Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/10/2022, 03:07

General

  • Target

    19531b27321cf79f8fea9715777c391d5f0d796077e634206294d7369024bea0.exe

  • Size

    957KB

  • MD5

    93ddaf1feb63ba47ac8c5396cb475eac

  • SHA1

    105669b2a15e45b6f7c12141f8fdd10c82e6b23a

  • SHA256

    19531b27321cf79f8fea9715777c391d5f0d796077e634206294d7369024bea0

  • SHA512

    3c30e11f9824ec26e6a08365c6910d56e7622f6eb6b08f03b474d9e814ef965dea5a27cfe0bed4e4a3ae299abc331e321ef41fbfdb6d725cc0e7221056012279

  • SSDEEP

    24576:zCF80piqnZp9Qu1Y0nmen61qLL0pbacdj4knmKaKeBvj:zCFpp/nd1YGmennLL6OcdjHFK7

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 29 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19531b27321cf79f8fea9715777c391d5f0d796077e634206294d7369024bea0.exe
    "C:\Users\Admin\AppData\Local\Temp\19531b27321cf79f8fea9715777c391d5f0d796077e634206294d7369024bea0.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3268
    • C:\Users\Admin\AppData\Local\Temp\174820C6-BAB0-7891-A589-E927174B5B3E\Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\174820C6-BAB0-7891-A589-E927174B5B3E\Setup.exe" /s Files\Common Files
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3872
  • C:\Windows\servicing\TrustedInstaller.exe
    C:\Windows\servicing\TrustedInstaller.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2624

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\47NRIJ2V\setup2[1].zpb

    Filesize

    142KB

    MD5

    4d507fc2ad32d1d8a8e74aaa8c01c1ca

    SHA1

    6fe219d6c97c2482e386de8618b5814a04eef635

    SHA256

    a551b5fbdfbb2a519edada9902b6dae5be9810db1c6acdf2dfe4bee2aa4caf7d

    SHA512

    db9caa9fe8bab0d57cf4c8164e2ca5dcb5df8be6ec988f6cd11ff6128ecd31913ac5bbabc6a197948396045e471fd43139bc6a404b44ac31b573503eb58bd443

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PREIF6EH\102[1]

    Filesize

    27KB

    MD5

    6c08db5c0ef33a717644b0289fdc8f51

    SHA1

    08133804ae3bcb9ea56a580ae559f14ac3fc62bf

    SHA256

    a144ca43132711d15d9ae28f0f480a0bc317a2a234070c4b58353054f42684c4

    SHA512

    7295729f35f03ec6341599e18c536de1775c8643dc36a34a2ec88d23c55392677291099a8cf4fc4faa3764ae0e2743a78726175a55557e61094b227724738802

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZX6MAMIN\Setup3[1].zpb

    Filesize

    60KB

    MD5

    5c3f3322e2c2b9a2ba5e2c92030c2f2b

    SHA1

    c51a24a2520c7559b40b204832b0ea3b383c2eb2

    SHA256

    d889214c0c295373121aef32b8c2c50c8c20530e3b3aa1a74ffdd991ccb37168

    SHA512

    fefc62b8af19a38e14d9077163afc935029ef4457c228a0d357e49ce7e9b58319d4b6fa38a38c2adb0d005f15c3f304ae76d81ca838e430f8e97bdc840c148d4

  • C:\Users\Admin\AppData\Local\Temp\174820C6-BAB0-7891-A589-E927174B5B3E\Babylon.dat

    Filesize

    10KB

    MD5

    0ea4b325aeded4466c4cf6f8dae88ecf

    SHA1

    b3778ea32251e0f6dd4b94ed493244563f73c8db

    SHA256

    813f2727907a5aa4fe0b04de140184226b87bdf9fc1a6a86e1c9932ac85097d1

    SHA512

    f786ab86a5cf8bc9f49de0bf00cdff8da16ec53f5dc888bb68ca3d5250590349f4f426ccb3ac3ca1d74324df30fa4c1fa4af80416975e269546b67b4cc440746

  • C:\Users\Admin\AppData\Local\Temp\174820C6-BAB0-7891-A589-E927174B5B3E\HtmlScreens\common.js

    Filesize

    3KB

    MD5

    61326fe65b7ab277221d5fd3c3d8154f

    SHA1

    292d39c304209e0c87cbab00f8c5c37fcd0b1887

    SHA256

    055cc4086e5c6f5991aab46999cb147c155a1b4bd4675b1fe673ccc8527dbd07

    SHA512

    1f77de3af5266342429baf3e26ac71b5d476026213cb2a06f74b37251e4ba442f468b49c5691c4a0563373dfe4274bd606cf8bbb5033bacc2cd665a31022b93c

  • C:\Users\Admin\AppData\Local\Temp\174820C6-BAB0-7891-A589-E927174B5B3E\HtmlScreens\eula.html

    Filesize

    62KB

    MD5

    43f3c7282a5cf225a4c8ab580309f27d

    SHA1

    7b2f6df42893c42b404cdf2bf0b020e83ac58075

    SHA256

    1750ba16aea8d20b9449a696b0fb20f6c9c5403daed15a6c118ffdcc71b77b47

    SHA512

    7c24fb911d56bf6a2481a2d1800bb0e3c7445178eb39cec15181a325f07b462b8b936495f989918adc52d6e550665afdacf69ae2b2e3711a9b1abadc0ae34d10

  • C:\Users\Admin\AppData\Local\Temp\174820C6-BAB0-7891-A589-E927174B5B3E\HtmlScreens\pBar.gif

    Filesize

    3KB

    MD5

    26621cb27bbc94f6bab3561791ac013b

    SHA1

    4010a489350cf59fd8f36f8e59b53e724c49cc5b

    SHA256

    e512d5b772fef448f724767662e3a6374230157e35cab6f4226496acc7aa7ad3

    SHA512

    9a19e8f233113519b22d9f3b205f2a3c1b59669a0431a5c3ef6d7ed66882b93c8582f3baa13df4647bcc265d19f7c6543758623044315105479d2533b11f92c6

  • C:\Users\Admin\AppData\Local\Temp\174820C6-BAB0-7891-A589-E927174B5B3E\HtmlScreens\page2.css

    Filesize

    2KB

    MD5

    613f21fd9be71493f7f0f7f289faba46

    SHA1

    3085884627bb5cbe1af9c29e9acaf353299b192f

    SHA256

    dc7e17ccfdf805ea69c553abdea2b6a86fd27ec68d58f759b9a85e5a4be98e17

    SHA512

    3be478d24f712d2b4ca3d9142fc446986426290678ddc89518155e7c46a6bae5659b9a748b30eb26ba20323c9d9a2c67e7dfe770d0689ab1548a9a48568df8ab

  • C:\Users\Admin\AppData\Local\Temp\174820C6-BAB0-7891-A589-E927174B5B3E\HtmlScreens\page2.html

    Filesize

    3KB

    MD5

    652dc84986ad79e823d07a0503f39fa2

    SHA1

    bb209be48b2bc746ee0f600fb18027fc9dd96b57

    SHA256

    18e1f4d19a0caed84851fbc3d7b1ad84da141b0b9553cfb7ab43671ad5bbba75

    SHA512

    abb9768bbbfbb88be990b7875c1bf93552567a736857cd97382a9c9c5837dad532acb9376071348b6f7a4021519d0a2b612c5120fb20efb257cf382d15226353

  • C:\Users\Admin\AppData\Local\Temp\174820C6-BAB0-7891-A589-E927174B5B3E\HtmlScreens\page2.js

    Filesize

    3KB

    MD5

    574d29f591a6c8e41526740aef35aef5

    SHA1

    16fd09104a40386b55d7a241c34841e1f881b346

    SHA256

    b1a88b9f78cb51b78b0abc00706269540cbddd4d22d06ef597c30aeda3f1806b

    SHA512

    86a1907fe6f9729eb6fc8b91a9581f071a608e2b808a49419efcd5930ea9408f45af2faeba92aa174c7fa680d014eebac001637622e0157065d4b898670c82fb

  • C:\Users\Admin\AppData\Local\Temp\174820C6-BAB0-7891-A589-E927174B5B3E\HtmlScreens\page2Lrg.css

    Filesize

    1KB

    MD5

    3acbc4a0b720fd5daff11530ae9e0295

    SHA1

    23031d0a31bc05de190843a9b0d8b3745c796385

    SHA256

    59b5de1efe45a796fab6130ee94db0dc13be896ab798e126cb2c5889aead32b7

    SHA512

    abc4815f7df7f65c57c61facd568616c9b844cdfea8d12ae819987dcec256d82c7ef040c1df24be2ddef0b42601f1a8e22755b7320d1fcbcee0dd94055092b62

  • C:\Users\Admin\AppData\Local\Temp\174820C6-BAB0-7891-A589-E927174B5B3E\HtmlScreens\page9.html

    Filesize

    668B

    MD5

    69d63df890d8445501ac73835d7966d3

    SHA1

    f385c25afc2b5180e7f0c34b2de8089c68f654f7

    SHA256

    041569cede5fc91021a788647e4dc1b4a1c3f925f2bbb8857dce0930bd3838ef

    SHA512

    879735c74bc6b2467ce2f5c88ff755191d781207fbdda9f65f4b0f032ca638c96413f049607bbe65672d51254456f159bc9f95a3fe9d67234087c046fd9de128

  • C:\Users\Admin\AppData\Local\Temp\174820C6-BAB0-7891-A589-E927174B5B3E\HtmlScreens\title2.png

    Filesize

    44KB

    MD5

    a9e1f1f2b2628c6ee61c1e11c7288baf

    SHA1

    48b2f87ad6bc5d7cdc22500df46a967acb077cfa

    SHA256

    c336644e20a898fc28b216d91908c9ed4b716f572c0b06d5b3a5a68e43c6aeb9

    SHA512

    3027aead5dc0a2de2dfe7bbdaefeac1dfc1829db1edcd60493f51bbe3d3f75363b938f60a2cc6c46dd9992d9c33df5f8ab7a62e4235ca0858358cb73ad2dc514

  • C:\Users\Admin\AppData\Local\Temp\174820C6-BAB0-7891-A589-E927174B5B3E\HtmlScreens\toolBar.jpg

    Filesize

    19KB

    MD5

    56dc3cb42b46309e642c15167003685d

    SHA1

    045749de2c1492e5dfc4c44f9eb6c0feefe06b3d

    SHA256

    bc488502223b3369dd657e8bac70abc42ffde2223a0661fb507c8ec87778bca1

    SHA512

    5f3dc868d6e128407e071d6d7d7b9d0bbe7e45a32ff76985dfa53fe9dad0f5fb372ce64d35170c3719a06dd6762e4bb33089bfaedf93e6064c06c74a21b65a60

  • C:\Users\Admin\AppData\Local\Temp\174820C6-BAB0-7891-A589-E927174B5B3E\Setup.exe

    Filesize

    1.7MB

    MD5

    2cea6f4da60058bad2924385202c25cf

    SHA1

    5f437ecc88a691b6161b1d168b3f4a93624f5832

    SHA256

    a1a97e5c13a8e39ec8b5a9ffd7c5cff11749b1b203ce6f7095fec28d01b4798e

    SHA512

    07485068c9862ab09144312cb652fdc97fde34bd7de573d587ad25454aa8f611fcc5853ab2f1261d8e50cf39772e14fa6d518580d6ce5386a01dafd0ba3f59a5

  • C:\Users\Admin\AppData\Local\Temp\174820C6-BAB0-7891-A589-E927174B5B3E\Setup.exe

    Filesize

    1.7MB

    MD5

    2cea6f4da60058bad2924385202c25cf

    SHA1

    5f437ecc88a691b6161b1d168b3f4a93624f5832

    SHA256

    a1a97e5c13a8e39ec8b5a9ffd7c5cff11749b1b203ce6f7095fec28d01b4798e

    SHA512

    07485068c9862ab09144312cb652fdc97fde34bd7de573d587ad25454aa8f611fcc5853ab2f1261d8e50cf39772e14fa6d518580d6ce5386a01dafd0ba3f59a5

  • C:\Users\Admin\AppData\Local\Temp\174820C6-BAB0-7891-A589-E927174B5B3E\SetupStrings.dat

    Filesize

    57KB

    MD5

    19f47f9cab41a5e07d49a4171748b598

    SHA1

    d30b022c9d85be7384f26f335e01e56d2ef1a9e6

    SHA256

    07638d54048adfb3229fbc6a56a8b7ff6f3a8370bf942306ecb5352de64c3e86

    SHA512

    b83181ffa46ac732e6c4aabcc26b77ee594c1381311ddde3151b7e740e80c07ef84c5910e535696b4ccf8ddb11b1c5b8b3d387ba08ec346bc375c0d2f490dfb0

  • C:\Users\Admin\AppData\Local\Temp\174820C6-BAB0-7891-A589-E927174B5B3E\bab033.tbinst.dat

    Filesize

    236B

    MD5

    1ee8c638e49ee7137607722768afc5a2

    SHA1

    8719d7a498a49b042cd6fc411cac6c44f3c0f43a

    SHA256

    1368324e8df1654fb9c3bcae320e982ff9f40e76e0cc118d5f507649e1ec2f2e

    SHA512

    2acb5547bb9b62505a5332e3b2752c5004fee9579bc45c46271e53d42fff5f412f3a18863ed382052d961d33d0e0449d9c111950060663660d7dbb21e9bff575

  • C:\Users\Admin\AppData\Local\Temp\174820C6-BAB0-7891-A589-E927174B5B3E\bab091.norecovericon.dat

    Filesize

    174B

    MD5

    4f6e1fdbef102cdbd379fdac550b9f48

    SHA1

    5da6ee5b88a4040c80e5269e0cd2b0880b20659c

    SHA256

    e58ea352c050e6353fb5b4fa32a97800298c1603489d3b47794509af6c89ec4c

    SHA512

    54efc9bde44f332932a97396e59eca5b6ea1ac72f929ccffa1bdab96dc3ae8d61e126adbd26d12d0bc83141cee03b24ad2bada411230c4708b7a9ae9c60aecbe

  • C:\Users\Admin\AppData\Local\Temp\174820C6-BAB0-7891-A589-E927174B5B3E\sqlite3.dll

    Filesize

    508KB

    MD5

    0f66e8e2340569fb17e774dac2010e31

    SHA1

    406bb6854e7384ff77c0b847bf2f24f3315874a3

    SHA256

    de818c832308b82c2fabd5d3d4339c489e6f4e9d32bb8152c0dcd8359392695f

    SHA512

    39275df6e210836286e62a95ace7f66c7d2736a07b80f9b7e9bd2a716a6d074c79deae54e2d21505b74bac63df0328d6780a2129cdfda93aec1f75b523da9e05

  • C:\Windows\servicing\TrustedInstaller.exe

    Filesize

    193KB

    MD5

    805418acd5280e97074bdadca4d95195

    SHA1

    a69e4f03d775a7a0cc5ed2d5569cbfbb4d31d2d6

    SHA256

    73684e31ad4afe3fdc525b51ccaacc14d402c92db9c42e3fcbfe1e65524b1c01

    SHA512

    630a255950c0ae0983ae907d20326adea36ce262c7784428a0811b04726849c929bc9cea338a89e77447a6cec30b0889694158327c002566d3cf5be2bb88e4de

  • memory/3268-132-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/3268-151-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/3268-156-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB