Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 23:16
Static task
static1
Behavioral task
behavioral1
Sample
64e992d125d8f14729371b90bcd58456ca4c859beaaa92978d7ef85f617d020d.exe
Resource
win7-20220901-en
General
-
Target
64e992d125d8f14729371b90bcd58456ca4c859beaaa92978d7ef85f617d020d.exe
-
Size
2.1MB
-
MD5
333bc9e45bca6aea23da6e357d448fcb
-
SHA1
ccccce0cf5e6d0db30c65458bda25287a67037d8
-
SHA256
64e992d125d8f14729371b90bcd58456ca4c859beaaa92978d7ef85f617d020d
-
SHA512
abf3b17d1c2f912a7d639f923e4dd5d2a3f0b48ef1af0704ac7115ca7f604e2a2af389cde8723141bb2a38ba813ff848e0e08b06f1ed4dc0e63ac0c169565529
-
SSDEEP
49152:h1OslYIGWkf6jd9YMhKKumq+4oAczj/i6jgvb7GvKS0:h1Oedd9YMhKgq+4ft
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1124 ApFc1irbVR7BKXN.exe -
Loads dropped DLL 4 IoCs
pid Process 1632 64e992d125d8f14729371b90bcd58456ca4c859beaaa92978d7ef85f617d020d.exe 1124 ApFc1irbVR7BKXN.exe 432 regsvr32.exe 1284 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\aogpfednhhmclejlejbpjodmhlkccmfp\2.0\manifest.json ApFc1irbVR7BKXN.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\aogpfednhhmclejlejbpjodmhlkccmfp\2.0\manifest.json ApFc1irbVR7BKXN.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\aogpfednhhmclejlejbpjodmhlkccmfp\2.0\manifest.json ApFc1irbVR7BKXN.exe -
Installs/modifies Browser Helper Object 2 TTPs 11 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} ApFc1irbVR7BKXN.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} ApFc1irbVR7BKXN.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects ApFc1irbVR7BKXN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ ApFc1irbVR7BKXN.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} ApFc1irbVR7BKXN.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\GuoSave\8klNvm0nicSYIX.tlb ApFc1irbVR7BKXN.exe File created C:\Program Files (x86)\GuoSave\8klNvm0nicSYIX.dat ApFc1irbVR7BKXN.exe File opened for modification C:\Program Files (x86)\GuoSave\8klNvm0nicSYIX.dat ApFc1irbVR7BKXN.exe File created C:\Program Files (x86)\GuoSave\8klNvm0nicSYIX.x64.dll ApFc1irbVR7BKXN.exe File opened for modification C:\Program Files (x86)\GuoSave\8klNvm0nicSYIX.x64.dll ApFc1irbVR7BKXN.exe File created C:\Program Files (x86)\GuoSave\8klNvm0nicSYIX.dll ApFc1irbVR7BKXN.exe File opened for modification C:\Program Files (x86)\GuoSave\8klNvm0nicSYIX.dll ApFc1irbVR7BKXN.exe File created C:\Program Files (x86)\GuoSave\8klNvm0nicSYIX.tlb ApFc1irbVR7BKXN.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1124 1632 64e992d125d8f14729371b90bcd58456ca4c859beaaa92978d7ef85f617d020d.exe 28 PID 1632 wrote to memory of 1124 1632 64e992d125d8f14729371b90bcd58456ca4c859beaaa92978d7ef85f617d020d.exe 28 PID 1632 wrote to memory of 1124 1632 64e992d125d8f14729371b90bcd58456ca4c859beaaa92978d7ef85f617d020d.exe 28 PID 1632 wrote to memory of 1124 1632 64e992d125d8f14729371b90bcd58456ca4c859beaaa92978d7ef85f617d020d.exe 28 PID 1124 wrote to memory of 432 1124 ApFc1irbVR7BKXN.exe 29 PID 1124 wrote to memory of 432 1124 ApFc1irbVR7BKXN.exe 29 PID 1124 wrote to memory of 432 1124 ApFc1irbVR7BKXN.exe 29 PID 1124 wrote to memory of 432 1124 ApFc1irbVR7BKXN.exe 29 PID 1124 wrote to memory of 432 1124 ApFc1irbVR7BKXN.exe 29 PID 1124 wrote to memory of 432 1124 ApFc1irbVR7BKXN.exe 29 PID 1124 wrote to memory of 432 1124 ApFc1irbVR7BKXN.exe 29 PID 432 wrote to memory of 1284 432 regsvr32.exe 30 PID 432 wrote to memory of 1284 432 regsvr32.exe 30 PID 432 wrote to memory of 1284 432 regsvr32.exe 30 PID 432 wrote to memory of 1284 432 regsvr32.exe 30 PID 432 wrote to memory of 1284 432 regsvr32.exe 30 PID 432 wrote to memory of 1284 432 regsvr32.exe 30 PID 432 wrote to memory of 1284 432 regsvr32.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\64e992d125d8f14729371b90bcd58456ca4c859beaaa92978d7ef85f617d020d.exe"C:\Users\Admin\AppData\Local\Temp\64e992d125d8f14729371b90bcd58456ca4c859beaaa92978d7ef85f617d020d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\7zSF5B5.tmp\ApFc1irbVR7BKXN.exe.\ApFc1irbVR7BKXN.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\GuoSave\8klNvm0nicSYIX.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\GuoSave\8klNvm0nicSYIX.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
PID:1284
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD57940719031ef4754cc0338f16b0bc84f
SHA1aaea7e027852e94dd0ffe29797a3681ff5f44689
SHA256169fa1e3f98d066192b032b35321bd47d74069675f67a91ea828e53b68a3ab90
SHA512640cbcbae9300671064831f20693495a827532437dd80c241d9ae2356275289e5dc5b72b5058fba5b558057514d54700a6c73d5e09b8c4950744dd5c1f63a985
-
Filesize
700KB
MD5401087ab67c6d917bf08d82f011d9eee
SHA1d13dbf241d214d6036f8c6276e0e305fc2ac2b8a
SHA256fada9f28483ab94341359011d5ab92a6fa2418d010aa3eb1c485c19db15e62f5
SHA5124d952fc0a2ef968997d62d901a731193105da2f4541abf4eb3e5c99e247edc7ffb15ae55a8d0e5d228ae704b0a7ff7dca24e14312f778896d834971e7f3d8af6
-
C:\Users\Admin\AppData\Local\Temp\7zSF5B5.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zSF5B5.tmp\[email protected]\chrome.manifest
Filesize35B
MD5a5f6e25fbc2bbd92cd9f29f86a7e76b3
SHA1ec2f37c7b9e6c30295566ea4b56d96c84b4468a5
SHA256ffc50ff663578353b5a71ffc4d10fcc014d2f1b590dfb9b9259790dbf4dd60b9
SHA512cf9a4a2d95a72f396a08bfd19e23f5d281f98f44ee78c6f71f0d7d5e307e7ffe93a33cf5f1892d40892f31861f630fbc2dd425fcfde7ef07c5a613938d27b434
-
C:\Users\Admin\AppData\Local\Temp\7zSF5B5.tmp\[email protected]\content\bg.js
Filesize7KB
MD59d141a24ecd0d29234c4ea0847a8dd90
SHA15b19160b366a10f8710e7320f6cce77c63614971
SHA256721e30f36d40fc18565ce5aeb161d26bc09dc4ceaa221ff44db8dd88a92ed964
SHA5127e6a8d6881a65671c6b25cda3d02f431494828872fe20675652ee39c067305ac86fd552e4f41f6201bb5aad2b3aa3543c5c6b0dd6dbaef7aed1afc884d626c3f
-
C:\Users\Admin\AppData\Local\Temp\7zSF5B5.tmp\[email protected]\install.rdf
Filesize593B
MD514f9080059f7978ece17625c2c4ab1bb
SHA14bead0ca6c0554460fc5f9ef27c9a261772d1f90
SHA256642161e202765504b31280fc27794743cf62cfcc7200db1304542613c3f69e39
SHA5129df4a2eff5ae84bccab056926126607a84172436701b8902d1e0a286be7add126bf54fbcbc0088c055022bcc4c4ff913fff60e3673a6db1d57df7dc80245a4b9
-
Filesize
623KB
MD5103866fff4628ada4be6e5235b2ebf5d
SHA186ca018b33c7cdb953371ee1e290313b9a54a251
SHA256963728f71b4ecee9380a18f5bbc6930256be6018a8087a9964f98ba3e17b7a7c
SHA5122a8f9ce8854bab77b801eb146934e267de3cca83727a8a7c13885b41c75a0b563fdd0cb1683f78057fc6833b22d9d14c5ef0d3707753293d59d4b61f7a9744c3
-
Filesize
3KB
MD53c920faafd032eeda08e4166860d4318
SHA126451ee3659c4a217f42ebd07f254679ab452f3a
SHA2563377d0af1044505271c64fc342e22a7a24b757e5471657f656ac743373e22857
SHA512327668001f94842eee3ff1dc44c70ddca5da3a0bb49aeea6b3162608b07496456e78bcb3de0462e5e375b349e813f13fd02e61b9e389b1d954cea2628c3c4a6e
-
Filesize
700KB
MD5401087ab67c6d917bf08d82f011d9eee
SHA1d13dbf241d214d6036f8c6276e0e305fc2ac2b8a
SHA256fada9f28483ab94341359011d5ab92a6fa2418d010aa3eb1c485c19db15e62f5
SHA5124d952fc0a2ef968997d62d901a731193105da2f4541abf4eb3e5c99e247edc7ffb15ae55a8d0e5d228ae704b0a7ff7dca24e14312f778896d834971e7f3d8af6
-
Filesize
6KB
MD57940719031ef4754cc0338f16b0bc84f
SHA1aaea7e027852e94dd0ffe29797a3681ff5f44689
SHA256169fa1e3f98d066192b032b35321bd47d74069675f67a91ea828e53b68a3ab90
SHA512640cbcbae9300671064831f20693495a827532437dd80c241d9ae2356275289e5dc5b72b5058fba5b558057514d54700a6c73d5e09b8c4950744dd5c1f63a985
-
Filesize
629KB
MD5150107c0a55484355ce5881240cca669
SHA135d2f6723091fc4af5c4a00645b6b0f43efd4a06
SHA256c422b33bee8c0b6664a7462093734aea98026ebf7cc9dc65589572213f576f0e
SHA512eb189951a9a89c54c8d7b3a9fcfb97777bd55088186814597ba13e9f985f846e313b5fcd1566de56060ef8cdfb815ed2a77f5c41c02d1c666c47691b1c0aba04
-
Filesize
629KB
MD5150107c0a55484355ce5881240cca669
SHA135d2f6723091fc4af5c4a00645b6b0f43efd4a06
SHA256c422b33bee8c0b6664a7462093734aea98026ebf7cc9dc65589572213f576f0e
SHA512eb189951a9a89c54c8d7b3a9fcfb97777bd55088186814597ba13e9f985f846e313b5fcd1566de56060ef8cdfb815ed2a77f5c41c02d1c666c47691b1c0aba04
-
Filesize
5KB
MD57a924e0e519cd11b4ded2fded83c3b0f
SHA112ba2a91da1751a778e4aac038921f1f6806f25f
SHA256781dc5eb7c7a47e64c1b7cd48f28e7ea9c8b0bfde7679a420c984ddeb2f13845
SHA512b874541244b92c5f497e9dffcb0ab19e733ba87c1abe306def1ef395d9abee09ff46e7c551675debaa0440ce0ae7267c4868eb1e4f95736c4e268df97be3cecb
-
Filesize
140B
MD508cf2f6fa8373818b18e442e566a5299
SHA15e2d77487675c71cda417efac2582c2be4175964
SHA25633c144a43caa14489eaae80370560dd65e0c007a4a0832560b83c23e792582a6
SHA51236bf15a202d2285509c0ae8f863b9145685f531c7436c1b2dc930d7c21945c34a4fabf031a4f37d6a14be322defde4553332e716a77babf9cb774007627e2f51
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
499B
MD58b52269c4e732fbc6d3ec1ee91968749
SHA191abc66d6c236f5b8b4d9e19d906149ac8923c68
SHA2563d7f57189e1a5f583223cb7431460edb28d81199bc46218a6ecfae0e3a013bf3
SHA512c6152e8ced32fef97318aa770888e612cb9183b075d2d658529d53107bc8225523a96e89d7dc7352781b8c9efa57edf0f87a57ff77698d311dc7731731497da8
-
Filesize
623KB
MD5103866fff4628ada4be6e5235b2ebf5d
SHA186ca018b33c7cdb953371ee1e290313b9a54a251
SHA256963728f71b4ecee9380a18f5bbc6930256be6018a8087a9964f98ba3e17b7a7c
SHA5122a8f9ce8854bab77b801eb146934e267de3cca83727a8a7c13885b41c75a0b563fdd0cb1683f78057fc6833b22d9d14c5ef0d3707753293d59d4b61f7a9744c3
-
Filesize
700KB
MD5401087ab67c6d917bf08d82f011d9eee
SHA1d13dbf241d214d6036f8c6276e0e305fc2ac2b8a
SHA256fada9f28483ab94341359011d5ab92a6fa2418d010aa3eb1c485c19db15e62f5
SHA5124d952fc0a2ef968997d62d901a731193105da2f4541abf4eb3e5c99e247edc7ffb15ae55a8d0e5d228ae704b0a7ff7dca24e14312f778896d834971e7f3d8af6
-
Filesize
700KB
MD5401087ab67c6d917bf08d82f011d9eee
SHA1d13dbf241d214d6036f8c6276e0e305fc2ac2b8a
SHA256fada9f28483ab94341359011d5ab92a6fa2418d010aa3eb1c485c19db15e62f5
SHA5124d952fc0a2ef968997d62d901a731193105da2f4541abf4eb3e5c99e247edc7ffb15ae55a8d0e5d228ae704b0a7ff7dca24e14312f778896d834971e7f3d8af6
-
Filesize
629KB
MD5150107c0a55484355ce5881240cca669
SHA135d2f6723091fc4af5c4a00645b6b0f43efd4a06
SHA256c422b33bee8c0b6664a7462093734aea98026ebf7cc9dc65589572213f576f0e
SHA512eb189951a9a89c54c8d7b3a9fcfb97777bd55088186814597ba13e9f985f846e313b5fcd1566de56060ef8cdfb815ed2a77f5c41c02d1c666c47691b1c0aba04