Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2022, 10:48

General

  • Target

    f7326a75d34f61448c295c69b18f70e4a6b61cb1309216da3d76c1860067ae6c.exe

  • Size

    388KB

  • MD5

    c0a89cca7440553df0f7f6f512fe6155

  • SHA1

    d436f20942c482244e591b0fd96a73807e2e3c0a

  • SHA256

    f7326a75d34f61448c295c69b18f70e4a6b61cb1309216da3d76c1860067ae6c

  • SHA512

    4b5b13dd8231364d6deee2e730c1d02617a85e2d5dec51de5f1613e2f95c6800aed09e9b17209a9d5b5159bbe47b26875d98fe48fa724ec6667eb0ee5a31ca7a

  • SSDEEP

    6144:qLurmZyXaw3bQ/4ugAT4auUZmbW+503i/nIr:7yMX54bluUgHU

Malware Config

Signatures

  • ISR Stealer

    ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

  • ISR Stealer payload 9 IoCs
  • NirSoft MailPassView 3 IoCs

    Password recovery tool for various email clients

  • Nirsoft 3 IoCs
  • Executes dropped EXE 2 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7326a75d34f61448c295c69b18f70e4a6b61cb1309216da3d76c1860067ae6c.exe
    "C:\Users\Admin\AppData\Local\Temp\f7326a75d34f61448c295c69b18f70e4a6b61cb1309216da3d76c1860067ae6c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1864
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        /scomma "C:\Users\Admin\AppData\Local\Temp\fczeyyIjvp.ini"
        3⤵
          PID:1676
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          /scomma "C:\Users\Admin\AppData\Local\Temp\vf3xADmpgY.ini"
          3⤵
          • Accesses Microsoft Outlook accounts
          PID:1124
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\NcbService.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\NcbService.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:892
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CertPropSvc.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CertPropSvc.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1556
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
            4⤵
            • Suspicious use of SetThreadContext
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1992
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
              /scomma "C:\Users\Admin\AppData\Local\Temp\DkFv4xXYqr.ini"
              5⤵
                PID:1596
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                /scomma "C:\Users\Admin\AppData\Local\Temp\lmitdwA3lv.ini"
                5⤵
                • Accesses Microsoft Outlook accounts
                PID:1868

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

        Filesize

        2KB

        MD5

        49ca8fd63be87d106c15e4d4465bb350

        SHA1

        7511cbed1bd25b36405ce899569357d6bdbde28b

        SHA256

        38470dd31a31e03d5cec33057b0fef074ee125965ddbee31988d05d9ce818d46

        SHA512

        2032a2efa7e520139742b73ca126618f77294ddff2bfbc439eea2a0f3d87eea51d59ffbfb9d39041e675aa673cf41bde68a03ac50f4a89e471bbf0e995e3a7e7

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        Filesize

        61KB

        MD5

        3dcf580a93972319e82cafbc047d34d5

        SHA1

        8528d2a1363e5de77dc3b1142850e51ead0f4b6b

        SHA256

        40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

        SHA512

        98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

        Filesize

        1KB

        MD5

        410bc191ea3fca420537878555030ad9

        SHA1

        46dd3dbce7344b8c1439963d67d8e20b97f56eca

        SHA256

        2d4b3e5e604859be429efa83d4e442c4b884462810d136b0dbc6228980eb7fe6

        SHA512

        65763a99ce64bfe78ffdb92331192eee7e5b6c2ff365c6c89e2a37f59012074bdcac3e806e503fd7650ee29d5985ec05ae90b614b515c268c4a2a0c0088c8b1a

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C6872375A2E1BC120603F5605C3CEC71

        Filesize

        472B

        MD5

        095cb3cc728bce81930de9e3e65cb9e7

        SHA1

        1835992ec35c7e60b803485c91949f80318b671b

        SHA256

        d86afa72ee5b220e4ca267a82e22a68e953ead9cecde34fc60a09dcc95a2457f

        SHA512

        b1f40cbcb4a819d7c2ec2a77895ba536bc3bced09248c0255ec2aa47a15a43490e9cbac9a71dd4e621a926c74acd977c114ff56bf1e5e1afe9bb46a65feb336a

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

        Filesize

        488B

        MD5

        eedc0a208b94fc234dfb39b69a7f72ec

        SHA1

        a47f2e0fb6e73fe5b53159e1527c9831580673bf

        SHA256

        1709c21219cffe95e45d619fa49d2b1bfab3dbdd2f16169f540ef68bcb55cfb9

        SHA512

        4bcf928ae88db6541b2bd5c08bc6e5a55b08c989502d9faf8051cb523ca4c6ea4348572c29724b6b9d73dd6e00b7224910ab7c7d115f3d45d4f738b578af2f84

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        726effd8945102b1f6068549f5cbb602

        SHA1

        d35103be31679d47720ee291e433a0a465de8b52

        SHA256

        f7a4f6da0b343df0dee3a2263c0a18bbac6ed942d36e976764423dcb1e0a85c7

        SHA512

        2246796bcfbb89cf04ac56f1034ff28093fb5a10e758f9dac556f90a15f33929f6a826fc53eb8f0b2f6e85a5f61eb321969959b64c5504731479e783a622c27f

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

        Filesize

        482B

        MD5

        1d935b6b3cd4f6931970d737714f1b06

        SHA1

        4f69bc55553124331862572d24095c4c17496c99

        SHA256

        6a49657edb0b74f0e0820d8af3d5eba089f9de876f068f3cb1d4c2e554004d67

        SHA512

        3f16771b4e1ae4c69da4bb1a21b8d7de1178656588a4c84a7d64a478c4be2cf0ad4fb4022505de07dde41337ac91bc3159182b529805807974851183b92ff451

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C6872375A2E1BC120603F5605C3CEC71

        Filesize

        484B

        MD5

        94f0ea98286ad625a974bdac6fce31b4

        SHA1

        d6d98fde79b0914a749087db96089bebf72e80f6

        SHA256

        348249a7a279a91f0c5948c186798bdc7c4175f15e61a509bdcb75adfe342e99

        SHA512

        e328574337309ff5d850b8faf435280ea1b5a15328e749753207039da712798bc3a42997c8a4a6ffe158d031eaee578100b98ca4f37bacf682fe7f1ef40c2afc

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TAR9OKL9\index[1].htm

        Filesize

        162B

        MD5

        4f8e702cc244ec5d4de32740c0ecbd97

        SHA1

        3adb1f02d5b6054de0046e367c1d687b6cdf7aff

        SHA256

        9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a

        SHA512

        21047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f

      • C:\Users\Admin\AppData\Local\Temp\DkFv4xXYqr.ini

        Filesize

        5B

        MD5

        d1ea279fb5559c020a1b4137dc4de237

        SHA1

        db6f8988af46b56216a6f0daf95ab8c9bdb57400

        SHA256

        fcdcc2c46896915a1c695d6231f0fee336a668531b7a3da46178c80362546dba

        SHA512

        720e9c284f0559015312df7fe977563e5e16f48d3506e51eb4016adf7971924d352f740b030aa3adc81b6f65fd1dba12df06d10fa6c115074e5097e7ee0f08b3

      • C:\Users\Admin\AppData\Local\Temp\fczeyyIjvp.ini

        Filesize

        5B

        MD5

        d1ea279fb5559c020a1b4137dc4de237

        SHA1

        db6f8988af46b56216a6f0daf95ab8c9bdb57400

        SHA256

        fcdcc2c46896915a1c695d6231f0fee336a668531b7a3da46178c80362546dba

        SHA512

        720e9c284f0559015312df7fe977563e5e16f48d3506e51eb4016adf7971924d352f740b030aa3adc81b6f65fd1dba12df06d10fa6c115074e5097e7ee0f08b3

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CertPropSvc.exe

        Filesize

        388KB

        MD5

        c0a89cca7440553df0f7f6f512fe6155

        SHA1

        d436f20942c482244e591b0fd96a73807e2e3c0a

        SHA256

        f7326a75d34f61448c295c69b18f70e4a6b61cb1309216da3d76c1860067ae6c

        SHA512

        4b5b13dd8231364d6deee2e730c1d02617a85e2d5dec51de5f1613e2f95c6800aed09e9b17209a9d5b5159bbe47b26875d98fe48fa724ec6667eb0ee5a31ca7a

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\CertPropSvc.exe

        Filesize

        388KB

        MD5

        c0a89cca7440553df0f7f6f512fe6155

        SHA1

        d436f20942c482244e591b0fd96a73807e2e3c0a

        SHA256

        f7326a75d34f61448c295c69b18f70e4a6b61cb1309216da3d76c1860067ae6c

        SHA512

        4b5b13dd8231364d6deee2e730c1d02617a85e2d5dec51de5f1613e2f95c6800aed09e9b17209a9d5b5159bbe47b26875d98fe48fa724ec6667eb0ee5a31ca7a

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\NcbService.exe

        Filesize

        9KB

        MD5

        6a52b1cbd6a9da69b28b0bd3ddf7b315

        SHA1

        586b0645577b0a6a5b34a69dc8b024c40cc656b7

        SHA256

        1d9bb51617c01fed2c9374ecb48292bc70c2829d67724621a32280850b090175

        SHA512

        90b56bc30080acae049bb972e71634c906d96f19944f22284af5646fbc2b78ecdd74fb40469d110967fdb8cc5959e77851078e7ef72d2daacfe8c3d89739883e

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\NcbService.exe

        Filesize

        9KB

        MD5

        6a52b1cbd6a9da69b28b0bd3ddf7b315

        SHA1

        586b0645577b0a6a5b34a69dc8b024c40cc656b7

        SHA256

        1d9bb51617c01fed2c9374ecb48292bc70c2829d67724621a32280850b090175

        SHA512

        90b56bc30080acae049bb972e71634c906d96f19944f22284af5646fbc2b78ecdd74fb40469d110967fdb8cc5959e77851078e7ef72d2daacfe8c3d89739883e

      • \Users\Admin\AppData\Roaming\Microsoft\Windows\CertPropSvc.exe

        Filesize

        388KB

        MD5

        c0a89cca7440553df0f7f6f512fe6155

        SHA1

        d436f20942c482244e591b0fd96a73807e2e3c0a

        SHA256

        f7326a75d34f61448c295c69b18f70e4a6b61cb1309216da3d76c1860067ae6c

        SHA512

        4b5b13dd8231364d6deee2e730c1d02617a85e2d5dec51de5f1613e2f95c6800aed09e9b17209a9d5b5159bbe47b26875d98fe48fa724ec6667eb0ee5a31ca7a

      • \Users\Admin\AppData\Roaming\Microsoft\Windows\NcbService.exe

        Filesize

        9KB

        MD5

        6a52b1cbd6a9da69b28b0bd3ddf7b315

        SHA1

        586b0645577b0a6a5b34a69dc8b024c40cc656b7

        SHA256

        1d9bb51617c01fed2c9374ecb48292bc70c2829d67724621a32280850b090175

        SHA512

        90b56bc30080acae049bb972e71634c906d96f19944f22284af5646fbc2b78ecdd74fb40469d110967fdb8cc5959e77851078e7ef72d2daacfe8c3d89739883e

      • memory/892-100-0x0000000074850000-0x0000000074DFB000-memory.dmp

        Filesize

        5.7MB

      • memory/892-81-0x0000000074850000-0x0000000074DFB000-memory.dmp

        Filesize

        5.7MB

      • memory/1124-92-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/1124-98-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/1124-97-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/1124-96-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/1444-103-0x0000000074850000-0x0000000074DFB000-memory.dmp

        Filesize

        5.7MB

      • memory/1444-55-0x0000000074850000-0x0000000074DFB000-memory.dmp

        Filesize

        5.7MB

      • memory/1444-57-0x0000000074850000-0x0000000074DFB000-memory.dmp

        Filesize

        5.7MB

      • memory/1444-54-0x0000000075D71000-0x0000000075D73000-memory.dmp

        Filesize

        8KB

      • memory/1444-104-0x0000000002196000-0x00000000021A7000-memory.dmp

        Filesize

        68KB

      • memory/1444-56-0x0000000002196000-0x00000000021A7000-memory.dmp

        Filesize

        68KB

      • memory/1556-87-0x0000000074850000-0x0000000074DFB000-memory.dmp

        Filesize

        5.7MB

      • memory/1556-102-0x0000000074850000-0x0000000074DFB000-memory.dmp

        Filesize

        5.7MB

      • memory/1556-88-0x00000000009D6000-0x00000000009E7000-memory.dmp

        Filesize

        68KB

      • memory/1596-121-0x0000000000400000-0x0000000000453000-memory.dmp

        Filesize

        332KB

      • memory/1676-89-0x0000000000400000-0x0000000000453000-memory.dmp

        Filesize

        332KB

      • memory/1676-72-0x0000000000400000-0x0000000000453000-memory.dmp

        Filesize

        332KB

      • memory/1676-80-0x0000000000400000-0x0000000000453000-memory.dmp

        Filesize

        332KB

      • memory/1676-74-0x0000000000400000-0x0000000000453000-memory.dmp

        Filesize

        332KB

      • memory/1676-68-0x0000000000400000-0x0000000000453000-memory.dmp

        Filesize

        332KB

      • memory/1864-99-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/1864-63-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/1864-61-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/1864-59-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/1864-58-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/1864-101-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/1864-79-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/1868-140-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/1992-122-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/1992-141-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB