Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    60s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28/10/2022, 04:12

General

  • Target

    ff29682a8408dbc7eab7ed313c3a765089d92c52ed653dc901267e7f6595069f.exe

  • Size

    2.4MB

  • MD5

    d2fa63257e3bbf3f7653941860dea9d5

  • SHA1

    eb251b04a408b8e5cc2bae89bd056b9d373558ed

  • SHA256

    ff29682a8408dbc7eab7ed313c3a765089d92c52ed653dc901267e7f6595069f

  • SHA512

    800e621a47bbf7d74c4b81be559289358cda5b251c252eabaece5da68c4867c81d47062ffd65b3f41942b34f17bf1e4df97c071a4dc724d9e60f16fd63736dd3

  • SSDEEP

    49152:+qHjjSwQWpxJgXHmDuFKB8j+gm9/NCCHME1lDEPQqKK0cBA:d6wQWNDK+/89E1lYPJKeBA

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff29682a8408dbc7eab7ed313c3a765089d92c52ed653dc901267e7f6595069f.exe
    "C:\Users\Admin\AppData\Local\Temp\ff29682a8408dbc7eab7ed313c3a765089d92c52ed653dc901267e7f6595069f.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Users\Admin\AppData\Local\Temp\ff29682a8408dbc7eab7ed313c3a765089d92c52ed653dc901267e7f6595069f.exe
      C:\Users\Admin\AppData\Local\Temp\ff29682a8408dbc7eab7ed313c3a765089d92c52ed653dc901267e7f6595069f.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=68.0.3618.63 --initial-client-data=0x178,0x17c,0x180,0x14c,0x184,0x752b0558,0x752b0568,0x752b0574
      2⤵
      • Loads dropped DLL
      PID:1064
    • C:\Users\Admin\AppData\Local\Temp\Opera Installer Temp\ff29682a8408dbc7eab7ed313c3a765089d92c52ed653dc901267e7f6595069f.exe
      "C:\Users\Admin\AppData\Local\Temp\Opera Installer Temp\ff29682a8408dbc7eab7ed313c3a765089d92c52ed653dc901267e7f6595069f.exe" --version
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:968

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Opera Installer Temp\ff29682a8408dbc7eab7ed313c3a765089d92c52ed653dc901267e7f6595069f.exe

    Filesize

    2.4MB

    MD5

    d2fa63257e3bbf3f7653941860dea9d5

    SHA1

    eb251b04a408b8e5cc2bae89bd056b9d373558ed

    SHA256

    ff29682a8408dbc7eab7ed313c3a765089d92c52ed653dc901267e7f6595069f

    SHA512

    800e621a47bbf7d74c4b81be559289358cda5b251c252eabaece5da68c4867c81d47062ffd65b3f41942b34f17bf1e4df97c071a4dc724d9e60f16fd63736dd3

  • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat

    Filesize

    40B

    MD5

    be515ce2ca791fb574c7c5c289ba51af

    SHA1

    c6e50dab15361ecb13f0688a7f4e6c1a803d22d1

    SHA256

    8d48e76a68415e529e75aaa73234582b70fb2e43a960d040f28569e079683633

    SHA512

    c5a1db525b9c0e9965e7fc8cae64cfbd175e02450cf742a13a9de03e428e787d3cb232b3d9d8ce8a36c0c0706c6ca761d88e028f3c42c053a72de8cbdff74b13

  • \Users\Admin\AppData\Local\Temp\Opera Installer Temp\ff29682a8408dbc7eab7ed313c3a765089d92c52ed653dc901267e7f6595069f.exe

    Filesize

    2.4MB

    MD5

    d2fa63257e3bbf3f7653941860dea9d5

    SHA1

    eb251b04a408b8e5cc2bae89bd056b9d373558ed

    SHA256

    ff29682a8408dbc7eab7ed313c3a765089d92c52ed653dc901267e7f6595069f

    SHA512

    800e621a47bbf7d74c4b81be559289358cda5b251c252eabaece5da68c4867c81d47062ffd65b3f41942b34f17bf1e4df97c071a4dc724d9e60f16fd63736dd3

  • \Users\Admin\AppData\Local\Temp\Opera_installer_2210280612223411192.dll

    Filesize

    3.2MB

    MD5

    737fcce6b1d9a4b038d0de80b611d796

    SHA1

    220e447dc0807c01acf95d5881feff8de8c641df

    SHA256

    c5b39381bc57013effce2bb79d7c6273f3f97e520fec2f3d75708c599dc721d1

    SHA512

    bb53d7a10b367f6c449990bd813acddbc84f73c912a65d3ae8d782a53152a04b38e14b2d54b5a8e2bc05a5f87e9a004e4594a3918dfbfcb3cda655a43e8ca5ba

  • \Users\Admin\AppData\Local\Temp\Opera_installer_2210280612230321064.dll

    Filesize

    3.2MB

    MD5

    737fcce6b1d9a4b038d0de80b611d796

    SHA1

    220e447dc0807c01acf95d5881feff8de8c641df

    SHA256

    c5b39381bc57013effce2bb79d7c6273f3f97e520fec2f3d75708c599dc721d1

    SHA512

    bb53d7a10b367f6c449990bd813acddbc84f73c912a65d3ae8d782a53152a04b38e14b2d54b5a8e2bc05a5f87e9a004e4594a3918dfbfcb3cda655a43e8ca5ba

  • \Users\Admin\AppData\Local\Temp\Opera_installer_221028061224482968.dll

    Filesize

    3.2MB

    MD5

    737fcce6b1d9a4b038d0de80b611d796

    SHA1

    220e447dc0807c01acf95d5881feff8de8c641df

    SHA256

    c5b39381bc57013effce2bb79d7c6273f3f97e520fec2f3d75708c599dc721d1

    SHA512

    bb53d7a10b367f6c449990bd813acddbc84f73c912a65d3ae8d782a53152a04b38e14b2d54b5a8e2bc05a5f87e9a004e4594a3918dfbfcb3cda655a43e8ca5ba

  • memory/968-68-0x0000000001190000-0x00000000015EA000-memory.dmp

    Filesize

    4.4MB

  • memory/1064-62-0x0000000000B20000-0x0000000000F7A000-memory.dmp

    Filesize

    4.4MB

  • memory/1192-61-0x0000000002940000-0x0000000002D9A000-memory.dmp

    Filesize

    4.4MB

  • memory/1192-60-0x0000000000B20000-0x0000000000F7A000-memory.dmp

    Filesize

    4.4MB

  • memory/1192-55-0x0000000076701000-0x0000000076703000-memory.dmp

    Filesize

    8KB

  • memory/1192-69-0x0000000000B20000-0x0000000000F7A000-memory.dmp

    Filesize

    4.4MB

  • memory/1192-70-0x0000000002940000-0x0000000002D9A000-memory.dmp

    Filesize

    4.4MB