Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
15/04/2024, 11:31
240415-nmzycsff4y 1010/04/2024, 04:57
240410-fljwradc86 1010/04/2024, 04:57
240410-flcsfadc82 1010/04/2024, 04:57
240410-flb6xadc78 1010/04/2024, 04:57
240410-flbkdadc77 1019/12/2023, 13:06
231219-qcfg3sadbq 10Analysis
-
max time kernel
600s -
max time network
603s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 04:57
Behavioral task
behavioral1
Sample
2d3ba7dd14b9a579b2626fa5baee19bd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2d3ba7dd14b9a579b2626fa5baee19bd.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
2d3ba7dd14b9a579b2626fa5baee19bd.exe
Resource
win10v2004-20240226-en
General
-
Target
2d3ba7dd14b9a579b2626fa5baee19bd.exe
-
Size
209KB
-
MD5
2d3ba7dd14b9a579b2626fa5baee19bd
-
SHA1
dd365103583cfb3c10b73efc6592f8b80c1d75e0
-
SHA256
42a191ee4f9593db8f514cce85ad8b9d6533bc71983a9529e7a5d68764d21679
-
SHA512
29efd1035df73572efea0d96017772481b9858855c12d1bb96fc6a4ccd49443a4bb0d1bd86c69dda4218f04e8855ec37c4515157b75a240a530792232c4f03c0
-
SSDEEP
6144:YDnLgI91y1UkT57iJz/DpURWPSvHuUiYphu1UY:cnLh9yn52rpUR5vHuRYpM+Y
Malware Config
Extracted
systembc
yan0212.com:4039
yan0212.net:4039
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2624 dfrwhg.exe -
resource yara_rule behavioral1/files/0x000c000000012266-6.dat upx -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 88.216.223.5 -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org 6 api.ipify.org 7 ip4.seeip.org 8 ip4.seeip.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\dfrwhg.job 2d3ba7dd14b9a579b2626fa5baee19bd.exe File opened for modification C:\Windows\Tasks\dfrwhg.job 2d3ba7dd14b9a579b2626fa5baee19bd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2228 2d3ba7dd14b9a579b2626fa5baee19bd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2624 2516 taskeng.exe 29 PID 2516 wrote to memory of 2624 2516 taskeng.exe 29 PID 2516 wrote to memory of 2624 2516 taskeng.exe 29 PID 2516 wrote to memory of 2624 2516 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d3ba7dd14b9a579b2626fa5baee19bd.exe"C:\Users\Admin\AppData\Local\Temp\2d3ba7dd14b9a579b2626fa5baee19bd.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2228
-
C:\Windows\system32\taskeng.exetaskeng.exe {6120E1B9-2E10-4831-82E1-7B4FBA4E6ADA} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\ProgramData\arcbjv\dfrwhg.exeC:\ProgramData\arcbjv\dfrwhg.exe start2⤵
- Executes dropped EXE
PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD52d3ba7dd14b9a579b2626fa5baee19bd
SHA1dd365103583cfb3c10b73efc6592f8b80c1d75e0
SHA25642a191ee4f9593db8f514cce85ad8b9d6533bc71983a9529e7a5d68764d21679
SHA51229efd1035df73572efea0d96017772481b9858855c12d1bb96fc6a4ccd49443a4bb0d1bd86c69dda4218f04e8855ec37c4515157b75a240a530792232c4f03c0