Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 17:03
Static task
static1
Behavioral task
behavioral1
Sample
c12142a8710fe99c29101f78dd31d5d7.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c12142a8710fe99c29101f78dd31d5d7.exe
Resource
win10v2004-20240226-en
General
-
Target
c12142a8710fe99c29101f78dd31d5d7.exe
-
Size
13.5MB
-
MD5
c12142a8710fe99c29101f78dd31d5d7
-
SHA1
4c638ca8cdb0c581ba1323101b485973d724b917
-
SHA256
2dd88c2cf5f3ad49a46e6cfb88ec470423992ea5365fb55f7890af7e3d704662
-
SHA512
0944f49c54d4f488d55a477ff3767c72a3807148718e63745cf0795b570be48a7baf6fb3d5f19747918897c5cce588d1fcc60bbd6b91bfdc85de0546d9b64100
-
SSDEEP
49152:RT81MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMk:RT8
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2832 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\lbfumwrk\ImagePath = "C:\\Windows\\SysWOW64\\lbfumwrk\\ziqohjmm.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c12142a8710fe99c29101f78dd31d5d7.exe -
Executes dropped EXE 1 IoCs
pid Process 2272 ziqohjmm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2272 set thread context of 1756 2272 ziqohjmm.exe 110 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 920 sc.exe 708 sc.exe 4084 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2412 2268 c12142a8710fe99c29101f78dd31d5d7.exe 93 PID 2268 wrote to memory of 2412 2268 c12142a8710fe99c29101f78dd31d5d7.exe 93 PID 2268 wrote to memory of 2412 2268 c12142a8710fe99c29101f78dd31d5d7.exe 93 PID 2268 wrote to memory of 2124 2268 c12142a8710fe99c29101f78dd31d5d7.exe 97 PID 2268 wrote to memory of 2124 2268 c12142a8710fe99c29101f78dd31d5d7.exe 97 PID 2268 wrote to memory of 2124 2268 c12142a8710fe99c29101f78dd31d5d7.exe 97 PID 2268 wrote to memory of 920 2268 c12142a8710fe99c29101f78dd31d5d7.exe 99 PID 2268 wrote to memory of 920 2268 c12142a8710fe99c29101f78dd31d5d7.exe 99 PID 2268 wrote to memory of 920 2268 c12142a8710fe99c29101f78dd31d5d7.exe 99 PID 2268 wrote to memory of 708 2268 c12142a8710fe99c29101f78dd31d5d7.exe 102 PID 2268 wrote to memory of 708 2268 c12142a8710fe99c29101f78dd31d5d7.exe 102 PID 2268 wrote to memory of 708 2268 c12142a8710fe99c29101f78dd31d5d7.exe 102 PID 2268 wrote to memory of 4084 2268 c12142a8710fe99c29101f78dd31d5d7.exe 105 PID 2268 wrote to memory of 4084 2268 c12142a8710fe99c29101f78dd31d5d7.exe 105 PID 2268 wrote to memory of 4084 2268 c12142a8710fe99c29101f78dd31d5d7.exe 105 PID 2268 wrote to memory of 2832 2268 c12142a8710fe99c29101f78dd31d5d7.exe 108 PID 2268 wrote to memory of 2832 2268 c12142a8710fe99c29101f78dd31d5d7.exe 108 PID 2268 wrote to memory of 2832 2268 c12142a8710fe99c29101f78dd31d5d7.exe 108 PID 2272 wrote to memory of 1756 2272 ziqohjmm.exe 110 PID 2272 wrote to memory of 1756 2272 ziqohjmm.exe 110 PID 2272 wrote to memory of 1756 2272 ziqohjmm.exe 110 PID 2272 wrote to memory of 1756 2272 ziqohjmm.exe 110 PID 2272 wrote to memory of 1756 2272 ziqohjmm.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\c12142a8710fe99c29101f78dd31d5d7.exe"C:\Users\Admin\AppData\Local\Temp\c12142a8710fe99c29101f78dd31d5d7.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\lbfumwrk\2⤵PID:2412
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ziqohjmm.exe" C:\Windows\SysWOW64\lbfumwrk\2⤵PID:2124
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create lbfumwrk binPath= "C:\Windows\SysWOW64\lbfumwrk\ziqohjmm.exe /d\"C:\Users\Admin\AppData\Local\Temp\c12142a8710fe99c29101f78dd31d5d7.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:920
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description lbfumwrk "wifi internet conection"2⤵
- Launches sc.exe
PID:708
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start lbfumwrk2⤵
- Launches sc.exe
PID:4084
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2832
-
-
C:\Windows\SysWOW64\lbfumwrk\ziqohjmm.exeC:\Windows\SysWOW64\lbfumwrk\ziqohjmm.exe /d"C:\Users\Admin\AppData\Local\Temp\c12142a8710fe99c29101f78dd31d5d7.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
PID:1756
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.0MB
MD5d3c17467bae2d6dfcccbdfe968f8da0a
SHA1c80f292196be1efd7d961ed8a3d6217426ed9dd2
SHA2564bb83b605e62fc759319de8ff7a74bd4423dfb46571c3b1584060d7fecbc8110
SHA51209414bce31bed42cd1a28588dd340462a21882843bf508d4093b0ba646e7bd4271fb38c3440a1519cc7b3db7a7c2cb4112a5b21e573f76b127fe2a953f2f05b3
-
Filesize
11.2MB
MD5c886cda1cfd68dcfeb6096343544af3a
SHA160366def871ba9960843be7f689cf2d953ee839f
SHA256d6ca82bd0de0cfed411fcb06b958596d08278f03f822ef5d6605137d7bc51e67
SHA512787a87abbcc831ce7087a419f4c8413e9bd387935528a8b3dc7e2125aa3b60cd45cae6b4c7b833225fd33d9f61adcb55cc165c330d18bedb66659240624cfbce