Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 06:08
Static task
static1
Behavioral task
behavioral1
Sample
c0970a7ba4c8a986c168aecce3514561ebb6d97672631642b4f44c11a42a4fa5.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c0970a7ba4c8a986c168aecce3514561ebb6d97672631642b4f44c11a42a4fa5.exe
Resource
win10v2004-20240709-en
General
-
Target
c0970a7ba4c8a986c168aecce3514561ebb6d97672631642b4f44c11a42a4fa5.exe
-
Size
408KB
-
MD5
720cba07a7923c7462732a8c100408c4
-
SHA1
b8bdea7d977fd34b63d9b531d4231d891e386f60
-
SHA256
c0970a7ba4c8a986c168aecce3514561ebb6d97672631642b4f44c11a42a4fa5
-
SHA512
72a9e4a6276cf992b9bd0deb48196574a39b0495cac8f72f6db70cb1bccf13d99f227966ec1cc5d698c1921768426b872d87e423bc9ef806436721d05fe3f030
-
SSDEEP
6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4g:gtRfJcNYFNm8UhlZGseg
Malware Config
Signatures
-
Blocklisted process makes network request 8 IoCs
flow pid Process 21 2632 rundll32.exe 29 2632 rundll32.exe 30 2632 rundll32.exe 31 2632 rundll32.exe 45 2632 rundll32.exe 46 2632 rundll32.exe 53 2632 rundll32.exe 70 2632 rundll32.exe -
Deletes itself 1 IoCs
pid Process 2608 wmkwu.exe -
Executes dropped EXE 1 IoCs
pid Process 2608 wmkwu.exe -
Loads dropped DLL 1 IoCs
pid Process 2632 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Dotx = "c:\\windows\\SysWOW64\\rundll32.exe \"c:\\Program Files\\ztbfl\\bbbtn.dll\",Verify" rundll32.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\o: rundll32.exe File opened (read-only) \??\u: rundll32.exe File opened (read-only) \??\y: rundll32.exe File opened (read-only) \??\h: rundll32.exe File opened (read-only) \??\j: rundll32.exe File opened (read-only) \??\m: rundll32.exe File opened (read-only) \??\n: rundll32.exe File opened (read-only) \??\s: rundll32.exe File opened (read-only) \??\v: rundll32.exe File opened (read-only) \??\z: rundll32.exe File opened (read-only) \??\b: rundll32.exe File opened (read-only) \??\g: rundll32.exe File opened (read-only) \??\l: rundll32.exe File opened (read-only) \??\q: rundll32.exe File opened (read-only) \??\t: rundll32.exe File opened (read-only) \??\w: rundll32.exe File opened (read-only) \??\a: rundll32.exe File opened (read-only) \??\e: rundll32.exe File opened (read-only) \??\i: rundll32.exe File opened (read-only) \??\k: rundll32.exe File opened (read-only) \??\p: rundll32.exe File opened (read-only) \??\r: rundll32.exe File opened (read-only) \??\x: rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2632 rundll32.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification \??\c:\Program Files\ztbfl wmkwu.exe File created \??\c:\Program Files\ztbfl\bbbtn.dll wmkwu.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0970a7ba4c8a986c168aecce3514561ebb6d97672631642b4f44c11a42a4fa5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmkwu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 540 cmd.exe 1376 PING.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1376 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2632 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2020 c0970a7ba4c8a986c168aecce3514561ebb6d97672631642b4f44c11a42a4fa5.exe 2608 wmkwu.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2020 wrote to memory of 540 2020 c0970a7ba4c8a986c168aecce3514561ebb6d97672631642b4f44c11a42a4fa5.exe 85 PID 2020 wrote to memory of 540 2020 c0970a7ba4c8a986c168aecce3514561ebb6d97672631642b4f44c11a42a4fa5.exe 85 PID 2020 wrote to memory of 540 2020 c0970a7ba4c8a986c168aecce3514561ebb6d97672631642b4f44c11a42a4fa5.exe 85 PID 540 wrote to memory of 1376 540 cmd.exe 88 PID 540 wrote to memory of 1376 540 cmd.exe 88 PID 540 wrote to memory of 1376 540 cmd.exe 88 PID 540 wrote to memory of 2608 540 cmd.exe 90 PID 540 wrote to memory of 2608 540 cmd.exe 90 PID 540 wrote to memory of 2608 540 cmd.exe 90 PID 2608 wrote to memory of 2632 2608 wmkwu.exe 91 PID 2608 wrote to memory of 2632 2608 wmkwu.exe 91 PID 2608 wrote to memory of 2632 2608 wmkwu.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0970a7ba4c8a986c168aecce3514561ebb6d97672631642b4f44c11a42a4fa5.exe"C:\Users\Admin\AppData\Local\Temp\c0970a7ba4c8a986c168aecce3514561ebb6d97672631642b4f44c11a42a4fa5.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 -n 2&C:\Users\Admin\AppData\Local\Temp\\wmkwu.exe "C:\Users\Admin\AppData\Local\Temp\c0970a7ba4c8a986c168aecce3514561ebb6d97672631642b4f44c11a42a4fa5.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1376
-
-
C:\Users\Admin\AppData\Local\Temp\wmkwu.exeC:\Users\Admin\AppData\Local\Temp\\wmkwu.exe "C:\Users\Admin\AppData\Local\Temp\c0970a7ba4c8a986c168aecce3514561ebb6d97672631642b4f44c11a42a4fa5.exe"3⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
\??\c:\windows\SysWOW64\rundll32.exec:\windows\system32\rundll32.exe "c:\Program Files\ztbfl\bbbtn.dll",Verify C:\Users\Admin\AppData\Local\Temp\wmkwu.exe4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5f1969bf50961e48d657aefc102517bab
SHA1679bfcfb58c92d9f3432de3cc49b58ae0c7074c2
SHA256f76ed270d45ba452f0a44227fc84b1634be7f01350438eed6e868c56831cf3fa
SHA512fd76329bc97b03a1b2bb0241e35df29cb0f40e6046313bc7f3256b1bab61d69feefd5b3b43b98981efef4f2d8a97544b0d651643ce2376d59ebab3bbcc0068c4
-
Filesize
228KB
MD59824e1b5d8794f87e86445e6bea25f7e
SHA115cf2bae4172e7f07eb026e638a6026bee82a9d3
SHA2568d04c423b89ba0f6879f0d50079a4a4c35237a9c95ce6d8ac0ca221047eb198a
SHA5122dc863ede53a7e305fed954d6c54b520470c08bf07be3c73104b8d9fde608fa33c93ea24908153ce22ad5981196508f8b9b892ab6e0a521c975c862b76c1d671