Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    60s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    03/02/2022, 06:14

General

  • Target

    2f848ea94d4a48694c68e472882222c054d12797c0f7eabd7ebdb9daebd27ece.exe

  • Size

    605KB

  • MD5

    b06ca9689a517fa053a77ebce8fab696

  • SHA1

    06691dda8b7f412ba4c31f2f78678acbc8262881

  • SHA256

    2f848ea94d4a48694c68e472882222c054d12797c0f7eabd7ebdb9daebd27ece

  • SHA512

    9af05fe8d4b2ecb0abcc3283af18950912cc0888bc1a98b3f9164cd839c41ddf6a2dea2c62dfcaaf8b53dac0eb8255ef6527e3f81f6908677d1ed5bce557e917

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    10203040eam.

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f848ea94d4a48694c68e472882222c054d12797c0f7eabd7ebdb9daebd27ece.exe
    "C:\Users\Admin\AppData\Local\Temp\2f848ea94d4a48694c68e472882222c054d12797c0f7eabd7ebdb9daebd27ece.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Users\Public\Downloads\systems.exe
      "C:\Users\Public\Downloads\systems.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1624
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Public\Downloads\vbs.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:964
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Public\Downloads\vbs.bat" "
        3⤵
        • Drops startup file
        • Suspicious use of WriteProcessMemory
        PID:648
        • C:\Windows\SysWOW64\shutdown.exe
          shutdown -r -t 45
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:668
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:1528
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:1704

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1528-68-0x000007FEFC3C1000-0x000007FEFC3C3000-memory.dmp

        Filesize

        8KB

      • memory/1528-69-0x0000000002900000-0x0000000002901000-memory.dmp

        Filesize

        4KB

      • memory/1624-63-0x0000000000190000-0x00000000001E4000-memory.dmp

        Filesize

        336KB

      • memory/1624-66-0x0000000004BD0000-0x0000000004BD1000-memory.dmp

        Filesize

        4KB

      • memory/1624-67-0x0000000004BD5000-0x0000000004BE6000-memory.dmp

        Filesize

        68KB

      • memory/1704-71-0x0000000002750000-0x0000000002851000-memory.dmp

        Filesize

        1.0MB

      • memory/2044-54-0x0000000075AB1000-0x0000000075AB3000-memory.dmp

        Filesize

        8KB