Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 14:35
Static task
static1
Behavioral task
behavioral1
Sample
bc0db50e394ee39b57a709b77f5e280a.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
bc0db50e394ee39b57a709b77f5e280a.exe
Resource
win10v2004-20240226-en
General
-
Target
bc0db50e394ee39b57a709b77f5e280a.exe
-
Size
13.3MB
-
MD5
bc0db50e394ee39b57a709b77f5e280a
-
SHA1
784fc1303bafbce76bf0b02da9d814605a84e79f
-
SHA256
216c4de57aae07cd4a677efd02183dc2709a6e096575d9b6fee861fd4217203f
-
SHA512
764d067f4d1e8906b1a4f5337cd665514e0f61afb24c18c4b1593503744dd34fb6029d1182a15ed85ca906ed9da06d6dc5c1cef59eb861d4f2790c5073e43dd3
-
SSDEEP
49152:fj5555555555555555555555555555555555555555555555555555555555555Z:
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1944 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wofdrdwj\ImagePath = "C:\\Windows\\SysWOW64\\wofdrdwj\\vannqpfk.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation bc0db50e394ee39b57a709b77f5e280a.exe -
Deletes itself 1 IoCs
pid Process 2352 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1076 vannqpfk.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1076 set thread context of 2352 1076 vannqpfk.exe 117 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 688 sc.exe 3988 sc.exe 1792 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1948 wrote to memory of 384 1948 bc0db50e394ee39b57a709b77f5e280a.exe 104 PID 1948 wrote to memory of 384 1948 bc0db50e394ee39b57a709b77f5e280a.exe 104 PID 1948 wrote to memory of 384 1948 bc0db50e394ee39b57a709b77f5e280a.exe 104 PID 1948 wrote to memory of 4292 1948 bc0db50e394ee39b57a709b77f5e280a.exe 106 PID 1948 wrote to memory of 4292 1948 bc0db50e394ee39b57a709b77f5e280a.exe 106 PID 1948 wrote to memory of 4292 1948 bc0db50e394ee39b57a709b77f5e280a.exe 106 PID 1948 wrote to memory of 688 1948 bc0db50e394ee39b57a709b77f5e280a.exe 108 PID 1948 wrote to memory of 688 1948 bc0db50e394ee39b57a709b77f5e280a.exe 108 PID 1948 wrote to memory of 688 1948 bc0db50e394ee39b57a709b77f5e280a.exe 108 PID 1948 wrote to memory of 3988 1948 bc0db50e394ee39b57a709b77f5e280a.exe 110 PID 1948 wrote to memory of 3988 1948 bc0db50e394ee39b57a709b77f5e280a.exe 110 PID 1948 wrote to memory of 3988 1948 bc0db50e394ee39b57a709b77f5e280a.exe 110 PID 1948 wrote to memory of 1792 1948 bc0db50e394ee39b57a709b77f5e280a.exe 112 PID 1948 wrote to memory of 1792 1948 bc0db50e394ee39b57a709b77f5e280a.exe 112 PID 1948 wrote to memory of 1792 1948 bc0db50e394ee39b57a709b77f5e280a.exe 112 PID 1948 wrote to memory of 1944 1948 bc0db50e394ee39b57a709b77f5e280a.exe 114 PID 1948 wrote to memory of 1944 1948 bc0db50e394ee39b57a709b77f5e280a.exe 114 PID 1948 wrote to memory of 1944 1948 bc0db50e394ee39b57a709b77f5e280a.exe 114 PID 1076 wrote to memory of 2352 1076 vannqpfk.exe 117 PID 1076 wrote to memory of 2352 1076 vannqpfk.exe 117 PID 1076 wrote to memory of 2352 1076 vannqpfk.exe 117 PID 1076 wrote to memory of 2352 1076 vannqpfk.exe 117 PID 1076 wrote to memory of 2352 1076 vannqpfk.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc0db50e394ee39b57a709b77f5e280a.exe"C:\Users\Admin\AppData\Local\Temp\bc0db50e394ee39b57a709b77f5e280a.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\wofdrdwj\2⤵PID:384
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\vannqpfk.exe" C:\Windows\SysWOW64\wofdrdwj\2⤵PID:4292
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create wofdrdwj binPath= "C:\Windows\SysWOW64\wofdrdwj\vannqpfk.exe /d\"C:\Users\Admin\AppData\Local\Temp\bc0db50e394ee39b57a709b77f5e280a.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:688
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description wofdrdwj "wifi internet conection"2⤵
- Launches sc.exe
PID:3988
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start wofdrdwj2⤵
- Launches sc.exe
PID:1792
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2824 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:4596
-
C:\Windows\SysWOW64\wofdrdwj\vannqpfk.exeC:\Windows\SysWOW64\wofdrdwj\vannqpfk.exe /d"C:\Users\Admin\AppData\Local\Temp\bc0db50e394ee39b57a709b77f5e280a.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.7MB
MD5d949cffe5e3692b8ee1a9fec7a37be27
SHA1469ccc0d10b71a0caf851b7c43a012af09a8c7e2
SHA256ddb8e4575c2dde9a56292a1d2d903d31ef1754cfeba86668dcc36d644e1b96ef
SHA5129b269a6ae0e73f0ba9d3c6c3a202edd6a23791e7430e8d0b6389669207374ddd87f0dc641cfe7b9a941dc60c183878623a379dfea6f3f7e2a5b3d88809bf82e9