Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
38s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 22:07
Static task
static1
Behavioral task
behavioral1
Sample
60b9d52c8c4bf25feff7498606e2abc862cd1368d07b7596823b85cae7c5bb1a.exe
Resource
win7-20220812-en
General
-
Target
60b9d52c8c4bf25feff7498606e2abc862cd1368d07b7596823b85cae7c5bb1a.exe
-
Size
2.1MB
-
MD5
dcaf0153cc1364a332bd0b533c6dca5b
-
SHA1
88c78f4f6f97ef2588b2bbd53ae5dbbcecdb6cbf
-
SHA256
60b9d52c8c4bf25feff7498606e2abc862cd1368d07b7596823b85cae7c5bb1a
-
SHA512
999bf47e3f7fcdc8b074fc807f31f2331866cf520e765c67d0062bb98a6924568d791a12f2cfd3c2d810b16e4ba97e33e528857436f085940a6385bc8d1e4090
-
SSDEEP
49152:h1OsWPtqGqK2M8f3h4UO2sEYYQvLZwQE5m4oE:h1O5HoxLYYaQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1536 SC55uFAIFl6enDc.exe -
Loads dropped DLL 4 IoCs
pid Process 1504 60b9d52c8c4bf25feff7498606e2abc862cd1368d07b7596823b85cae7c5bb1a.exe 1536 SC55uFAIFl6enDc.exe 964 regsvr32.exe 1724 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\jjogomkfakejefcnennkjmgmnhgahabi\200\manifest.json SC55uFAIFl6enDc.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\jjogomkfakejefcnennkjmgmnhgahabi\200\manifest.json SC55uFAIFl6enDc.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\jjogomkfakejefcnennkjmgmnhgahabi\200\manifest.json SC55uFAIFl6enDc.exe -
Installs/modifies Browser Helper Object 2 TTPs 11 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} SC55uFAIFl6enDc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ SC55uFAIFl6enDc.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} SC55uFAIFl6enDc.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} SC55uFAIFl6enDc.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects SC55uFAIFl6enDc.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\BrowwSEr ShoP\6a8NEMkcKaDojU.tlb SC55uFAIFl6enDc.exe File opened for modification C:\Program Files (x86)\BrowwSEr ShoP\6a8NEMkcKaDojU.tlb SC55uFAIFl6enDc.exe File created C:\Program Files (x86)\BrowwSEr ShoP\6a8NEMkcKaDojU.dat SC55uFAIFl6enDc.exe File opened for modification C:\Program Files (x86)\BrowwSEr ShoP\6a8NEMkcKaDojU.dat SC55uFAIFl6enDc.exe File created C:\Program Files (x86)\BrowwSEr ShoP\6a8NEMkcKaDojU.x64.dll SC55uFAIFl6enDc.exe File opened for modification C:\Program Files (x86)\BrowwSEr ShoP\6a8NEMkcKaDojU.x64.dll SC55uFAIFl6enDc.exe File created C:\Program Files (x86)\BrowwSEr ShoP\6a8NEMkcKaDojU.dll SC55uFAIFl6enDc.exe File opened for modification C:\Program Files (x86)\BrowwSEr ShoP\6a8NEMkcKaDojU.dll SC55uFAIFl6enDc.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1536 1504 60b9d52c8c4bf25feff7498606e2abc862cd1368d07b7596823b85cae7c5bb1a.exe 26 PID 1504 wrote to memory of 1536 1504 60b9d52c8c4bf25feff7498606e2abc862cd1368d07b7596823b85cae7c5bb1a.exe 26 PID 1504 wrote to memory of 1536 1504 60b9d52c8c4bf25feff7498606e2abc862cd1368d07b7596823b85cae7c5bb1a.exe 26 PID 1504 wrote to memory of 1536 1504 60b9d52c8c4bf25feff7498606e2abc862cd1368d07b7596823b85cae7c5bb1a.exe 26 PID 1536 wrote to memory of 964 1536 SC55uFAIFl6enDc.exe 27 PID 1536 wrote to memory of 964 1536 SC55uFAIFl6enDc.exe 27 PID 1536 wrote to memory of 964 1536 SC55uFAIFl6enDc.exe 27 PID 1536 wrote to memory of 964 1536 SC55uFAIFl6enDc.exe 27 PID 1536 wrote to memory of 964 1536 SC55uFAIFl6enDc.exe 27 PID 1536 wrote to memory of 964 1536 SC55uFAIFl6enDc.exe 27 PID 1536 wrote to memory of 964 1536 SC55uFAIFl6enDc.exe 27 PID 964 wrote to memory of 1724 964 regsvr32.exe 28 PID 964 wrote to memory of 1724 964 regsvr32.exe 28 PID 964 wrote to memory of 1724 964 regsvr32.exe 28 PID 964 wrote to memory of 1724 964 regsvr32.exe 28 PID 964 wrote to memory of 1724 964 regsvr32.exe 28 PID 964 wrote to memory of 1724 964 regsvr32.exe 28 PID 964 wrote to memory of 1724 964 regsvr32.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\60b9d52c8c4bf25feff7498606e2abc862cd1368d07b7596823b85cae7c5bb1a.exe"C:\Users\Admin\AppData\Local\Temp\60b9d52c8c4bf25feff7498606e2abc862cd1368d07b7596823b85cae7c5bb1a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\7zS456A.tmp\SC55uFAIFl6enDc.exe.\SC55uFAIFl6enDc.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\BrowwSEr ShoP\6a8NEMkcKaDojU.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\BrowwSEr ShoP\6a8NEMkcKaDojU.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
PID:1724
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5469637b4803115be85ebe4c997bf4b14
SHA18f5cac19d1156fe1405431fe588daacc595dc505
SHA256b2f76c27d11f9ce2267a127aefd88d852b96c34baaa0be1a2f7bfca6567e25ec
SHA51255a4c96188a9fe26631e14edffe57b9003aa8121e6b965cf385194dd8141c64b9a028a5cc17e5437dcc80c14bca0409eeab3980f64c367b7ffb7d578ed3b83d0
-
Filesize
698KB
MD54f474d78d3944242daf1069b024ba83c
SHA10ef8ee373b77bf05e3c0de0a66dd4d8589dff7d9
SHA256935dfff0607280f142a69b4e109ac34ebabca578240d9c66c1561fc67ae4a1a8
SHA5121da43bff1edf956a365200a4092a7647c0054bf6196155c5b2e2659c12d6d6adb43db6aed503cace12b8c97aba3343abddc34acdf1f663eef667eebc9153f6a2
-
Filesize
618KB
MD59e56f8bd63dc95894be8b9e660696f1c
SHA12efcb8fc0ce33f2ada28fb2a6a17ec43813f80cb
SHA25693186596d2312706d0623df3c9b9dfdea35546d5506b20216d2a7efeb1d8d79a
SHA512e52fa89e7cf8ed7419a5f410f6bf46a19695727f19f8eebd714dee9d6f8a9036acc528cd6b0033f70f11a04e18746b814ee2dc494f2fc82db104a876b479d827
-
Filesize
3KB
MD5713ab144897857b45ce9515c2a1e2d52
SHA1607a46adbfe1892276898fb6b00e7c62dbf82772
SHA2563ec756ec9b8c4b03cc723127bc372b67c406a4915fa0a82597b0fb29685096e6
SHA512b54c6eaf989d9e51ba66278a0991daa14bde0f56e86c8c2fce67f2118e9557307b409fbc9ae48921c37c1869634b2801028d728f4cf3b871ad8971965e3004b1
-
Filesize
698KB
MD54f474d78d3944242daf1069b024ba83c
SHA10ef8ee373b77bf05e3c0de0a66dd4d8589dff7d9
SHA256935dfff0607280f142a69b4e109ac34ebabca578240d9c66c1561fc67ae4a1a8
SHA5121da43bff1edf956a365200a4092a7647c0054bf6196155c5b2e2659c12d6d6adb43db6aed503cace12b8c97aba3343abddc34acdf1f663eef667eebc9153f6a2
-
Filesize
6KB
MD5469637b4803115be85ebe4c997bf4b14
SHA18f5cac19d1156fe1405431fe588daacc595dc505
SHA256b2f76c27d11f9ce2267a127aefd88d852b96c34baaa0be1a2f7bfca6567e25ec
SHA51255a4c96188a9fe26631e14edffe57b9003aa8121e6b965cf385194dd8141c64b9a028a5cc17e5437dcc80c14bca0409eeab3980f64c367b7ffb7d578ed3b83d0
-
Filesize
629KB
MD515dada567404c2049507d7098389e997
SHA1508d8cc90c247e26ce5041c718825734079d841c
SHA256888d66bccd07a163c4fcf59dca8fb4577fe6ecb7b11c427108b1e0aa45fccc58
SHA5126fd82c0d06c43b309ce45c048c072c9696dfd6e9a81ec5149df64784f6428c6abe91b9be215b8a47dafc8859319be94bb13fbd2e4bc1795da61b970202a15261
-
Filesize
629KB
MD515dada567404c2049507d7098389e997
SHA1508d8cc90c247e26ce5041c718825734079d841c
SHA256888d66bccd07a163c4fcf59dca8fb4577fe6ecb7b11c427108b1e0aa45fccc58
SHA5126fd82c0d06c43b309ce45c048c072c9696dfd6e9a81ec5149df64784f6428c6abe91b9be215b8a47dafc8859319be94bb13fbd2e4bc1795da61b970202a15261
-
C:\Users\Admin\AppData\Local\Temp\7zS456A.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zS456A.tmp\[email protected]\chrome.manifest
Filesize35B
MD5325e3f00486c4aa09ae46e2df599e86b
SHA17a8c416e3274ed4e87811efb34908cb289d450e8
SHA256770285fcb6acd4cf2792c04f8826759edda581ddf607e9f22b674eea35ac2c36
SHA5125d8938ea43d55fff1b8bb2cd2681990199bf372ab20917f9ec2c9fa9fa8c5ff8ce4fbc38577fbd199b005f21fd657dffe22b1aa28e1b4857c7394909f1816ade
-
C:\Users\Admin\AppData\Local\Temp\7zS456A.tmp\[email protected]\content\bg.js
Filesize7KB
MD51e823ea1070545cbef214d6dc841c5e5
SHA1d450ead2a9bb79fff3fb69b72baba2c723a3f683
SHA256bee68bfb7230fcad07d4b6cfea9b13abec68376e355799f9d42fa42f056e9859
SHA51270aad7cb4bd842d58a3d0747797ae87123bc3cb79f8ada69f6b1a0be9e7821352353a74de79ec6290ce25ac9dce8d207d3fbfa0b2e28ef3d4a153857678b2411
-
C:\Users\Admin\AppData\Local\Temp\7zS456A.tmp\[email protected]\install.rdf
Filesize602B
MD54b1fe0565993d1002fcb7d0a06c0b7a3
SHA1b730f6517f1076c4a6a8fe1533a6682a8072c820
SHA256a177d9bd744ed5d6325c545b201a9309576332f662440c8e18b1537259509046
SHA512726fcccc531e2b705fc5724fe6aa85f4fcf71f2f734afa9681c282743eeb095c3e50e4a7d9f53663e3ea8d9dbf9f9090d27764942826c81bf4e76ab701e1fed6
-
Filesize
140B
MD5dab7c7a7ce4f92e5f6d26d9fb4d5357b
SHA1aded88bc943852f6592275f72c76894e71b99be4
SHA2567a27422e6003a5a8bfcb7a9b7ac327139f5eeabf08845ac3dd6722805904c8bf
SHA5124b6c6ac89c1e769ceb6d022be04db70b724748dada79290f9bf2f857a7c2899a6659b9996c44abcc9a30c4ef1a10c414b0becd8d905f1e113c140b5982e73cc2
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
505B
MD52bbe707fde83dc9c71d0b992fe71284c
SHA1a97807704da479544ccad68fed3ccec447e033fb
SHA256890a2b254c7882390e8ceb5d40b82e0021f83bda343447cf4b0f694fbb076e60
SHA512867ada85adc467e6911404a6e8e3d8ab999c685d91fe039a813e731541f7edca6e41f91d3ec7df616c4ce3e14698d62cd4164b039519ab42f1b12241a5b7b759
-
Filesize
5KB
MD520c90ec6a0e2d2a7eca0681e917d0082
SHA1195199ea8ce6232dd6d46f10cdffa54b0e1d24fb
SHA25623146ee33f67d599b886067ed095deea49d01257cb3827d908357cdb0fc478ae
SHA512bfd6ff9200b31be8d7d105621267c704c131fc0aebf8e7e64890fd607d85076674e1a3465ce719dca300197b61415d90f397b96d8d3c14a2c268991ba79c08f4
-
Filesize
618KB
MD59e56f8bd63dc95894be8b9e660696f1c
SHA12efcb8fc0ce33f2ada28fb2a6a17ec43813f80cb
SHA25693186596d2312706d0623df3c9b9dfdea35546d5506b20216d2a7efeb1d8d79a
SHA512e52fa89e7cf8ed7419a5f410f6bf46a19695727f19f8eebd714dee9d6f8a9036acc528cd6b0033f70f11a04e18746b814ee2dc494f2fc82db104a876b479d827
-
Filesize
698KB
MD54f474d78d3944242daf1069b024ba83c
SHA10ef8ee373b77bf05e3c0de0a66dd4d8589dff7d9
SHA256935dfff0607280f142a69b4e109ac34ebabca578240d9c66c1561fc67ae4a1a8
SHA5121da43bff1edf956a365200a4092a7647c0054bf6196155c5b2e2659c12d6d6adb43db6aed503cace12b8c97aba3343abddc34acdf1f663eef667eebc9153f6a2
-
Filesize
698KB
MD54f474d78d3944242daf1069b024ba83c
SHA10ef8ee373b77bf05e3c0de0a66dd4d8589dff7d9
SHA256935dfff0607280f142a69b4e109ac34ebabca578240d9c66c1561fc67ae4a1a8
SHA5121da43bff1edf956a365200a4092a7647c0054bf6196155c5b2e2659c12d6d6adb43db6aed503cace12b8c97aba3343abddc34acdf1f663eef667eebc9153f6a2
-
Filesize
629KB
MD515dada567404c2049507d7098389e997
SHA1508d8cc90c247e26ce5041c718825734079d841c
SHA256888d66bccd07a163c4fcf59dca8fb4577fe6ecb7b11c427108b1e0aa45fccc58
SHA5126fd82c0d06c43b309ce45c048c072c9696dfd6e9a81ec5149df64784f6428c6abe91b9be215b8a47dafc8859319be94bb13fbd2e4bc1795da61b970202a15261