Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
292s -
max time network
263s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 05:03
Static task
static1
Behavioral task
behavioral1
Sample
0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.exe
Resource
win10-20240404-en
General
-
Target
0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.exe
-
Size
4.5MB
-
MD5
6fa8e5a9a19d422bdbf6a903599245dc
-
SHA1
91f466b0cdf818b6496a74ddef252bff25228ea1
-
SHA256
0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b
-
SHA512
2acd1a13dd49b53a94bf3e688a78099a7f10efebfde30c8865f3db967d8872c737a19c0d81e3f0c58bacbdda77419436d08c5523da2baf8df3221a221c1547bb
-
SSDEEP
98304:mkNLNdvxtsqhqUbfePSKcYFLseNdGw+TE0/SiLdl+8LA+14n6:3BdvxtsiqGOFLRuE0/SAd5546
Malware Config
Extracted
socks5systemz
cevjbgp.net
http://cevjbgp.net/search/?q=67e28dd83955a42b4006aa1b7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ee8889b5e4fa9281ae978f671ea771795af8e05c645db22f31df92d8b38e316a667d307eca743ec4c2b07b52966923a6e8cff14c4e69d
Signatures
-
Detect Socks5Systemz Payload 1 IoCs
resource yara_rule behavioral1/memory/2908-92-0x0000000002240000-0x00000000022E2000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Executes dropped EXE 3 IoCs
pid Process 2604 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp 2468 freeaudioextractor32.exe 2908 freeaudioextractor32.exe -
Loads dropped DLL 5 IoCs
pid Process 2964 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.exe 2604 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp 2604 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp 2604 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp 2604 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 45.155.250.90 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2604 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2604 2964 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.exe 28 PID 2964 wrote to memory of 2604 2964 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.exe 28 PID 2964 wrote to memory of 2604 2964 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.exe 28 PID 2964 wrote to memory of 2604 2964 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.exe 28 PID 2964 wrote to memory of 2604 2964 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.exe 28 PID 2964 wrote to memory of 2604 2964 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.exe 28 PID 2964 wrote to memory of 2604 2964 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.exe 28 PID 2604 wrote to memory of 2468 2604 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp 29 PID 2604 wrote to memory of 2468 2604 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp 29 PID 2604 wrote to memory of 2468 2604 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp 29 PID 2604 wrote to memory of 2468 2604 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp 29 PID 2604 wrote to memory of 2908 2604 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp 30 PID 2604 wrote to memory of 2908 2604 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp 30 PID 2604 wrote to memory of 2908 2604 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp 30 PID 2604 wrote to memory of 2908 2604 0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.exe"C:\Users\Admin\AppData\Local\Temp\0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\is-D97J6.tmp\0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp"C:\Users\Admin\AppData\Local\Temp\is-D97J6.tmp\0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp" /SL5="$400EA,4470656,54272,C:\Users\Admin\AppData\Local\Temp\0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Free Audio Extractor\freeaudioextractor32.exe"C:\Users\Admin\AppData\Local\Free Audio Extractor\freeaudioextractor32.exe" -i3⤵
- Executes dropped EXE
PID:2468
-
-
C:\Users\Admin\AppData\Local\Free Audio Extractor\freeaudioextractor32.exe"C:\Users\Admin\AppData\Local\Free Audio Extractor\freeaudioextractor32.exe" -s3⤵
- Executes dropped EXE
PID:2908
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD52163374e0f8a793fc02c4669173be198
SHA1a31156ca663956a5ce32834fd1a80935d4c3d66b
SHA25635ea091b35d4c50c4cf9f5b8e311f25648fd161ef50beee615fdbff0a905617b
SHA512fcd552e9b91e825e01ae9305f565b25c0a7e93adf13217b22c82344601f8d4c078fffb8ee39211e83084c241cf9b42244242273ada3077a00e8460f2022ceb8d
-
\Users\Admin\AppData\Local\Temp\is-D97J6.tmp\0c52f90830cb918ef112f9aa79d7737871d73785f207c35df19905bc91f91b8b.tmp
Filesize680KB
MD5be751b14a5f1bea2d2b2563a6b5d43e2
SHA1c8e6aab342703f3c0cb5f2d346ec02e7fb217443
SHA25659b3ba9039a9452887e018b15872a8a82971bd2c27b2987fb093e5057f1600fb
SHA51242545220bfefeba930e6c6f843e6bdcd7a78d157f4e419221a7914d429d402bb740760c83b4a636011fe1d30666b9d8354dca4f899dcaf035602d884509a8f94
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3