc70c8694dee38c3f8635662a1991f88290cb3a706d8bf5618ef50ba7748fa9ecada51324c13f5dd1b2a29c726e6f4b40221d7fcd