Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
309s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
submitted
08/11/2024, 03:41
Behavioral task
behavioral1
Sample
08112024_0341_24102024_Updater.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
08112024_0341_24102024_Updater.dll
Resource
win10v2004-20241007-en
General
-
Target
08112024_0341_24102024_Updater.dll
-
Size
129KB
-
MD5
e08edc1510052adc297d6af47022a70b
-
SHA1
f08af6d4a2f9655beb8219aca5711400efed8670
-
SHA256
915a80abb43f04fcdfb9ba2ced3b38f3524c050b6c0a36d97f4e7827916248b2
-
SHA512
2b91019e3d96b57362719b9bddb7b894239977266d23e2c8b9ebbcd93a9ba748491b96a92c1b4fd1876e74a3b7f3da99b89bb0e38a463a8ae9f357d9d9f66652
-
SSDEEP
3072:Jhw2Pja55J8hTGMjctYnc/F5ipfVMFY3lz:Jhwv55WT7ctiiF5cV
Malware Config
Extracted
warmcookie
-
mutex
65abfc80-a660-4691-a919-130dc9b75b98
Signatures
-
Warmcookie family
-
Warmcookie, Badspace
Warmcookie aka Badspace is a backdoor written in C++.
-
Blocklisted process makes network request 32 IoCs
flow pid Process 21 3976 rundll32.exe 22 3976 rundll32.exe 36 3976 rundll32.exe 37 3976 rundll32.exe 38 3976 rundll32.exe 39 3976 rundll32.exe 43 3976 rundll32.exe 44 3976 rundll32.exe 45 3976 rundll32.exe 50 3976 rundll32.exe 52 3976 rundll32.exe 53 3976 rundll32.exe 54 3976 rundll32.exe 55 3976 rundll32.exe 56 3976 rundll32.exe 61 3976 rundll32.exe 62 3976 rundll32.exe 63 3976 rundll32.exe 64 3976 rundll32.exe 65 3976 rundll32.exe 66 3976 rundll32.exe 67 3976 rundll32.exe 68 3976 rundll32.exe 69 3976 rundll32.exe 70 3976 rundll32.exe 71 3976 rundll32.exe 72 3976 rundll32.exe 73 3976 rundll32.exe 74 3976 rundll32.exe 75 3976 rundll32.exe 76 3976 rundll32.exe 77 3976 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 3976 rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\ValueLabs.job regsvr32.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" rundll32.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\08112024_0341_24102024_Updater.dll1⤵
- Drops file in Windows directory
PID:1824
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe "C:\ProgramData\ValueLabs\Updater.dll",Start /u1⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Modifies data under HKEY_USERS
PID:3976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129KB
MD5e08edc1510052adc297d6af47022a70b
SHA1f08af6d4a2f9655beb8219aca5711400efed8670
SHA256915a80abb43f04fcdfb9ba2ced3b38f3524c050b6c0a36d97f4e7827916248b2
SHA5122b91019e3d96b57362719b9bddb7b894239977266d23e2c8b9ebbcd93a9ba748491b96a92c1b4fd1876e74a3b7f3da99b89bb0e38a463a8ae9f357d9d9f66652