Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
62s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 13:48
Static task
static1
Behavioral task
behavioral1
Sample
6335442ffad41468574d80340b384a2452d94fc0b8d2d207a6a8a672bec6948fN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6335442ffad41468574d80340b384a2452d94fc0b8d2d207a6a8a672bec6948fN.exe
Resource
win10v2004-20241007-en
General
-
Target
6335442ffad41468574d80340b384a2452d94fc0b8d2d207a6a8a672bec6948fN.exe
-
Size
89KB
-
MD5
bfb425f1b26992ccb6ae077894377ce0
-
SHA1
0ec585bbd0df1e01a20e994e431e8d5e42fc6247
-
SHA256
6335442ffad41468574d80340b384a2452d94fc0b8d2d207a6a8a672bec6948f
-
SHA512
aa0fbd246e47f81a13a85db189425d1627a100180459051d60b3e1b2cacd7d4a3c780d47eac9dca2816c97ea79c0a5fddb8dad2ae27e6977181b665ad96615e1
-
SSDEEP
1536:kw+3p0/jQ3nlstlYv/vAdj4RTl5QZGbmsCIK282c8CPGCECa9bC7e3iaqWpOBMD:P+3pejQGlP2FliZGbmhD28Qxnd9GMHqI
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://master-x.com/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://crutop.ru/index.php
http://kaspersky.ru/index.php
http://color-bank.ru/index.php
http://adult-empire.com/index.php
http://virus-list.com/index.php
http://trojan.ru/index.php
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://fethard.biz/index.htm
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://kaspersky.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 6335442ffad41468574d80340b384a2452d94fc0b8d2d207a6a8a672bec6948fN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 6335442ffad41468574d80340b384a2452d94fc0b8d2d207a6a8a672bec6948fN.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eclcon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eclcon32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejabqi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ejabqi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eiilge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eiilge32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eebibf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eebibf32.exe -
Executes dropped EXE 5 IoCs
pid Process 2820 Ejabqi32.exe 2112 Eclcon32.exe 2172 Eiilge32.exe 2684 Eebibf32.exe 2148 Flnndp32.exe -
Loads dropped DLL 14 IoCs
pid Process 2880 6335442ffad41468574d80340b384a2452d94fc0b8d2d207a6a8a672bec6948fN.exe 2880 6335442ffad41468574d80340b384a2452d94fc0b8d2d207a6a8a672bec6948fN.exe 2820 Ejabqi32.exe 2820 Ejabqi32.exe 2112 Eclcon32.exe 2112 Eclcon32.exe 2172 Eiilge32.exe 2172 Eiilge32.exe 2684 Eebibf32.exe 2684 Eebibf32.exe 436 WerFault.exe 436 WerFault.exe 436 WerFault.exe 436 WerFault.exe -
Drops file in System32 directory 15 IoCs
description ioc Process File created C:\Windows\SysWOW64\Jcmfjeap.dll 6335442ffad41468574d80340b384a2452d94fc0b8d2d207a6a8a672bec6948fN.exe File created C:\Windows\SysWOW64\Mgnedp32.dll Ejabqi32.exe File created C:\Windows\SysWOW64\Eiilge32.exe Eclcon32.exe File created C:\Windows\SysWOW64\Onndkg32.dll Eebibf32.exe File created C:\Windows\SysWOW64\Eclcon32.exe Ejabqi32.exe File opened for modification C:\Windows\SysWOW64\Eiilge32.exe Eclcon32.exe File created C:\Windows\SysWOW64\Eccjdobp.dll Eclcon32.exe File created C:\Windows\SysWOW64\Eebibf32.exe Eiilge32.exe File created C:\Windows\SysWOW64\Ejabqi32.exe 6335442ffad41468574d80340b384a2452d94fc0b8d2d207a6a8a672bec6948fN.exe File opened for modification C:\Windows\SysWOW64\Eebibf32.exe Eiilge32.exe File created C:\Windows\SysWOW64\Mnmcojmg.dll Eiilge32.exe File created C:\Windows\SysWOW64\Flnndp32.exe Eebibf32.exe File opened for modification C:\Windows\SysWOW64\Flnndp32.exe Eebibf32.exe File opened for modification C:\Windows\SysWOW64\Ejabqi32.exe 6335442ffad41468574d80340b384a2452d94fc0b8d2d207a6a8a672bec6948fN.exe File opened for modification C:\Windows\SysWOW64\Eclcon32.exe Ejabqi32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 436 2148 WerFault.exe 34 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6335442ffad41468574d80340b384a2452d94fc0b8d2d207a6a8a672bec6948fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ejabqi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eclcon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eiilge32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eebibf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flnndp32.exe -
Modifies registry class 18 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 6335442ffad41468574d80340b384a2452d94fc0b8d2d207a6a8a672bec6948fN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eebibf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eclcon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mnmcojmg.dll" Eiilge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eiilge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 6335442ffad41468574d80340b384a2452d94fc0b8d2d207a6a8a672bec6948fN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ejabqi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eccjdobp.dll" Eclcon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ejabqi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eclcon32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eiilge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 6335442ffad41468574d80340b384a2452d94fc0b8d2d207a6a8a672bec6948fN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcmfjeap.dll" 6335442ffad41468574d80340b384a2452d94fc0b8d2d207a6a8a672bec6948fN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 6335442ffad41468574d80340b384a2452d94fc0b8d2d207a6a8a672bec6948fN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eebibf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 6335442ffad41468574d80340b384a2452d94fc0b8d2d207a6a8a672bec6948fN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mgnedp32.dll" Ejabqi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Onndkg32.dll" Eebibf32.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2820 2880 6335442ffad41468574d80340b384a2452d94fc0b8d2d207a6a8a672bec6948fN.exe 30 PID 2880 wrote to memory of 2820 2880 6335442ffad41468574d80340b384a2452d94fc0b8d2d207a6a8a672bec6948fN.exe 30 PID 2880 wrote to memory of 2820 2880 6335442ffad41468574d80340b384a2452d94fc0b8d2d207a6a8a672bec6948fN.exe 30 PID 2880 wrote to memory of 2820 2880 6335442ffad41468574d80340b384a2452d94fc0b8d2d207a6a8a672bec6948fN.exe 30 PID 2820 wrote to memory of 2112 2820 Ejabqi32.exe 31 PID 2820 wrote to memory of 2112 2820 Ejabqi32.exe 31 PID 2820 wrote to memory of 2112 2820 Ejabqi32.exe 31 PID 2820 wrote to memory of 2112 2820 Ejabqi32.exe 31 PID 2112 wrote to memory of 2172 2112 Eclcon32.exe 32 PID 2112 wrote to memory of 2172 2112 Eclcon32.exe 32 PID 2112 wrote to memory of 2172 2112 Eclcon32.exe 32 PID 2112 wrote to memory of 2172 2112 Eclcon32.exe 32 PID 2172 wrote to memory of 2684 2172 Eiilge32.exe 33 PID 2172 wrote to memory of 2684 2172 Eiilge32.exe 33 PID 2172 wrote to memory of 2684 2172 Eiilge32.exe 33 PID 2172 wrote to memory of 2684 2172 Eiilge32.exe 33 PID 2684 wrote to memory of 2148 2684 Eebibf32.exe 34 PID 2684 wrote to memory of 2148 2684 Eebibf32.exe 34 PID 2684 wrote to memory of 2148 2684 Eebibf32.exe 34 PID 2684 wrote to memory of 2148 2684 Eebibf32.exe 34 PID 2148 wrote to memory of 436 2148 Flnndp32.exe 35 PID 2148 wrote to memory of 436 2148 Flnndp32.exe 35 PID 2148 wrote to memory of 436 2148 Flnndp32.exe 35 PID 2148 wrote to memory of 436 2148 Flnndp32.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\6335442ffad41468574d80340b384a2452d94fc0b8d2d207a6a8a672bec6948fN.exe"C:\Users\Admin\AppData\Local\Temp\6335442ffad41468574d80340b384a2452d94fc0b8d2d207a6a8a672bec6948fN.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\Ejabqi32.exeC:\Windows\system32\Ejabqi32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\Eclcon32.exeC:\Windows\system32\Eclcon32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\Eiilge32.exeC:\Windows\system32\Eiilge32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\Eebibf32.exeC:\Windows\system32\Eebibf32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\Flnndp32.exeC:\Windows\system32\Flnndp32.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 1407⤵
- Loads dropped DLL
- Program crash
PID:436
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD56d392e6ee415a66e13729e66f73998be
SHA12d0c54981b9ca525dba3bd6b8d52bedce5df04eb
SHA256c99a5f2d1e2a06e2bb99b6dfa76673957468225fad5f730b9e580ed46d4e8b74
SHA512104b61ea0847076aac4bdde30e5e0b767e9019fac6a7591be51a7661d27a4342aff45f4ee43eed84c97e844990868959c835bf51fa325a17fa6e1c9ebab32d91
-
Filesize
89KB
MD5fb4cbc58884d1f5f0c4cc752f4971175
SHA19f060c643e7c20d70f12fba9c55b048e6e20ffec
SHA2564e47dec47fbfca2f419d771027d5c30f3e8115df99d30aa57ff695e376561dd8
SHA512999bf0b259eec6bfe6972c2dc2ddd12ea34a642f08df9b8197af112f4294cabf9f689a69f2d0c56ea6775e593a86b95adfb830444e54370f530fe97a2a0256d2
-
Filesize
89KB
MD5a609b380151f929c7d802fc103cdef75
SHA1c889a994dc27e5d2042a013eb2c3342c7f5c4323
SHA2564a8fe537838e4ec3743380fc5bf2c7263fe6ac3ab82c62559edbb78decaa9682
SHA51248bb6150a2c6d74093227551225612933fdb082ff9b6591374cbfa07ceb567e2e5bc55f475737426b993b1f816b4761faa9abb51be365f715ed8f28b9286a732
-
Filesize
89KB
MD5bd700fafd35dc51ce605c270fb59416d
SHA1ba1d003b78a92d1e37e197a251b79b750c330670
SHA256eba7c7655129cbb5f124a0318da4ea2f7a6875d2a2867f7441550bac2ce5878c
SHA5123d28ec0c71c33e77e3399ab32ddfd560adb313062850d92a1e5dcc837e2e9217c299bb5d961ad718ddb3e6e4525d37bbd6bd8ab7816f605eccc9a60194a6a0dc
-
Filesize
89KB
MD5db56dc94fac0673b46ed8162bca4285b
SHA17df718b3ab072d44ba053b446b00c079c26819aa
SHA256a6fe0a4d480b1ac076b70b7786124abdc15f711e3c1f3ab50e887b834702eb1f
SHA512a8bd99f72efbbffcba138b0b1baf0608e77538cabb8c24e247dc29d65faca567b231754be770f606115f694e9f8a1659a178ee7d8abd3b671101458a0f0195d7