Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
599s -
max time network
598s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
25/01/2025, 21:28
Static task
static1
Behavioral task
behavioral1
Sample
decoded-2.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
decoded-2.js
Resource
win11-20241007-en
General
-
Target
decoded-2.js
-
Size
114KB
-
MD5
202ade5e6433d48697049f1962f1c87a
-
SHA1
cfead5849611f5e42092453afb7d3aa22174b223
-
SHA256
74a7adba42d14c4325d64bb93857d44e269a096815df71f24e5a38bd5351842d
-
SHA512
fa7ec940c62ede3bc1627a2f03922090ad114967efd15a7feea998b5abfa0ae9b48630d2376caaabe632a8aa1c7996d81dbcee0b9f9d30c6270f117650648685
-
SSDEEP
1536:UKucuwu/P9vckrgF4zjnAsR6KZs7/wpY0tOCMBh0ljjqcFs:UKFuf/P9UkG4zjCKo/eKBhYs
Malware Config
Extracted
warmcookie
149.248.58.85
-
mutex
3e4d7a5b-aa72-4d5f-8f8c-b292257af55c
-
user_agent
Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0
Signatures
-
Warmcookie family
-
Warmcookie, Badspace
Warmcookie aka Badspace is a backdoor written in C++.
-
Blocklisted process makes network request 17 IoCs
flow pid Process 4 4820 rundll32.exe 9 4820 rundll32.exe 10 4820 rundll32.exe 13 4820 rundll32.exe 14 4820 rundll32.exe 15 4820 rundll32.exe 16 4820 rundll32.exe 17 4820 rundll32.exe 18 4820 rundll32.exe 19 4820 rundll32.exe 20 4820 rundll32.exe 21 4820 rundll32.exe 23 4820 rundll32.exe 24 4820 rundll32.exe 25 4820 rundll32.exe 26 4820 rundll32.exe 27 4820 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 4832 msiexec.EXE 4820 rundll32.exe -
pid Process 2412 certutil.EXE -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Thinkship.job msiexec.EXE -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" rundll32.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\decoded-2.js1⤵PID:5856
-
C:\Windows\system32\certutil.EXEC:\Windows\system32\certutil.EXE -decode rad6579B.tmp rad9AC69.tmp1⤵
- Deobfuscate/Decode Files or Information
PID:2412
-
C:\Windows\system32\msiexec.EXEC:\Windows\system32\msiexec.EXE /y C:\Users\Admin\AppData\Local\Temp\rad9AC69.tmp1⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:4832
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe "C:\ProgramData\Thinkship\Updater.dll",Start /u1⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Modifies data under HKEY_USERS
PID:4820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD576e5a2cad9cc7f4d716f68bcb952b068
SHA10a249123c5f2c6f49cd7e650323e9eadb19f7e07
SHA256e4e8ad7da6aedb908e277c4e5ee733c9e29acd2268aaf91d1341eeb55b3fb806
SHA5126ad6910d26efa258faeedc03df2b9df4f295294be66a9701c577f107e975d8a00022c89f95f986e1aa85bcfdad0d8ee6faad32e17701ce56b59542642925ee78
-
Filesize
53KB
MD51a28984d6db3abdb967c0c19b56f887d
SHA1b815a93dedd5575a77b5fa9c0d77a9bc783cdb27
SHA256b2b67092d3978b0a199c949591bb1872cbc49b91494726a513be407abc2ca6a9
SHA51263e255c48e9c36485e6e7bc31319fd407027829713cef93dd61edf132949ce3c2de741a70f6ba90347e3d0aa7112acc95b71a7405711eab925f5a491cd5d513f