Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
60s -
max time network
133s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
03/02/2022, 06:14
Static task
static1
Behavioral task
behavioral1
Sample
2f848ea94d4a48694c68e472882222c054d12797c0f7eabd7ebdb9daebd27ece.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
2f848ea94d4a48694c68e472882222c054d12797c0f7eabd7ebdb9daebd27ece.exe
Resource
win10v2004-en-20220112
General
-
Target
2f848ea94d4a48694c68e472882222c054d12797c0f7eabd7ebdb9daebd27ece.exe
-
Size
605KB
-
MD5
b06ca9689a517fa053a77ebce8fab696
-
SHA1
06691dda8b7f412ba4c31f2f78678acbc8262881
-
SHA256
2f848ea94d4a48694c68e472882222c054d12797c0f7eabd7ebdb9daebd27ece
-
SHA512
9af05fe8d4b2ecb0abcc3283af18950912cc0888bc1a98b3f9164cd839c41ddf6a2dea2c62dfcaaf8b53dac0eb8255ef6527e3f81f6908677d1ed5bce557e917
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
10203040eam.
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1624 systems.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\systems.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\systems.exe cmd.exe -
Loads dropped DLL 4 IoCs
pid Process 2044 2f848ea94d4a48694c68e472882222c054d12797c0f7eabd7ebdb9daebd27ece.exe 2044 2f848ea94d4a48694c68e472882222c054d12797c0f7eabd7ebdb9daebd27ece.exe 2044 2f848ea94d4a48694c68e472882222c054d12797c0f7eabd7ebdb9daebd27ece.exe 2044 2f848ea94d4a48694c68e472882222c054d12797c0f7eabd7ebdb9daebd27ece.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ifconfig.me -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1624 systems.exe 1624 systems.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeShutdownPrivilege 668 shutdown.exe Token: SeRemoteShutdownPrivilege 668 shutdown.exe Token: SeDebugPrivilege 1624 systems.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1624 systems.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1624 2044 2f848ea94d4a48694c68e472882222c054d12797c0f7eabd7ebdb9daebd27ece.exe 27 PID 2044 wrote to memory of 1624 2044 2f848ea94d4a48694c68e472882222c054d12797c0f7eabd7ebdb9daebd27ece.exe 27 PID 2044 wrote to memory of 1624 2044 2f848ea94d4a48694c68e472882222c054d12797c0f7eabd7ebdb9daebd27ece.exe 27 PID 2044 wrote to memory of 1624 2044 2f848ea94d4a48694c68e472882222c054d12797c0f7eabd7ebdb9daebd27ece.exe 27 PID 2044 wrote to memory of 964 2044 2f848ea94d4a48694c68e472882222c054d12797c0f7eabd7ebdb9daebd27ece.exe 28 PID 2044 wrote to memory of 964 2044 2f848ea94d4a48694c68e472882222c054d12797c0f7eabd7ebdb9daebd27ece.exe 28 PID 2044 wrote to memory of 964 2044 2f848ea94d4a48694c68e472882222c054d12797c0f7eabd7ebdb9daebd27ece.exe 28 PID 2044 wrote to memory of 964 2044 2f848ea94d4a48694c68e472882222c054d12797c0f7eabd7ebdb9daebd27ece.exe 28 PID 964 wrote to memory of 648 964 WScript.exe 29 PID 964 wrote to memory of 648 964 WScript.exe 29 PID 964 wrote to memory of 648 964 WScript.exe 29 PID 964 wrote to memory of 648 964 WScript.exe 29 PID 648 wrote to memory of 668 648 cmd.exe 31 PID 648 wrote to memory of 668 648 cmd.exe 31 PID 648 wrote to memory of 668 648 cmd.exe 31 PID 648 wrote to memory of 668 648 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f848ea94d4a48694c68e472882222c054d12797c0f7eabd7ebdb9daebd27ece.exe"C:\Users\Admin\AppData\Local\Temp\2f848ea94d4a48694c68e472882222c054d12797c0f7eabd7ebdb9daebd27ece.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Public\Downloads\systems.exe"C:\Users\Public\Downloads\systems.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1624
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\Downloads\vbs.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Public\Downloads\vbs.bat" "3⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\shutdown.exeshutdown -r -t 454⤵
- Suspicious use of AdjustPrivilegeToken
PID:668
-
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1528
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1704