Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/01/2025, 21:22
Static task
static1
Behavioral task
behavioral1
Sample
l.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
l.js
Resource
win10v2004-20241007-en
General
-
Target
l.js
-
Size
747KB
-
MD5
97835729c58cae6501e9b3a3776e9906
-
SHA1
63012f62e00a491b83adaba8804d890ac809490a
-
SHA256
a75cab3593ad35620817235a9bd7938c7adaa8b3ce12a2da20e3e145ac304346
-
SHA512
0ed5d7c90dbb260a732dd990d40a69f0997f8390db0a4cecc18349965e052e13ff8f5ecb709b95b176cc7e3686fbb08775e4b97b2253aa7aef9a1212607e8964
-
SSDEEP
12288:q/VoiDR8Cx2ouvoqEZTwXasSNKF+uV6VBEx2:q/Vok2tI+w
Malware Config
Extracted
warmcookie
149.248.58.85
-
mutex
3e4d7a5b-aa72-4d5f-8f8c-b292257af55c
-
user_agent
Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0
Signatures
-
Warmcookie family
-
Warmcookie, Badspace
Warmcookie aka Badspace is a backdoor written in C++.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 1228 rundll32.exe -
Loads dropped DLL 5 IoCs
pid Process 2448 msiexec.EXE 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe 1228 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
pid Process 2368 certutil.EXE -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\SynergyTop.job msiexec.EXE -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\da-26-4b-38-02-0f\WpadDecision = "0" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\da-26-4b-38-02-0f rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C38A7C33-C812-4E71-BCA9-2E32D765537B} rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C38A7C33-C812-4E71-BCA9-2E32D765537B}\WpadDecisionTime = 80b679986f6fdb01 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C38A7C33-C812-4E71-BCA9-2E32D765537B}\WpadNetworkName = "Network 3" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C38A7C33-C812-4E71-BCA9-2E32D765537B}\da-26-4b-38-02-0f rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C38A7C33-C812-4E71-BCA9-2E32D765537B}\WpadDecision = "0" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\da-26-4b-38-02-0f\WpadDecisionReason = "1" rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\da-26-4b-38-02-0f\WpadDecisionTime = 80b679986f6fdb01 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C38A7C33-C812-4E71-BCA9-2E32D765537B}\WpadDecisionReason = "1" rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2368 2672 taskeng.exe 31 PID 2672 wrote to memory of 2368 2672 taskeng.exe 31 PID 2672 wrote to memory of 2368 2672 taskeng.exe 31 PID 2672 wrote to memory of 2448 2672 taskeng.exe 34 PID 2672 wrote to memory of 2448 2672 taskeng.exe 34 PID 2672 wrote to memory of 2448 2672 taskeng.exe 34 PID 2672 wrote to memory of 2448 2672 taskeng.exe 34 PID 2672 wrote to memory of 2448 2672 taskeng.exe 34 PID 320 wrote to memory of 1228 320 taskeng.exe 36 PID 320 wrote to memory of 1228 320 taskeng.exe 36 PID 320 wrote to memory of 1228 320 taskeng.exe 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\l.js1⤵PID:2660
-
C:\Windows\system32\taskeng.exetaskeng.exe {D533E812-0FAB-40DE-AEBB-24D5C2B3932B} S-1-5-21-3290804112-2823094203-3137964600-1000:VORHPBAB\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\system32\certutil.EXEC:\Windows\system32\certutil.EXE -decode radF29BF.tmp rad4C855.tmp2⤵
- Deobfuscate/Decode Files or Information
PID:2368
-
-
C:\Windows\system32\msiexec.EXEC:\Windows\system32\msiexec.EXE /y C:\Users\Admin\AppData\Local\Temp\rad4C855.tmp2⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:2448
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {626A66DB-36BE-46ED-A259-A01245904C86} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe "C:\ProgramData\SynergyTop\Updater.dll",Start /u2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD51a28984d6db3abdb967c0c19b56f887d
SHA1b815a93dedd5575a77b5fa9c0d77a9bc783cdb27
SHA256b2b67092d3978b0a199c949591bb1872cbc49b91494726a513be407abc2ca6a9
SHA51263e255c48e9c36485e6e7bc31319fd407027829713cef93dd61edf132949ce3c2de741a70f6ba90347e3d0aa7112acc95b71a7405711eab925f5a491cd5d513f
-
Filesize
71KB
MD576e5a2cad9cc7f4d716f68bcb952b068
SHA10a249123c5f2c6f49cd7e650323e9eadb19f7e07
SHA256e4e8ad7da6aedb908e277c4e5ee733c9e29acd2268aaf91d1341eeb55b3fb806
SHA5126ad6910d26efa258faeedc03df2b9df4f295294be66a9701c577f107e975d8a00022c89f95f986e1aa85bcfdad0d8ee6faad32e17701ce56b59542642925ee78