Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
60s -
max time network
141s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
02/02/2022, 09:09
Static task
static1
Behavioral task
behavioral1
Sample
b06ca9689a517fa053a77ebce8fab696.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
b06ca9689a517fa053a77ebce8fab696.exe
Resource
win10v2004-en-20220113
General
-
Target
b06ca9689a517fa053a77ebce8fab696.exe
-
Size
605KB
-
MD5
b06ca9689a517fa053a77ebce8fab696
-
SHA1
06691dda8b7f412ba4c31f2f78678acbc8262881
-
SHA256
2f848ea94d4a48694c68e472882222c054d12797c0f7eabd7ebdb9daebd27ece
-
SHA512
9af05fe8d4b2ecb0abcc3283af18950912cc0888bc1a98b3f9164cd839c41ddf6a2dea2c62dfcaaf8b53dac0eb8255ef6527e3f81f6908677d1ed5bce557e917
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
10203040eam.
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1460 systems.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\systems.exe cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\systems.exe cmd.exe -
Loads dropped DLL 4 IoCs
pid Process 1476 b06ca9689a517fa053a77ebce8fab696.exe 1476 b06ca9689a517fa053a77ebce8fab696.exe 1476 b06ca9689a517fa053a77ebce8fab696.exe 1476 b06ca9689a517fa053a77ebce8fab696.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ifconfig.me -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1460 systems.exe 1460 systems.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1460 systems.exe Token: SeShutdownPrivilege 576 shutdown.exe Token: SeRemoteShutdownPrivilege 576 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1460 systems.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1476 wrote to memory of 1460 1476 b06ca9689a517fa053a77ebce8fab696.exe 27 PID 1476 wrote to memory of 1460 1476 b06ca9689a517fa053a77ebce8fab696.exe 27 PID 1476 wrote to memory of 1460 1476 b06ca9689a517fa053a77ebce8fab696.exe 27 PID 1476 wrote to memory of 1460 1476 b06ca9689a517fa053a77ebce8fab696.exe 27 PID 1476 wrote to memory of 1208 1476 b06ca9689a517fa053a77ebce8fab696.exe 28 PID 1476 wrote to memory of 1208 1476 b06ca9689a517fa053a77ebce8fab696.exe 28 PID 1476 wrote to memory of 1208 1476 b06ca9689a517fa053a77ebce8fab696.exe 28 PID 1476 wrote to memory of 1208 1476 b06ca9689a517fa053a77ebce8fab696.exe 28 PID 1208 wrote to memory of 676 1208 WScript.exe 29 PID 1208 wrote to memory of 676 1208 WScript.exe 29 PID 1208 wrote to memory of 676 1208 WScript.exe 29 PID 1208 wrote to memory of 676 1208 WScript.exe 29 PID 676 wrote to memory of 576 676 cmd.exe 31 PID 676 wrote to memory of 576 676 cmd.exe 31 PID 676 wrote to memory of 576 676 cmd.exe 31 PID 676 wrote to memory of 576 676 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b06ca9689a517fa053a77ebce8fab696.exe"C:\Users\Admin\AppData\Local\Temp\b06ca9689a517fa053a77ebce8fab696.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Public\Downloads\systems.exe"C:\Users\Public\Downloads\systems.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1460
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\Downloads\vbs.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Public\Downloads\vbs.bat" "3⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\SysWOW64\shutdown.exeshutdown -r -t 454⤵
- Suspicious use of AdjustPrivilegeToken
PID:576
-
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1652
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1724