Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
895s -
max time network
889s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2025, 21:11
Behavioral task
behavioral1
Sample
rad59AD5.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
rad59AD5.dll
Resource
win11-20241007-en
General
-
Target
rad59AD5.dll
-
Size
53KB
-
MD5
1a28984d6db3abdb967c0c19b56f887d
-
SHA1
b815a93dedd5575a77b5fa9c0d77a9bc783cdb27
-
SHA256
b2b67092d3978b0a199c949591bb1872cbc49b91494726a513be407abc2ca6a9
-
SHA512
63e255c48e9c36485e6e7bc31319fd407027829713cef93dd61edf132949ce3c2de741a70f6ba90347e3d0aa7112acc95b71a7405711eab925f5a491cd5d513f
-
SSDEEP
768:g9QHl5zJLsXpwnPA9KYMGZC7SNichPH/kGFyHxr6a6GPxxoqMo5ydqP+qL3i3:g2dJn7dSfjof2Jo5PM
Malware Config
Extracted
warmcookie
149.248.58.85
-
mutex
3e4d7a5b-aa72-4d5f-8f8c-b292257af55c
-
user_agent
Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0
Signatures
-
Warmcookie family
-
Warmcookie, Badspace
Warmcookie aka Badspace is a backdoor written in C++.
-
Blocklisted process makes network request 13 IoCs
flow pid Process 31 1680 rundll32.exe 44 1680 rundll32.exe 45 1680 rundll32.exe 46 1680 rundll32.exe 53 1680 rundll32.exe 54 1680 rundll32.exe 56 1680 rundll32.exe 57 1680 rundll32.exe 58 1680 rundll32.exe 59 1680 rundll32.exe 60 1680 rundll32.exe 61 1680 rundll32.exe 62 1680 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 1680 rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\SoftServe.job regsvr32.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ rundll32.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\rad59AD5.dll1⤵
- Drops file in Windows directory
PID:4752
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe "C:\ProgramData\SoftServe\Updater.dll",Start /u1⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Modifies data under HKEY_USERS
PID:1680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD51a28984d6db3abdb967c0c19b56f887d
SHA1b815a93dedd5575a77b5fa9c0d77a9bc783cdb27
SHA256b2b67092d3978b0a199c949591bb1872cbc49b91494726a513be407abc2ca6a9
SHA51263e255c48e9c36485e6e7bc31319fd407027829713cef93dd61edf132949ce3c2de741a70f6ba90347e3d0aa7112acc95b71a7405711eab925f5a491cd5d513f