Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
16/09/2022, 08:18
Static task
static1
Behavioral task
behavioral1
Sample
USD92.15.exe
Resource
win7-20220812-en
General
-
Target
USD92.15.exe
-
Size
997KB
-
MD5
7b711b729b01c38bbbed5ee08ef88347
-
SHA1
45c70d807a9b741aec980b559ebec0c79a4cd1a0
-
SHA256
6bf5a3809ca423061cb16a815ca5e5f3ba86d6c7fbf5233fd68b589012eae0ab
-
SHA512
b94950da81e664bb2248411c39adb748f2042cad9e03ed4c212913e1b6e861d99e174b39e90084eaeeeaae6e067af7fd164ecf20d2f115a0ae77ffa9156f4581
-
SSDEEP
12288:vJ6ShV7uikFgEeYeFav5bq5/wA9IVBrFPVgIBzcJtNv2j:h9hlubgSeFOb6/6frFPVXBzcRI
Malware Config
Extracted
formbook
ejgp
+0NM3RekW0bfgQ==
iQmI3Aw2aoOljoA0XZi1
5Ei2CVwQyOgZwV/u4eiMFdKqc84=
ImSvoul9o0reZ9TKUAUkXgw=
kuCrMIco5vT3sxCUQ+pYsVoG7Q==
btgpLo8XM+qHGLzoizgjRg==
fqK2iM5vW0bfgQ==
ObS1UE+TByKRZozamdULr0naXbKPLA==
bcohBkmNNcpp3gJ/XE2/mBs=
yY5b/cLb3+0llg==
GVEVqBNXl7Kic2Sm
Tqpt2tTlW0bfgQ==
eurYRI7UFDBjDbzpIJKz
7wwDuczemAaJNrrpIJKz
bprQyLvLEj+hhMLHHg==
qdoAqq/XOjh0ItzLLJpHBgxoJgM2
gr5SnMA66BpM8+hUM+iawNKeZsQ=
XLoO6yFTsdNuEYpUPfScwqXEk7dqBnU=
vS2Cjfg0tqBF1GpuHemLV8/g4wUwPspS
U5wqXJjP/u/qg3sE+YKsgVVByFw+
6Qul0MI57A40ueX7Uh8=
IGr1GFkQxOYclTlq1dWwCpfrYMI=
cqLh+QczhrzdZ2/pIJKz
HGi2j8gM2ZZA59e8Fw==
htYvQKbmdF0SvUP67ebXcmE3/uzNMA==
5v+uDDzlnYEi1ys=
HZgZRHcj3fw3GH2WCQ==
RrCaR398Tdju
b5upYoKjGFXjloTNQrLms2lByFw+
Q7qnTXgEBa+lHRZKrRuPlU9YZLdqBnU=
D6clUYImrLoeAHaqFA==
xdrcmoa+AO/ZYVXk5sFpEtKeZsQ=
erJYeX6DtVY13U11VhE=
/D4wGJyUf5zg
uDNlLJ19Zvw=
e63EgpreYHnpZYPp1dH3jRE=
oAPyvNkPg48R8KipH1pQ5IF+TZrce3/+wA==
w/i5TF+hHlGzaZhUS+5hH+hmTNzxpAVa
ke0iGwcm3+0llg==
bbGaZYKNNrQSyflWyj2oBpcs
ha++gwt5rlQFqw1AQAg=
scSTL3/FbwOXHqajWkgqmh0=
H4jWx7vLqks1vMokkMz8Kuz4Q1aKOA==
0CViYGqjx2gOrg1AQAg=
XqhAovm0cUgU4nwrHA==
s9DajO14+Pg00F5cycZfDdKeZsQ=
/HLFmNRxdB8z3Q1AQAg=
MsYIc6M9vORxWJegDQ==
a+NfdmuRfybXudoLcbTZsUchqC4n
XMCW+zV1raKke7MgExDNZXH8+g==
r99wvAFBhLrneJhGGpLIpmlByFw+
HGgnm5S6dOdvFrTjizgjRg==
YLDq+w1ChoRmBzaUen3gul1u+w==
pu6vTWRtJ6cZAHaqFA==
nAaG1vUgYkodsNJdUE2/mBs=
X4qhboKOVCMz3Q1AQAg=
pt2iMklSGz6NIhtaufwrUg==
6UyWemOlpFZoBCTe5NUBhwY=
Ycwg9jPgC75kB59QizgjRg==
grRAZIkanoVJ3Xs5HQ==
Ep4taphAwK6ic2Sm
SW5qJj5D6BfSgA==
R7gN/vcdVnJ/i8AHeO9ldkhW3XDPNMhS
JEJUAPMTjbY9DrrpIJKz
naik138rtp.com
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 8 1312 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 828 set thread context of 900 828 USD92.15.exe 32 PID 900 set thread context of 1220 900 RegSvcs.exe 16 PID 900 set thread context of 1220 900 RegSvcs.exe 16 PID 1312 set thread context of 1220 1312 rundll32.exe 16 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1600 schtasks.exe -
description ioc Process Key created \Registry\User\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 828 USD92.15.exe 828 USD92.15.exe 1528 powershell.exe 900 RegSvcs.exe 900 RegSvcs.exe 900 RegSvcs.exe 900 RegSvcs.exe 900 RegSvcs.exe 1312 rundll32.exe 1312 rundll32.exe 1312 rundll32.exe 1312 rundll32.exe 1312 rundll32.exe 1312 rundll32.exe 1312 rundll32.exe 1312 rundll32.exe 1312 rundll32.exe 1312 rundll32.exe 1312 rundll32.exe 1312 rundll32.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 900 RegSvcs.exe 900 RegSvcs.exe 900 RegSvcs.exe 900 RegSvcs.exe 1312 rundll32.exe 1312 rundll32.exe 1312 rundll32.exe 1312 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 828 USD92.15.exe Token: SeDebugPrivilege 1528 powershell.exe Token: SeDebugPrivilege 900 RegSvcs.exe Token: SeDebugPrivilege 1312 rundll32.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 828 USD92.15.exe 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 828 USD92.15.exe 1220 Explorer.EXE 1220 Explorer.EXE -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 828 wrote to memory of 1528 828 USD92.15.exe 28 PID 828 wrote to memory of 1528 828 USD92.15.exe 28 PID 828 wrote to memory of 1528 828 USD92.15.exe 28 PID 828 wrote to memory of 1528 828 USD92.15.exe 28 PID 828 wrote to memory of 1600 828 USD92.15.exe 30 PID 828 wrote to memory of 1600 828 USD92.15.exe 30 PID 828 wrote to memory of 1600 828 USD92.15.exe 30 PID 828 wrote to memory of 1600 828 USD92.15.exe 30 PID 828 wrote to memory of 900 828 USD92.15.exe 32 PID 828 wrote to memory of 900 828 USD92.15.exe 32 PID 828 wrote to memory of 900 828 USD92.15.exe 32 PID 828 wrote to memory of 900 828 USD92.15.exe 32 PID 828 wrote to memory of 900 828 USD92.15.exe 32 PID 828 wrote to memory of 900 828 USD92.15.exe 32 PID 828 wrote to memory of 900 828 USD92.15.exe 32 PID 828 wrote to memory of 900 828 USD92.15.exe 32 PID 828 wrote to memory of 900 828 USD92.15.exe 32 PID 828 wrote to memory of 900 828 USD92.15.exe 32 PID 900 wrote to memory of 1312 900 RegSvcs.exe 33 PID 900 wrote to memory of 1312 900 RegSvcs.exe 33 PID 900 wrote to memory of 1312 900 RegSvcs.exe 33 PID 900 wrote to memory of 1312 900 RegSvcs.exe 33 PID 900 wrote to memory of 1312 900 RegSvcs.exe 33 PID 900 wrote to memory of 1312 900 RegSvcs.exe 33 PID 900 wrote to memory of 1312 900 RegSvcs.exe 33 PID 1312 wrote to memory of 1092 1312 rundll32.exe 35 PID 1312 wrote to memory of 1092 1312 rundll32.exe 35 PID 1312 wrote to memory of 1092 1312 rundll32.exe 35 PID 1312 wrote to memory of 1092 1312 rundll32.exe 35 PID 1312 wrote to memory of 1092 1312 rundll32.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\USD92.15.exe"C:\Users\Admin\AppData\Local\Temp\USD92.15.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\UWqtQgp.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UWqtQgp" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA9F6.tmp"3⤵
- Creates scheduled task(s)
PID:1600
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"4⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"5⤵PID:1092
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD539f9f3234cdc79e056ab5779eb10253f
SHA1cd6bb94986a342a6f12692a620422e5a87cf7e3e
SHA256223aed12b0b7e6464033fd50edf1e4c419c230757ee4ee48e4e7fc7834224101
SHA51220bb252bae6da1fd2297830befd79dddab991769f98934666ebc4bbdf7682d63cd710c4886ac5d86285000f94e8b54061a07f0792d3a5adef381219ce52f6afa