Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 01:54
Static task
static1
Behavioral task
behavioral1
Sample
cf52051f68630359830c5b2d6c9b8ff3b6e95c5667238787f2972accc0bc0201.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cf52051f68630359830c5b2d6c9b8ff3b6e95c5667238787f2972accc0bc0201.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
dovhbys.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
dovhbys.exe
Resource
win10v2004-20240426-en
General
-
Target
dovhbys.exe
-
Size
202KB
-
MD5
0bef3d69abb4fe0e2e175ce823b2aa55
-
SHA1
aef3193926ef341507fc931c1b375e19eb872bd3
-
SHA256
2e422f230bd4a88cc223995a131d6ce9316eea7087d84d059fc45a35af3ea26c
-
SHA512
f49e671ed2e8d0e029a214ed0b80b88b2f671ef2d1fd4f49b5da2fa64dd2d4fe2e73f615734a2f5222a5c5627474c55f54dae2f90d9b95df3c08b55fea27fbf0
-
SSDEEP
3072:0TkPSL1oCO72F8SgdU7sJJKGG/oADbA9McY2/mq3+Ag0FujqgA0e38:0IPSLSU8PdU7o0GuHAyc9uAOli8
Malware Config
Extracted
originbotnet
https://mmelak.com/gate
-
add_startup
false
-
download_folder_name
4si50kud.vpv
-
hide_file_startup
false
-
startup_directory_name
pRcub
-
startup_environment_name
appdata
-
startup_installation_name
pRcub.exe
-
startup_registry_name
pRcub
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
Signatures
-
OriginBotnet
OriginBotnet is a remote access trojan written in C#.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lueajenw = "C:\\Users\\Admin\\AppData\\Roaming\\afoj\\soxhdmvrbwgp.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\dovhbys.exe\"" dovhbys.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2792 set thread context of 5036 2792 dovhbys.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 4984 2792 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5036 dovhbys.exe 5036 dovhbys.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2792 dovhbys.exe 2792 dovhbys.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5036 dovhbys.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2792 wrote to memory of 3500 2792 dovhbys.exe 82 PID 2792 wrote to memory of 3500 2792 dovhbys.exe 82 PID 2792 wrote to memory of 3500 2792 dovhbys.exe 82 PID 2792 wrote to memory of 5036 2792 dovhbys.exe 83 PID 2792 wrote to memory of 5036 2792 dovhbys.exe 83 PID 2792 wrote to memory of 5036 2792 dovhbys.exe 83 PID 2792 wrote to memory of 5036 2792 dovhbys.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\dovhbys.exe"C:\Users\Admin\AppData\Local\Temp\dovhbys.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\dovhbys.exe"C:\Users\Admin\AppData\Local\Temp\dovhbys.exe"2⤵PID:3500
-
-
C:\Users\Admin\AppData\Local\Temp\dovhbys.exe"C:\Users\Admin\AppData\Local\Temp\dovhbys.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 6762⤵
- Program crash
PID:4984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2792 -ip 27921⤵PID:624