Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
submitted
30/11/2024, 12:26
Behavioral task
behavioral1
Sample
f47144c7159be31d8116fdc36b66cb72c917cd91a4bbe9eaa55dec929c1cffdd.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f47144c7159be31d8116fdc36b66cb72c917cd91a4bbe9eaa55dec929c1cffdd.dll
Resource
win10v2004-20241007-en
General
-
Target
f47144c7159be31d8116fdc36b66cb72c917cd91a4bbe9eaa55dec929c1cffdd.dll
-
Size
129KB
-
MD5
80cd37d9eb33507bf054f32ce2380b09
-
SHA1
6e8d57dde537ace0639931569ae2b04b9cb99a26
-
SHA256
f47144c7159be31d8116fdc36b66cb72c917cd91a4bbe9eaa55dec929c1cffdd
-
SHA512
18f42496c4a66f11aa834e1db7f727ea7041882408a83be00f5ddacfbca439debe611f24eadd19e9453bc774d91d33d98ac25290791d501af2e706dc9ef89bde
-
SSDEEP
3072:Jhw2Pja55J8hTGMjctYnc/F5ipfVMFY1lz:Jhwv55WT7ctiiF5cv
Malware Config
Extracted
warmcookie
185.161.251.26
-
mutex
5bba9e40-0e32-4b7f-b39a-667bbc0c2293
-
user_agent
Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0
Signatures
-
Warmcookie family
-
Warmcookie, Badspace
Warmcookie aka Badspace is a backdoor written in C++.
-
Blocklisted process makes network request 10 IoCs
flow pid Process 31 4488 rundll32.exe 35 4488 rundll32.exe 39 4488 rundll32.exe 40 4488 rundll32.exe 47 4488 rundll32.exe 48 4488 rundll32.exe 49 4488 rundll32.exe 50 4488 rundll32.exe 51 4488 rundll32.exe 55 4488 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 4488 rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Tandem.job regsvr32.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" rundll32.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\f47144c7159be31d8116fdc36b66cb72c917cd91a4bbe9eaa55dec929c1cffdd.dll1⤵
- Drops file in Windows directory
PID:2844
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe "C:\ProgramData\Tandem\Updater.dll",Start /u1⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Modifies data under HKEY_USERS
PID:4488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129KB
MD580cd37d9eb33507bf054f32ce2380b09
SHA16e8d57dde537ace0639931569ae2b04b9cb99a26
SHA256f47144c7159be31d8116fdc36b66cb72c917cd91a4bbe9eaa55dec929c1cffdd
SHA51218f42496c4a66f11aa834e1db7f727ea7041882408a83be00f5ddacfbca439debe611f24eadd19e9453bc774d91d33d98ac25290791d501af2e706dc9ef89bde