Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25/01/2025, 21:40
Static task
static1
Behavioral task
behavioral1
Sample
decoded-2.js
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
decoded-2.js
Resource
win10v2004-20241007-en
General
-
Target
decoded-2.js
-
Size
114KB
-
MD5
202ade5e6433d48697049f1962f1c87a
-
SHA1
cfead5849611f5e42092453afb7d3aa22174b223
-
SHA256
74a7adba42d14c4325d64bb93857d44e269a096815df71f24e5a38bd5351842d
-
SHA512
fa7ec940c62ede3bc1627a2f03922090ad114967efd15a7feea998b5abfa0ae9b48630d2376caaabe632a8aa1c7996d81dbcee0b9f9d30c6270f117650648685
-
SSDEEP
1536:UKucuwu/P9vckrgF4zjnAsR6KZs7/wpY0tOCMBh0ljjqcFs:UKFuf/P9UkG4zjCKo/eKBhYs
Malware Config
Extracted
warmcookie
149.248.58.85
-
mutex
3e4d7a5b-aa72-4d5f-8f8c-b292257af55c
-
user_agent
Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0
Signatures
-
Warmcookie family
-
Warmcookie, Badspace
Warmcookie aka Badspace is a backdoor written in C++.
-
Blocklisted process makes network request 2 IoCs
flow pid Process 4 1640 rundll32.exe 5 1640 rundll32.exe -
Loads dropped DLL 5 IoCs
pid Process 2720 msiexec.EXE 1640 rundll32.exe 1640 rundll32.exe 1640 rundll32.exe 1640 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
pid Process 2912 certutil.EXE -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Oxagile.job msiexec.EXE -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-5c-bb-df-80-0d\WpadDecision = "0" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5FC91993-FEF2-4AF3-A604-884C9D2E3A8F} rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5FC91993-FEF2-4AF3-A604-884C9D2E3A8F}\WpadNetworkName = "Network 3" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-5c-bb-df-80-0d rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-5c-bb-df-80-0d\WpadDecisionReason = "1" rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ca-5c-bb-df-80-0d\WpadDecisionTime = f070551c726fdb01 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5FC91993-FEF2-4AF3-A604-884C9D2E3A8F}\ca-5c-bb-df-80-0d rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5FC91993-FEF2-4AF3-A604-884C9D2E3A8F}\WpadDecisionReason = "1" rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5FC91993-FEF2-4AF3-A604-884C9D2E3A8F}\WpadDecisionTime = f070551c726fdb01 rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5FC91993-FEF2-4AF3-A604-884C9D2E3A8F}\WpadDecision = "0" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0076000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2912 2512 taskeng.exe 32 PID 2512 wrote to memory of 2912 2512 taskeng.exe 32 PID 2512 wrote to memory of 2912 2512 taskeng.exe 32 PID 2512 wrote to memory of 2720 2512 taskeng.exe 34 PID 2512 wrote to memory of 2720 2512 taskeng.exe 34 PID 2512 wrote to memory of 2720 2512 taskeng.exe 34 PID 2512 wrote to memory of 2720 2512 taskeng.exe 34 PID 2512 wrote to memory of 2720 2512 taskeng.exe 34 PID 2364 wrote to memory of 1640 2364 taskeng.exe 36 PID 2364 wrote to memory of 1640 2364 taskeng.exe 36 PID 2364 wrote to memory of 1640 2364 taskeng.exe 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\decoded-2.js1⤵PID:2308
-
C:\Windows\system32\taskeng.exetaskeng.exe {73391206-73EE-4D16-98F2-33AB1CE79806} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\system32\certutil.EXEC:\Windows\system32\certutil.EXE -decode radD3284.tmp rad47900.tmp2⤵
- Deobfuscate/Decode Files or Information
PID:2912
-
-
C:\Windows\system32\msiexec.EXEC:\Windows\system32\msiexec.EXE /y C:\Users\Admin\AppData\Local\Temp\rad47900.tmp2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2720
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {A92E072C-22D1-444B-A851-4D089E28B025} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe "C:\ProgramData\Oxagile\Updater.dll",Start /u2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD51a28984d6db3abdb967c0c19b56f887d
SHA1b815a93dedd5575a77b5fa9c0d77a9bc783cdb27
SHA256b2b67092d3978b0a199c949591bb1872cbc49b91494726a513be407abc2ca6a9
SHA51263e255c48e9c36485e6e7bc31319fd407027829713cef93dd61edf132949ce3c2de741a70f6ba90347e3d0aa7112acc95b71a7405711eab925f5a491cd5d513f
-
Filesize
71KB
MD576e5a2cad9cc7f4d716f68bcb952b068
SHA10a249123c5f2c6f49cd7e650323e9eadb19f7e07
SHA256e4e8ad7da6aedb908e277c4e5ee733c9e29acd2268aaf91d1341eeb55b3fb806
SHA5126ad6910d26efa258faeedc03df2b9df4f295294be66a9701c577f107e975d8a00022c89f95f986e1aa85bcfdad0d8ee6faad32e17701ce56b59542642925ee78