Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/11/2022, 16:14
Static task
static1
Behavioral task
behavioral1
Sample
fb4fddb4cbdf4cfe8a3c658c6634d4a1d653f9fa61c4ca2ecb069770bf3cae57.exe
Resource
win7-20220812-en
General
-
Target
fb4fddb4cbdf4cfe8a3c658c6634d4a1d653f9fa61c4ca2ecb069770bf3cae57.exe
-
Size
225KB
-
MD5
c20af4b2b3bcb4bb82ef4a78818caffa
-
SHA1
ddc2f854e96e649a300c6cba5bc8d57d0af8de58
-
SHA256
fb4fddb4cbdf4cfe8a3c658c6634d4a1d653f9fa61c4ca2ecb069770bf3cae57
-
SHA512
e53b8819e810d853f2fdf86e129058b096df025bdcf8ec308d8f69b796b911f52f0e1c60431654ac03caf081abdcbef807cb664f6581d6ff61ba9742cf2f33ab
-
SSDEEP
3072:qUJoFfWzzl+cSMY7xIsqoh3vpj+WSuW2x96i6e4coO81ju5qoRNir+QKQqjQgWmA:qweEpGxj9pHHeFwVNr7jzUBWnk/fZ
Malware Config
Extracted
formbook
fqsu
GhfTqaOqC4FsyoQRW/8=
kbPIpd/8k1C6zJz5mYYdK90ZUA==
VIdg/CoNGeYJHA==
KhzoqndOhw1j43z0ew==
wv8mTDcsX2wJN/Q=
MqBgt6S+3BgGKBQHLZy7Ucg=
GyhOb++nZDi39NPK7dbaKapf
pBtD1UoSTdo3eSp9H7OhRqMV0TAuKMU=
WTzTg1w+fP4fMO0oPPM=
NS/tpGdUwkiMwqmgkxoSzjrQATAuKMU=
MnoSdM1hYn4tdwxjB2fX
3EUfH2EJY17mMf4=
V9/wg2yCQruVszm7V+4=
aNL8pZCGYW4Ej2LD
1Bif9VkmdgVfrJqRvl1GtlTZq1M=
9wHIgmB8EOB2uUVcUfk=
1Fdn15qem+fL1qhrY9xdQmAnVg==
Y32ThttYUUr6PsuRmozlNP74RD+uBz7dOQ==
f5HKyoWNAJLM2qjnZlizsvXDKFs=
mRfaGezap6ZyvJqthZvf
XE1gb9BDOSjo
a9OJ2b2kjstszoza
9btSLokhpHEBONENG+A=
1oAKNwX+AlQ4RiqbCKr3/A==
CXyeL6Bef+sHEOohAWbW
LIB9lHUdfinrMPw=
X7dIczoX7/WDk2a0P4P42iAqXA==
1AosTUdOqyZn43z0ew==
w4kh92EUqSnrMPw=
X9mR59TIpqmQ3MRW3dHaKapf
KW8vtcGOicqbG6P1y0bE5w==
vkxt6aqmRoxJWDaaKoHs+c7R2RWuug==
djf3H/3eGlnoHf4=
QcvffHSEZVsaWTg6K5y7Ucg=
/kfWf0w9mxRGn1uybA==
b8lWfUMY2+E9opoOvdTaKapf
4ifWgGxC54S499ZNmE/F5Q==
7AP9JgUOCEUfL/5LmE/F5Q==
42soE+T1jmG3vkVcUfk=
2AssSCkCPo5ji3athZvf
sNMB+T7ij5hvrZLJiX7V
HR01IYJZMBiUzai563i+Z9E=
4Fd9D4pjthkFCt5RmE/F5Q==
6yu5FXMXHiy7zqGthZvf
cO+UduB23nibvKmTiwbzQmAnVg==
vXETR/2rOfRETvrbmE/F5Q==
ic+XHc6whH7sfccPmE/F5Q==
DSc+LHk1A/5szoza
JTFNQgUfvHjj4Kb8os3aKapf
YxDG7ce0Ers3TB1s39HaKapf
j+eurPutWiCeDmathZvf
XQcvovGUtwkHTB519CFlQmAnVg==
1HmuRaRp15cZQQbZ7hFlQmAnVg==
tPmYAWoWGUY6SPhMmE/F5Q==
EFryTMuzz5HJ9OU=
G135x5VKYpuQ43z0ew==
CTnVhWd74nOZ43z0ew==
sJ+03smn9npsyoQRW/8=
JJRan1oWtqJ2vJiNVpWT9KBZ
Qj9Pa11v7KkTUSfp46OeQcZK/W0PZLdr
FjVWTQ8bqinrMPw=
rdVfEergTeAkTAXemE/F5Q==
55jA4cQafSnrMPw=
kIcp2ZZgh9jlEgn7D6KNKHID70AOvlxj
mtvglobalmusic.com
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 9 1988 cmd.exe 22 1988 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1920 bquztp.exe 1908 bquztp.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\International\Geo\Nation bquztp.exe -
Loads dropped DLL 3 IoCs
pid Process 900 fb4fddb4cbdf4cfe8a3c658c6634d4a1d653f9fa61c4ca2ecb069770bf3cae57.exe 1920 bquztp.exe 1988 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1920 set thread context of 1908 1920 bquztp.exe 28 PID 1908 set thread context of 1420 1908 bquztp.exe 15 PID 1988 set thread context of 1420 1988 cmd.exe 15 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \Registry\User\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmd.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1908 bquztp.exe 1908 bquztp.exe 1908 bquztp.exe 1908 bquztp.exe 1988 cmd.exe 1988 cmd.exe 1988 cmd.exe 1988 cmd.exe 1988 cmd.exe 1988 cmd.exe 1988 cmd.exe 1988 cmd.exe 1988 cmd.exe 1988 cmd.exe 1988 cmd.exe 1988 cmd.exe 1988 cmd.exe 1988 cmd.exe 1988 cmd.exe 1988 cmd.exe 1988 cmd.exe 1988 cmd.exe 1988 cmd.exe 1988 cmd.exe 1988 cmd.exe 1988 cmd.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 1920 bquztp.exe 1908 bquztp.exe 1908 bquztp.exe 1908 bquztp.exe 1988 cmd.exe 1988 cmd.exe 1988 cmd.exe 1988 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1908 bquztp.exe Token: SeDebugPrivilege 1988 cmd.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1420 Explorer.EXE 1420 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1420 Explorer.EXE 1420 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 900 wrote to memory of 1920 900 fb4fddb4cbdf4cfe8a3c658c6634d4a1d653f9fa61c4ca2ecb069770bf3cae57.exe 27 PID 900 wrote to memory of 1920 900 fb4fddb4cbdf4cfe8a3c658c6634d4a1d653f9fa61c4ca2ecb069770bf3cae57.exe 27 PID 900 wrote to memory of 1920 900 fb4fddb4cbdf4cfe8a3c658c6634d4a1d653f9fa61c4ca2ecb069770bf3cae57.exe 27 PID 900 wrote to memory of 1920 900 fb4fddb4cbdf4cfe8a3c658c6634d4a1d653f9fa61c4ca2ecb069770bf3cae57.exe 27 PID 1920 wrote to memory of 1908 1920 bquztp.exe 28 PID 1920 wrote to memory of 1908 1920 bquztp.exe 28 PID 1920 wrote to memory of 1908 1920 bquztp.exe 28 PID 1920 wrote to memory of 1908 1920 bquztp.exe 28 PID 1920 wrote to memory of 1908 1920 bquztp.exe 28 PID 1420 wrote to memory of 1988 1420 Explorer.EXE 29 PID 1420 wrote to memory of 1988 1420 Explorer.EXE 29 PID 1420 wrote to memory of 1988 1420 Explorer.EXE 29 PID 1420 wrote to memory of 1988 1420 Explorer.EXE 29 PID 1988 wrote to memory of 1820 1988 cmd.exe 32 PID 1988 wrote to memory of 1820 1988 cmd.exe 32 PID 1988 wrote to memory of 1820 1988 cmd.exe 32 PID 1988 wrote to memory of 1820 1988 cmd.exe 32 PID 1988 wrote to memory of 1820 1988 cmd.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\fb4fddb4cbdf4cfe8a3c658c6634d4a1d653f9fa61c4ca2ecb069770bf3cae57.exe"C:\Users\Admin\AppData\Local\Temp\fb4fddb4cbdf4cfe8a3c658c6634d4a1d653f9fa61c4ca2ecb069770bf3cae57.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\bquztp.exe"C:\Users\Admin\AppData\Local\Temp\bquztp.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\bquztp.exe"C:\Users\Admin\AppData\Local\Temp\bquztp.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1820
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5e31a7d32d2fd851ae1b00ff85dd3a9ca
SHA11e63242b754008bfae79a5ab8e7a2ea45cc2dcd3
SHA256aed72f8afba130aa196db63b1b036450d539c55f3bf9a352df09ce1f9202bddf
SHA512ab51bcfb7d6fe8ff1f62ba030334594c25347eca882348ae1933c7001f841eab24d429704479bb8e343b03e7192506be48a17ece2c999862ee644ec094ced593
-
Filesize
6KB
MD5e31a7d32d2fd851ae1b00ff85dd3a9ca
SHA11e63242b754008bfae79a5ab8e7a2ea45cc2dcd3
SHA256aed72f8afba130aa196db63b1b036450d539c55f3bf9a352df09ce1f9202bddf
SHA512ab51bcfb7d6fe8ff1f62ba030334594c25347eca882348ae1933c7001f841eab24d429704479bb8e343b03e7192506be48a17ece2c999862ee644ec094ced593
-
Filesize
6KB
MD5e31a7d32d2fd851ae1b00ff85dd3a9ca
SHA11e63242b754008bfae79a5ab8e7a2ea45cc2dcd3
SHA256aed72f8afba130aa196db63b1b036450d539c55f3bf9a352df09ce1f9202bddf
SHA512ab51bcfb7d6fe8ff1f62ba030334594c25347eca882348ae1933c7001f841eab24d429704479bb8e343b03e7192506be48a17ece2c999862ee644ec094ced593
-
Filesize
185KB
MD5cfa7847468c5383cd501f8f805e0021a
SHA1f44e223a9af2db99ac56f2f7927fb64949ab1664
SHA25658a415b44850c89beb91dbc1c21c81f8476970ea6226645483f268d68a271cd7
SHA512e4ae5c17d31e45a9dadf72881cd1c42dd8d82095b0068c620b924c90ea328f0e78ddefb3e14f23da28d650bbe273698586327f4cb07dc6098ecd3920eb6e3d98
-
Filesize
5KB
MD5b104c03dbda7dcb8f911d3d48ef3cdc5
SHA124f0c3f064a2fc7fbb945bcb89a4dc3914519ff2
SHA256d9225978ab417360cb9fd791ea653ff49f6b2c4df533d0be078e30eca7b0832f
SHA512a61e358fe6d43c45b7cb0a00d770ff8b9d0696c8b09ef7b1ac42a51ba838b2854b4d61c05ead24dab15041dfdde661f32422da650231c170e2cfc8d325491d66
-
Filesize
6KB
MD5e31a7d32d2fd851ae1b00ff85dd3a9ca
SHA11e63242b754008bfae79a5ab8e7a2ea45cc2dcd3
SHA256aed72f8afba130aa196db63b1b036450d539c55f3bf9a352df09ce1f9202bddf
SHA512ab51bcfb7d6fe8ff1f62ba030334594c25347eca882348ae1933c7001f841eab24d429704479bb8e343b03e7192506be48a17ece2c999862ee644ec094ced593
-
Filesize
6KB
MD5e31a7d32d2fd851ae1b00ff85dd3a9ca
SHA11e63242b754008bfae79a5ab8e7a2ea45cc2dcd3
SHA256aed72f8afba130aa196db63b1b036450d539c55f3bf9a352df09ce1f9202bddf
SHA512ab51bcfb7d6fe8ff1f62ba030334594c25347eca882348ae1933c7001f841eab24d429704479bb8e343b03e7192506be48a17ece2c999862ee644ec094ced593
-
Filesize
904KB
MD55e5ba61531d74e45b11cadb79e7394a1
SHA1677224e14aac9dd35f367d5eb1704b36e69356b8
SHA25699e91ae250c955bd403ec1a2321d6b11fcb715bdcc7cb3f63ffb46b349afde5c
SHA512712bfe419ba97ecf0ec8323a68743013e8c767da9d986f74ab94d2a395c3086cac2a5823048e0022d3bbcebb55281b9e1f8c87fdc9295c70cc5521b57850bf46