Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    114s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 15:27

General

  • Target

    cadeb5747bad868576d79427ba7bccd1a9113212db1e4ab0c104734e428d0c92.exe

  • Size

    251KB

  • MD5

    473eb6e4d09b8b917e193db97ad6a60d

  • SHA1

    1fd9035aa2e0bc14e41fe833571abdd5bbd9a0d2

  • SHA256

    cadeb5747bad868576d79427ba7bccd1a9113212db1e4ab0c104734e428d0c92

  • SHA512

    f28e931beb8ac50c74df2d4499bcfa6527ea51b76214f8e8e76ef0e73301fb9aefb10a7ffafa0ef44ff50d5c477961734623213269fe70ca0a7636b54c110e15

  • SSDEEP

    6144:91OgDPdkBAFZWjadD4sq3FfPwHFZk6uev25Q9vL:91OgLdat1f2k6hvL

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cadeb5747bad868576d79427ba7bccd1a9113212db1e4ab0c104734e428d0c92.exe
    "C:\Users\Admin\AppData\Local\Temp\cadeb5747bad868576d79427ba7bccd1a9113212db1e4ab0c104734e428d0c92.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\AppData\Local\Temp\7zS7312.tmp\setup.exe
      .\setup.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:4696

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\wxDfast\bhoclass.dll

    Filesize

    139KB

    MD5

    4b35f6c1f932f52fa9901fbc47b432df

    SHA1

    8e842bf068b04f36475a3bf86c5ea6a9839bbb5e

    SHA256

    2b4d643a8a14f060bf3885f872b36e5e1fe1e777ad94783ba9593487c8e1f196

    SHA512

    8716b9a8e46933bf29348254a68d1a21392bdbbe3b4d5010e55fe638d02cc04eb685e424d440f7c5b58ffbca82e5772dd95bef73fa831595c2ae9599f3b05a99

  • C:\Users\Admin\AppData\Local\Temp\7zS7312.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    b9165e81934c746e3a33afc6bde86143

    SHA1

    ce38f37d26d5fa6309f4d42cbf470bc4a884b100

    SHA256

    3edbe3448cc74e7862db06fb08a8250c044a6aadbbea35a365560080eaaa3624

    SHA512

    fab8731e561554bf3ac4a32950a4111d3bca7d9223727ed6eccca598777bd697606a11f658eae3d28f6dae16faf40fda7387d0e25cd8f3cb750c871f77178bc8

  • C:\Users\Admin\AppData\Local\Temp\7zS7312.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    ff191c6d8a25bd148cd79fe3a040fa10

    SHA1

    5233a26b994a474cd6f7701e31cdf1c624e96eee

    SHA256

    f6cc198cb7bcb79c1d839b73e9ffa2c5fd5fcacbf166c09fc740044d7ca2e21f

    SHA512

    e4da2f13d4b82cdabee54f5bf6328bbcab47f76f2b469c270985595281d81abbdd961f3e492a3bfae033f2e345edcf16e6c388415cc41a66a2d32f967feae425

  • C:\Users\Admin\AppData\Local\Temp\7zS7312.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    a160643696a0665de982d007a39b47aa

    SHA1

    60045b1d49da74f5ec12146884b719f6c9dbd8a1

    SHA256

    3169a4f758f81e85ce2a4363c53d70c4dfdd5a7621cd544f54d415ce7fdc1eec

    SHA512

    c21af8051b4ea32d8fc93e726eb171b0244bfe085b4f11a0f987434fbeddad234fa59102c519c92ed547a6238077f9cafd19b9a0a03fe42814f5e34b2c0affa5

  • C:\Users\Admin\AppData\Local\Temp\7zS7312.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    46e4874288f3bb02d779b7828edf8193

    SHA1

    87ec4352ec6c7afd23aaae37c4775130b914cec6

    SHA256

    c3580844be272382db92d7c6ef83dd5a384c72fccbee4885e75c3a1652667b00

    SHA512

    4680bb272b47c4501a23f5beef6b0c53e375099194ad1f200ab5c7204087a3dd8934fd50132b5ace5021e3f3e0dd2b5b4946f7d1b0b7e6f8811edc3e3b8237e6

  • C:\Users\Admin\AppData\Local\Temp\7zS7312.tmp\[email protected]\install.rdf

    Filesize

    714B

    MD5

    12fcb9c1f03e90d2c8790c34ea5280d0

    SHA1

    44e80037f8772fbd9060e304aaca72e029974027

    SHA256

    fc784a4a1071c08cb591f45e150bc214b4f1d566489f7988aac8e5eac9cde457

    SHA512

    f04e7be19613ace380e07c5a4e2db3e631a3f90f32d982a480ca78a41821923d1305ba4d842bfe50c53abb534311194704d5e818ef9201b7f1c41267c0b6bb55

  • C:\Users\Admin\AppData\Local\Temp\7zS7312.tmp\background.html

    Filesize

    4KB

    MD5

    444280e15eee255cd74858c089587767

    SHA1

    f95ab0eb12e6d81659a1268902fb79c4c05116f4

    SHA256

    fc98c4c88230d3bf780f5205537b053e82110f1573953df91d22b52427b3c904

    SHA512

    9e1d73f15c9da0645636f91672953c3c87e632c4a155a96866eac0093e5e742485fd7c95f0e7181578b4d49182a6fad99f2ced8adf623fb2a104a96db4990485

  • C:\Users\Admin\AppData\Local\Temp\7zS7312.tmp\bhoclass.dll

    Filesize

    139KB

    MD5

    4b35f6c1f932f52fa9901fbc47b432df

    SHA1

    8e842bf068b04f36475a3bf86c5ea6a9839bbb5e

    SHA256

    2b4d643a8a14f060bf3885f872b36e5e1fe1e777ad94783ba9593487c8e1f196

    SHA512

    8716b9a8e46933bf29348254a68d1a21392bdbbe3b4d5010e55fe638d02cc04eb685e424d440f7c5b58ffbca82e5772dd95bef73fa831595c2ae9599f3b05a99

  • C:\Users\Admin\AppData\Local\Temp\7zS7312.tmp\content.js

    Filesize

    386B

    MD5

    653e783c90f0ddfeca78491dd1a64b54

    SHA1

    219d72d86277224f55359e37c4b991bad57d52d3

    SHA256

    d6826548fdb82fa48f0a0513d85b72c7c50f917a4301977bd29bfc2703f58366

    SHA512

    656e47b1e0c1b365d5591ee9f43a19d099c25e330342e9d11cdb3d4f916c50446cbdb7c90dfe8c43c63ad070846a8ba99ba44fa25ea460cad202ddd0f78b0c6f

  • C:\Users\Admin\AppData\Local\Temp\7zS7312.tmp\mhnoalojjedjcggfhadkmbbiccohpkdf.crx

    Filesize

    3KB

    MD5

    2164d62b50a4c0b8ef9cca0409c8ece2

    SHA1

    ded162641149d0a35a2350781adbc68bd156d43b

    SHA256

    8dff9360e1857e7578fa9e99e3052f548d8250bd2ea6ea77481ed7ffa62aad3c

    SHA512

    dad8a86560779f100c4d7fa96047ce4ab48dfd1431d0d721def78e766c9355e33ef5182b95a27f3ea631ed5ce731b4b7cc11969fd200b8bedf3d93b5437a31ca

  • C:\Users\Admin\AppData\Local\Temp\7zS7312.tmp\settings.ini

    Filesize

    656B

    MD5

    672255856741871d4ae4604598c8a33d

    SHA1

    1f5050c2d1b56a9750b0663f7c32bf8912d86711

    SHA256

    f8d92e312ca1da0a82b0cc813a85e8c5ef14380c944ddec774d76dd9bde801bb

    SHA512

    43363ea0989157a7b4a6d82e033262e67bd482865ef7df4ef3cdd8d8f8c837b93db096d8b634efc0e0b1c6a7f1d9a726868e2120a4adbba8984241b518d1cf2e

  • C:\Users\Admin\AppData\Local\Temp\7zS7312.tmp\setup.exe

    Filesize

    61KB

    MD5

    16ef6e914973925977cdc5ef6b8b2565

    SHA1

    4815da2815975b33f5dc94d482e6dbc02588afa6

    SHA256

    6b9a2b64b90799f1d50458dc38fb4e9e13a8abb37210c8f5d9eeedae84c6912f

    SHA512

    c74f0e17878c4598b626edb5e75e7ee098b71c0c26454ba709e2ea438517670ce11abf7d909470e6c935a21d0413c0d14b29960af9bd6a423e3261789a35b059

  • C:\Users\Admin\AppData\Local\Temp\7zS7312.tmp\setup.exe

    Filesize

    61KB

    MD5

    16ef6e914973925977cdc5ef6b8b2565

    SHA1

    4815da2815975b33f5dc94d482e6dbc02588afa6

    SHA256

    6b9a2b64b90799f1d50458dc38fb4e9e13a8abb37210c8f5d9eeedae84c6912f

    SHA512

    c74f0e17878c4598b626edb5e75e7ee098b71c0c26454ba709e2ea438517670ce11abf7d909470e6c935a21d0413c0d14b29960af9bd6a423e3261789a35b059