Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 01:50
Static task
static1
Behavioral task
behavioral1
Sample
cc71d844883eb09ccb3017bb2d62fb10N.exe
Resource
win7-20240903-en
General
-
Target
cc71d844883eb09ccb3017bb2d62fb10N.exe
-
Size
147KB
-
MD5
cc71d844883eb09ccb3017bb2d62fb10
-
SHA1
012dc373f5b47b2e460b8cd462ea83ae3a0ec6cb
-
SHA256
64ceda1fdba5d3c4eae4beab2e205cd1cfc7e31f06c9c0eba3d1f1c7a9c4cb70
-
SHA512
e0a4cae6f8fa598621a42fd102a559108d742aa5425177c964c98c79caab5c443327fa78700a7a87db12f8849fdb7b02a1a6cff2c3452dfe37dab36e3536621a
-
SSDEEP
3072:ASABNx6hb4RoI4yMIqyphIOfVP3otljtqWkBNp4u1kH8im:Al6ZiiOSP0BL4wZ
Malware Config
Signatures
-
Blocklisted process makes network request 8 IoCs
flow pid Process 16 5000 rundll32.exe 24 5000 rundll32.exe 25 5000 rundll32.exe 26 5000 rundll32.exe 39 5000 rundll32.exe 40 5000 rundll32.exe 44 5000 rundll32.exe 50 5000 rundll32.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0004000000022f92-8.dat acprotect -
Deletes itself 1 IoCs
pid Process 3948 xiqpo.exe -
Executes dropped EXE 1 IoCs
pid Process 3948 xiqpo.exe -
Loads dropped DLL 1 IoCs
pid Process 5000 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x0004000000022f92-8.dat upx behavioral2/memory/5000-10-0x0000000010000000-0x0000000010024000-memory.dmp upx behavioral2/memory/5000-11-0x0000000010000000-0x0000000010024000-memory.dmp upx behavioral2/memory/5000-13-0x0000000010000000-0x0000000010024000-memory.dmp upx behavioral2/memory/5000-15-0x0000000010000000-0x0000000010024000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\EvtMgr = "c:\\windows\\SysWOW64\\rundll32.exe \"c:\\ueoyra\\tdvqi.dll\",DoVirusScan" rundll32.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\g: rundll32.exe File opened (read-only) \??\h: rundll32.exe File opened (read-only) \??\p: rundll32.exe File opened (read-only) \??\v: rundll32.exe File opened (read-only) \??\j: rundll32.exe File opened (read-only) \??\l: rundll32.exe File opened (read-only) \??\m: rundll32.exe File opened (read-only) \??\t: rundll32.exe File opened (read-only) \??\x: rundll32.exe File opened (read-only) \??\r: rundll32.exe File opened (read-only) \??\s: rundll32.exe File opened (read-only) \??\b: rundll32.exe File opened (read-only) \??\e: rundll32.exe File opened (read-only) \??\i: rundll32.exe File opened (read-only) \??\n: rundll32.exe File opened (read-only) \??\q: rundll32.exe File opened (read-only) \??\y: rundll32.exe File opened (read-only) \??\z: rundll32.exe File opened (read-only) \??\a: rundll32.exe File opened (read-only) \??\k: rundll32.exe File opened (read-only) \??\o: rundll32.exe File opened (read-only) \??\u: rundll32.exe File opened (read-only) \??\w: rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc71d844883eb09ccb3017bb2d62fb10N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xiqpo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 832 PING.EXE 3088 cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 832 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe 5000 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5000 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 668 cc71d844883eb09ccb3017bb2d62fb10N.exe 3948 xiqpo.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 668 wrote to memory of 3088 668 cc71d844883eb09ccb3017bb2d62fb10N.exe 86 PID 668 wrote to memory of 3088 668 cc71d844883eb09ccb3017bb2d62fb10N.exe 86 PID 668 wrote to memory of 3088 668 cc71d844883eb09ccb3017bb2d62fb10N.exe 86 PID 3088 wrote to memory of 832 3088 cmd.exe 88 PID 3088 wrote to memory of 832 3088 cmd.exe 88 PID 3088 wrote to memory of 832 3088 cmd.exe 88 PID 3088 wrote to memory of 3948 3088 cmd.exe 90 PID 3088 wrote to memory of 3948 3088 cmd.exe 90 PID 3088 wrote to memory of 3948 3088 cmd.exe 90 PID 3948 wrote to memory of 5000 3948 xiqpo.exe 91 PID 3948 wrote to memory of 5000 3948 xiqpo.exe 91 PID 3948 wrote to memory of 5000 3948 xiqpo.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc71d844883eb09ccb3017bb2d62fb10N.exe"C:\Users\Admin\AppData\Local\Temp\cc71d844883eb09ccb3017bb2d62fb10N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 -n 2&c:\xiqpo.exe "C:\Users\Admin\AppData\Local\Temp\cc71d844883eb09ccb3017bb2d62fb10N.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:832
-
-
\??\c:\xiqpo.exec:\xiqpo.exe "C:\Users\Admin\AppData\Local\Temp\cc71d844883eb09ccb3017bb2d62fb10N.exe"3⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3948 -
\??\c:\windows\SysWOW64\rundll32.exec:\windows\system32\rundll32.exe "c:\ueoyra\tdvqi.dll",DoVirusScan c:\xiqpo.exe4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147KB
MD5eaa39f1f80a223a341f10ecc628707df
SHA11d29ebcd5921fd2217935dbad7709eb3b834f727
SHA2560d8389f2b04879709a9fa39ec7276491ba795362f040cb8518b853e4f872183b
SHA5125af26cb07045d05bd8f337da6ff3fbaf821b9c6a03bc131a2b3f7e6258c0da7d3248737179ad8a19742b4397292c6261528fda2c8291afc567e07a0f58228e13
-
Filesize
46KB
MD540257501b15ab70b2086d612926f598c
SHA1535f7ceef59df4ec200fd543b81b5a0f5fb15cf2
SHA2569619188ea685e15d82504d0e566187809080e5ca535dc3ad2ed0fdc986c94083
SHA512ad6ec46bd6e4556bd8fd5afe409e4086ead6d65c724669ffd5a98ab3e9dbc185d41e66d00f935aa82d2b3e03bfe9b75cd09e2ce1de70c6343d3d62ba7d443a9b