Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/10/2022, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
mary.exe
Resource
win7-20220812-en
General
-
Target
mary.exe
-
Size
56KB
-
MD5
e8bf77b057a93cafe70b86fdb9da6aed
-
SHA1
53f70d6a1f0a48522d90e1612bdf3c4b122fc504
-
SHA256
f53340a00d5248f81164bd5a1880698c4926cf62dc2fc5c93696f87780733b1a
-
SHA512
56d4f69822d9790caec4d53a3112038c7b0b518c013638ad7865dbd7a5e80d3d46b4da5d6170e888f5f3ae6c58231b2c3fbc7763f3107965eedb52b05d46461f
-
SSDEEP
768:k8s3JoK3x2Ncv+kIQZ5N9Fe6HmBouzruiRPPrk+FP:kB36I1vxIMW6HmBxuixPd
Malware Config
Extracted
formbook
bbuy
wqbqKCTkCwjtbad3vwJI6Z+a
EqD7JRhUV2ZQDnU=
UlWd0LffZzZeGY0BzkxroA==
sAbXk3SNlPOcRleKI+k=
HCpzqZKnJGDpf+qsxnOnvQ==
vGdG6Ezu8mctzfLnmX/FLDeiPS3M
tcctT/pPwrv7mdA0aw==
Tr6fUz4Ae0mrGA==
NxZtBUfk3aqxS1eKI+k=
TSUVzyy9hBs65j7xXSRVBx+M
fObBavCu4OEt/0pTr98J
2ap9Oy1p8MQP+EtTr98J
FL4Q0TXr1iHWjezVUdQtFT4=
kSFvf2KUliCDOWwacw==
ctqtSLZvqqr/xym6xnOnvQ==
8DqrrnN58fVC
fIrZCP4xwLt7CkGppluStw==
PFKUNZxcpLCtk6yjMus=
4CKOs2UMhs9P8EvLAXO1Hj8aNA==
0pEGOQOa0+SOV9AnYg==
qnDL6Mp+sL8W4CBtgbr5mmBu/BqoN1ksrg==
odQl1SvDIPk+MKbXqZfAxjdUZ68=
0Q8qhE+olFU=
WROEuZebCNvW80h5
h0y206dprMCvKLI4dv8ZEIted/zWuis=
XmZVAHxKyQ6rWboZFTdzGiDPLD3X
4V0534kw+m0tS3IudQ==
VW7HBe4GhtdGQpESaA==
6PRhiTetWC9f
TS+Gro2nN/ZgFm8=
wYLRnQutWC9f
xRpkKxw9tvyJJ05Tr98J
dnI90o62MwPdTqrWj5DJhqNg5QKkHW0krQ==
TZ7qiOquIOolB1JTr98J
an1eJRfZJSVLBEdTr98J
scbjg+SR3pwg8Cto
WJDNb9FuJbGBV5ZT10jM6yc=
3qWvw6zJe0mrGA==
RwJjfSnOxEqNKHY=
/369ev4qJSgTxSQafQ==
Arnyf3Qkl5NZ7zZv7Vqevw==
Vz+fGoISw0duIIM3dw==
xDaCJHZ4r0e+TZS78zhroA==
b74OqQq5JP86FDOrSfY=
bypvPjLvpu++Bewi1bwQRevIHhEkWSM=
gP/GfV98fUJL4ElTr98J
1qN0EnUJe0mrGA==
YhpjEWoZIeCOV9AnYg==
pyJykXi39H453yQgszKnTDqP
nPrtpRfi3D0G5kANY2VzZMk8ybWZA9vp
2/CILeCtWC9f
PUslsw+zEOze0hJg
U6mKVCtHTJc/AnqAPki2Iz6S
R+I7YVVpN+VI
LipwL4MgDmcYuONcSX2HpA==
Bx9LcVFpN+VI
LKiDNqxuZDJhGSpkHwInyRVC34jG
jyJreC7ZqDUG4hiV4ll+lfMoSqU=
qimAUsCWUV6jcK/e4BVH+CC7DSfO
Yd0uY+yRzNyOV9AnYg==
TGRP34usX2KRj5bVq7kA
HIZkGxBDNPOxf70v6J3HuA==
mUSrYyQ4puqAGok+wUjM6yc=
pzkdrg7Hrvirb9PEDAMcDDw=
take-solar.shop
Extracted
xloader
3.Æ…
bbuy
wqbqKCTkCwjtbad3vwJI6Z+a
EqD7JRhUV2ZQDnU=
UlWd0LffZzZeGY0BzkxroA==
sAbXk3SNlPOcRleKI+k=
HCpzqZKnJGDpf+qsxnOnvQ==
vGdG6Ezu8mctzfLnmX/FLDeiPS3M
tcctT/pPwrv7mdA0aw==
Tr6fUz4Ae0mrGA==
NxZtBUfk3aqxS1eKI+k=
TSUVzyy9hBs65j7xXSRVBx+M
fObBavCu4OEt/0pTr98J
2ap9Oy1p8MQP+EtTr98J
FL4Q0TXr1iHWjezVUdQtFT4=
kSFvf2KUliCDOWwacw==
ctqtSLZvqqr/xym6xnOnvQ==
8DqrrnN58fVC
fIrZCP4xwLt7CkGppluStw==
PFKUNZxcpLCtk6yjMus=
4CKOs2UMhs9P8EvLAXO1Hj8aNA==
0pEGOQOa0+SOV9AnYg==
qnDL6Mp+sL8W4CBtgbr5mmBu/BqoN1ksrg==
odQl1SvDIPk+MKbXqZfAxjdUZ68=
0Q8qhE+olFU=
WROEuZebCNvW80h5
h0y206dprMCvKLI4dv8ZEIted/zWuis=
XmZVAHxKyQ6rWboZFTdzGiDPLD3X
4V0534kw+m0tS3IudQ==
VW7HBe4GhtdGQpESaA==
6PRhiTetWC9f
TS+Gro2nN/ZgFm8=
wYLRnQutWC9f
xRpkKxw9tvyJJ05Tr98J
dnI90o62MwPdTqrWj5DJhqNg5QKkHW0krQ==
TZ7qiOquIOolB1JTr98J
an1eJRfZJSVLBEdTr98J
scbjg+SR3pwg8Cto
WJDNb9FuJbGBV5ZT10jM6yc=
3qWvw6zJe0mrGA==
RwJjfSnOxEqNKHY=
/369ev4qJSgTxSQafQ==
Arnyf3Qkl5NZ7zZv7Vqevw==
Vz+fGoISw0duIIM3dw==
xDaCJHZ4r0e+TZS78zhroA==
b74OqQq5JP86FDOrSfY=
bypvPjLvpu++Bewi1bwQRevIHhEkWSM=
gP/GfV98fUJL4ElTr98J
1qN0EnUJe0mrGA==
YhpjEWoZIeCOV9AnYg==
pyJykXi39H453yQgszKnTDqP
nPrtpRfi3D0G5kANY2VzZMk8ybWZA9vp
2/CILeCtWC9f
PUslsw+zEOze0hJg
U6mKVCtHTJc/AnqAPki2Iz6S
R+I7YVVpN+VI
LipwL4MgDmcYuONcSX2HpA==
Bx9LcVFpN+VI
LKiDNqxuZDJhGSpkHwInyRVC34jG
jyJreC7ZqDUG4hiV4ll+lfMoSqU=
qimAUsCWUV6jcK/e4BVH+CC7DSfO
Yd0uY+yRzNyOV9AnYg==
TGRP34usX2KRj5bVq7kA
HIZkGxBDNPOxf70v6J3HuA==
mUSrYyQ4puqAGok+wUjM6yc=
pzkdrg7Hrvirb9PEDAMcDDw=
take-solar.shop
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 12 1284 rundll32.exe 21 1284 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 1284 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 968 set thread context of 900 968 mary.exe 27 PID 900 set thread context of 1380 900 aspnet_compiler.exe 15 PID 900 set thread context of 1380 900 aspnet_compiler.exe 15 PID 1284 set thread context of 1380 1284 rundll32.exe 15 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \Registry\User\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 900 aspnet_compiler.exe 900 aspnet_compiler.exe 900 aspnet_compiler.exe 900 aspnet_compiler.exe 900 aspnet_compiler.exe 1284 rundll32.exe 1284 rundll32.exe 1284 rundll32.exe 1284 rundll32.exe 1284 rundll32.exe 1284 rundll32.exe 1284 rundll32.exe 1284 rundll32.exe 1284 rundll32.exe 1284 rundll32.exe 1284 rundll32.exe 1284 rundll32.exe 1284 rundll32.exe 1284 rundll32.exe 1284 rundll32.exe 1284 rundll32.exe 1284 rundll32.exe 1284 rundll32.exe 1284 rundll32.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 900 aspnet_compiler.exe 900 aspnet_compiler.exe 900 aspnet_compiler.exe 900 aspnet_compiler.exe 1284 rundll32.exe 1284 rundll32.exe 1284 rundll32.exe 1284 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 968 mary.exe Token: SeDebugPrivilege 900 aspnet_compiler.exe Token: SeDebugPrivilege 1284 rundll32.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 968 wrote to memory of 900 968 mary.exe 27 PID 968 wrote to memory of 900 968 mary.exe 27 PID 968 wrote to memory of 900 968 mary.exe 27 PID 968 wrote to memory of 900 968 mary.exe 27 PID 968 wrote to memory of 900 968 mary.exe 27 PID 968 wrote to memory of 900 968 mary.exe 27 PID 968 wrote to memory of 900 968 mary.exe 27 PID 1380 wrote to memory of 1284 1380 Explorer.EXE 28 PID 1380 wrote to memory of 1284 1380 Explorer.EXE 28 PID 1380 wrote to memory of 1284 1380 Explorer.EXE 28 PID 1380 wrote to memory of 1284 1380 Explorer.EXE 28 PID 1380 wrote to memory of 1284 1380 Explorer.EXE 28 PID 1380 wrote to memory of 1284 1380 Explorer.EXE 28 PID 1380 wrote to memory of 1284 1380 Explorer.EXE 28 PID 1284 wrote to memory of 1252 1284 rundll32.exe 31 PID 1284 wrote to memory of 1252 1284 rundll32.exe 31 PID 1284 wrote to memory of 1252 1284 rundll32.exe 31 PID 1284 wrote to memory of 1252 1284 rundll32.exe 31 PID 1284 wrote to memory of 1252 1284 rundll32.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\mary.exe"C:\Users\Admin\AppData\Local\Temp\mary.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:900
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1252
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
927KB
MD57fd80b1cc72dc580c02ca4cfbfb2592d
SHA118da905af878b27151b359cf1a7d0a650764e8a1
SHA2561e6dccbdf8527abb53c289da920463b7895300d0d984cc7e91a3ecda4e673190
SHA51213f7f29b5ed31c551aa5f27742557aa4d026a226087d6fcbca094819759ecc753a2c33b7422ae88dc6a4a0a966edb8485a18e59a0283ba2686cae5d78e0190a3