Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

22/11/2022, 10:23

221122-me2xbadd8z 8

22/11/2022, 10:19

221122-mckj9add2v 8

22/11/2022, 10:14

221122-l9ql4adc3w 8

Analysis

  • max time kernel
    148s
  • max time network
    168s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    22/11/2022, 10:14

General

  • Target

    StupidIdiotCafe - Linkvertise Downloader_u7i1-f1.exe

  • Size

    4.3MB

  • MD5

    19079710e724d00ec52a979335797a6e

  • SHA1

    d28f13775018622f1f3d2a7c721d2fecfee18998

  • SHA256

    93ca5549b18737699deb942e2404bd373b88f72d2b5d4693bb68456c6d84da02

  • SHA512

    ecf31d9366f8cd66759dc15daffe7ea3a0538e07ef13c36bad45db24b0833a2ec8e5b5e36bb711b3209227b8371486c051f0a65ebbf1f47a6b6707df4a0b32e7

  • SSDEEP

    98304:tkLt6hB0m9WZXk8a7EdrL143hPZmKAdKwcNtDGdPBmM:eQBf9WO8amCRPMLKwcNcdPBR

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\StupidIdiotCafe - Linkvertise Downloader_u7i1-f1.exe
    "C:\Users\Admin\AppData\Local\Temp\StupidIdiotCafe - Linkvertise Downloader_u7i1-f1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Users\Admin\AppData\Local\Temp\is-3AC1E.tmp\StupidIdiotCafe - Linkvertise Downloader_u7i1-f1.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-3AC1E.tmp\StupidIdiotCafe - Linkvertise Downloader_u7i1-f1.tmp" /SL5="$70122,3475251,1235968,C:\Users\Admin\AppData\Local\Temp\StupidIdiotCafe - Linkvertise Downloader_u7i1-f1.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1720
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://paste.sh/U_bf4h9Z#aLacLL88NVkuNBDqoT8H9nY2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:992
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:992 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1864
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:820
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef67b4f50,0x7fef67b4f60,0x7fef67b4f70
      2⤵
        PID:316
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1132,5866764081297506142,9330570716532657577,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1128 /prefetch:2
        2⤵
          PID:1968
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1132,5866764081297506142,9330570716532657577,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1308 /prefetch:8
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:288
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1132,5866764081297506142,9330570716532657577,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1760 /prefetch:8
          2⤵
            PID:1560
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1132,5866764081297506142,9330570716532657577,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2092 /prefetch:1
            2⤵
              PID:1264
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1132,5866764081297506142,9330570716532657577,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2104 /prefetch:1
              2⤵
                PID:1656
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1132,5866764081297506142,9330570716532657577,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2372 /prefetch:8
                2⤵
                  PID:2116
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1132,5866764081297506142,9330570716532657577,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3344 /prefetch:2
                  2⤵
                    PID:2216
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1132,5866764081297506142,9330570716532657577,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:1
                    2⤵
                      PID:2300
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1132,5866764081297506142,9330570716532657577,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3540 /prefetch:8
                      2⤵
                        PID:2364
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1132,5866764081297506142,9330570716532657577,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3668 /prefetch:8
                        2⤵
                          PID:2372

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        43155b0425965f1031dfe37c2d8ed543

                        SHA1

                        cef2bad4714cb80b9bd6961ecf4d3bafdd2ba8d4

                        SHA256

                        b747007ebe631a13c5f546b7714fe730a99ba0309e787122853cd96ead10d923

                        SHA512

                        737fb98dfd19371f988f7daf189a0d89c5245d941c1ce08ac206aef2aeadfd9b1dd554c9f1d655b7e9941ed4a4eece543f46c104ad4fa57c6686e977df50f8e9

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        46e3b0447b7815c7329f31239932e20c

                        SHA1

                        9f9178fe617939611a6e871d30fb1ea167108007

                        SHA256

                        20ce88a4182de193bf71c3741ef6c7244113c73356c7ac921e1239c34fb3a586

                        SHA512

                        4f5282927e19621d239c7b46c6da1bbed93e99bea998190136da284633f017b109138bf0a5cf30f9ede8fb9b4930f45113c26ec633c5fc8c82459e52ecb0d6ce

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        270c34ab9abb2f88b1ab906df72307e7

                        SHA1

                        3aef476c433bd951e2a4b836b56b47f441b2b187

                        SHA256

                        a7db37f12381c59c47fcc16208759a8f35c9340023b4bd49d262dbd34bd09352

                        SHA512

                        3622860f7de6b598289048ccd5d30836147b12e611fd241ca5d61e39a225d54660d86641f64a8364fc87a3c9d84fae61ff2399f1afe89b2c974d2b34465e74a5

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        342B

                        MD5

                        e6b693e8a9998fb50a7158988bacecfb

                        SHA1

                        3eaf05cb5bedf404e7b107504446354dfe74b9ac

                        SHA256

                        2ae0d3063f6c69814bd6efe8ce7d8b99c84f93548a269d1a553527ff81c60ed4

                        SHA512

                        f854d237e831784049b40a4609d71b03eb234c8c442d0add488af4c67bc53ea4254987c539789ec8153777fa0c9fc8d4847d683154d7b9c9cc44a09a949506c4

                      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1wzfztv\imagestore.dat

                        Filesize

                        1KB

                        MD5

                        279ef345f81ff98144dd1141c40cc773

                        SHA1

                        0ce53d3d4a079579c75eb3325774d755c4a6ab41

                        SHA256

                        a62b3ba3bc2796f428c60dff1be19b0c627d70e4e753a6f41e18283c8e424f8d

                        SHA512

                        3588e1a6ec4c57da83dbf3d423825eeccc77a72e7de1e2e4261cb3e5e5eca46fb24a89d11590dbc14e1566b45eadd51eb81bc73912b0b225906336cf9c488260

                      • C:\Users\Admin\AppData\Local\Temp\is-3AC1E.tmp\StupidIdiotCafe - Linkvertise Downloader_u7i1-f1.tmp

                        Filesize

                        3.4MB

                        MD5

                        2d8c736e49d6c7b4739418277a32d16e

                        SHA1

                        ad2fd43457b75de6af95d1af03edc9c45c9717d7

                        SHA256

                        94e86b57bd15d1d8580cdaab9bf56cab05821598ed0c61c153d3c25da417de57

                        SHA512

                        01822b7ee33f78ac78005e4184ec67fcf062113ed853ca388bf457652948fc714ffc5d10ff122414e4d74812096b061f13087c673983420d930a108df901e638

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\MW1TMJ3J.txt

                        Filesize

                        601B

                        MD5

                        fa3d21306fe9958a60791027d82ec02f

                        SHA1

                        4ff316ee4e5755eb9330946730c033868b57a7ba

                        SHA256

                        5df63ffd68c256237a215a41ebea1239c0cb2096eb756832aa2a97644e71443e

                        SHA512

                        28d1d351d2fd669b41dbbb190f44c10eb21c8b03ce95cc62b12994c66777a729bff791f983e4f226232a39c39e989ca28c1dad75b813bcb9f95dd0944146c7aa

                      • \Users\Admin\AppData\Local\Temp\is-3AC1E.tmp\StupidIdiotCafe - Linkvertise Downloader_u7i1-f1.tmp

                        Filesize

                        3.4MB

                        MD5

                        2d8c736e49d6c7b4739418277a32d16e

                        SHA1

                        ad2fd43457b75de6af95d1af03edc9c45c9717d7

                        SHA256

                        94e86b57bd15d1d8580cdaab9bf56cab05821598ed0c61c153d3c25da417de57

                        SHA512

                        01822b7ee33f78ac78005e4184ec67fcf062113ed853ca388bf457652948fc714ffc5d10ff122414e4d74812096b061f13087c673983420d930a108df901e638

                      • \Users\Admin\AppData\Local\Temp\is-MCEF9.tmp\AppUtils.dll

                        Filesize

                        1.8MB

                        MD5

                        61313107f86efd528d5e0b15fcc8b8c7

                        SHA1

                        4de55bee0decf620de12ee49d8d94d6796d59721

                        SHA256

                        99c01c23b88ab7e656ccb05200fec3c12779de7e20fa20aaea034e7a12fc90ef

                        SHA512

                        7fcd8fde1ead2ee6e879240f55f3ff4db17e7f716c3fc7f28da1464ed4a1760568427584fe34cfea945c64ab9a8db7b8d50e80e3bc27b8c2c1103aa6846a9dc2

                      • \Users\Admin\AppData\Local\Temp\is-MCEF9.tmp\DimensionUtils.dll

                        Filesize

                        1.9MB

                        MD5

                        21da787bf4014ee28ba649bc0335f012

                        SHA1

                        9ae7f559a3f925e533f1526722118bb16672ee28

                        SHA256

                        9f5e08b5309fde308dc9786e98e90cb3661fc06ac8dfdfbfa550b5e62b083564

                        SHA512

                        0b44ca41123d4cd94acb192e2865e4e7bfc4c0c80722efb59c40675f76eb06e042d889fb2a01caa0f371abce69c387ffe4e50b9d6fa16c25ef03f20989c3c3a5

                      • \Users\Admin\AppData\Local\Temp\is-MCEF9.tmp\botva2.dll

                        Filesize

                        37KB

                        MD5

                        67965a5957a61867d661f05ae1f4773e

                        SHA1

                        f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

                        SHA256

                        450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

                        SHA512

                        c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

                      • memory/1516-68-0x0000000000400000-0x000000000053B000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/1516-66-0x0000000000400000-0x000000000053B000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/1516-54-0x0000000076161000-0x0000000076163000-memory.dmp

                        Filesize

                        8KB

                      • memory/1516-60-0x0000000000400000-0x000000000053B000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/1516-55-0x0000000000400000-0x000000000053B000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/1720-67-0x0000000073C91000-0x0000000073C93000-memory.dmp

                        Filesize

                        8KB