Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
187s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2022, 22:43
Static task
static1
Behavioral task
behavioral1
Sample
be9afd1075ff3370be66d16a06d5ae3d8ff9870b7a25d8fa56eed442e39e8154.exe
Resource
win7-20221111-en
General
-
Target
be9afd1075ff3370be66d16a06d5ae3d8ff9870b7a25d8fa56eed442e39e8154.exe
-
Size
2.1MB
-
MD5
32fe0907c93de725f4c94a4bac6d5442
-
SHA1
e5844655b0e4a30c65f4655000b5c5af3c078253
-
SHA256
be9afd1075ff3370be66d16a06d5ae3d8ff9870b7a25d8fa56eed442e39e8154
-
SHA512
8425042674035be1d483728bfd91396e70a1010488fa7a1b064c44b5bd3480c37e9d236b05f02cd238a25e384f1b430e29249861d00f3f6a7690e7c7b7149902
-
SSDEEP
49152:h1Os+YIGWkf6jd9YMhKKumq+4oAczj/i6jgvb7GvKSZ:h1Ordd9YMhKgq+4fY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1112 N5NeMD9WTanGfkF.exe -
Loads dropped DLL 3 IoCs
pid Process 1112 N5NeMD9WTanGfkF.exe 428 regsvr32.exe 212 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\megaekhdhbhjcfhhdmnnnnaiikkhbkbm\200\manifest.json N5NeMD9WTanGfkF.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\megaekhdhbhjcfhhdmnnnnaiikkhbkbm\200\manifest.json N5NeMD9WTanGfkF.exe File created C:\Users\DefaultAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\megaekhdhbhjcfhhdmnnnnaiikkhbkbm\200\manifest.json N5NeMD9WTanGfkF.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\megaekhdhbhjcfhhdmnnnnaiikkhbkbm\200\manifest.json N5NeMD9WTanGfkF.exe File created C:\Users\WDAGUtilityAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\megaekhdhbhjcfhhdmnnnnaiikkhbkbm\200\manifest.json N5NeMD9WTanGfkF.exe -
Installs/modifies Browser Helper Object 2 TTPs 9 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} N5NeMD9WTanGfkF.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ N5NeMD9WTanGfkF.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} N5NeMD9WTanGfkF.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects N5NeMD9WTanGfkF.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\BroowseRRiShop\BD2e1ISCgUqJHX.dat N5NeMD9WTanGfkF.exe File opened for modification C:\Program Files (x86)\BroowseRRiShop\BD2e1ISCgUqJHX.dat N5NeMD9WTanGfkF.exe File created C:\Program Files (x86)\BroowseRRiShop\BD2e1ISCgUqJHX.x64.dll N5NeMD9WTanGfkF.exe File opened for modification C:\Program Files (x86)\BroowseRRiShop\BD2e1ISCgUqJHX.x64.dll N5NeMD9WTanGfkF.exe File created C:\Program Files (x86)\BroowseRRiShop\BD2e1ISCgUqJHX.dll N5NeMD9WTanGfkF.exe File opened for modification C:\Program Files (x86)\BroowseRRiShop\BD2e1ISCgUqJHX.dll N5NeMD9WTanGfkF.exe File created C:\Program Files (x86)\BroowseRRiShop\BD2e1ISCgUqJHX.tlb N5NeMD9WTanGfkF.exe File opened for modification C:\Program Files (x86)\BroowseRRiShop\BD2e1ISCgUqJHX.tlb N5NeMD9WTanGfkF.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 752 wrote to memory of 1112 752 be9afd1075ff3370be66d16a06d5ae3d8ff9870b7a25d8fa56eed442e39e8154.exe 83 PID 752 wrote to memory of 1112 752 be9afd1075ff3370be66d16a06d5ae3d8ff9870b7a25d8fa56eed442e39e8154.exe 83 PID 752 wrote to memory of 1112 752 be9afd1075ff3370be66d16a06d5ae3d8ff9870b7a25d8fa56eed442e39e8154.exe 83 PID 1112 wrote to memory of 428 1112 N5NeMD9WTanGfkF.exe 84 PID 1112 wrote to memory of 428 1112 N5NeMD9WTanGfkF.exe 84 PID 1112 wrote to memory of 428 1112 N5NeMD9WTanGfkF.exe 84 PID 428 wrote to memory of 212 428 regsvr32.exe 85 PID 428 wrote to memory of 212 428 regsvr32.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\be9afd1075ff3370be66d16a06d5ae3d8ff9870b7a25d8fa56eed442e39e8154.exe"C:\Users\Admin\AppData\Local\Temp\be9afd1075ff3370be66d16a06d5ae3d8ff9870b7a25d8fa56eed442e39e8154.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\7zSEC5.tmp\N5NeMD9WTanGfkF.exe.\N5NeMD9WTanGfkF.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\BroowseRRiShop\BD2e1ISCgUqJHX.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\BroowseRRiShop\BD2e1ISCgUqJHX.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
PID:212
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5ff9b1b15f9869fde4740c0be8a1ddfc4
SHA198de6f9e18afb76f4fb099cd39bcdcb06abb4dfb
SHA256cebfb6af240a2d5a7f76b39f740c110869f83c6a19737c35609a57e6ec3716a8
SHA512b69ff3f0d1fa1f6b5fea873952c0bf672e2191d7d0b599285322a92d78b8fa0544c6da96a2f71f242e73293775f99d6f3d932eed445173489a39eb9a016e02ce
-
Filesize
623KB
MD5103866fff4628ada4be6e5235b2ebf5d
SHA186ca018b33c7cdb953371ee1e290313b9a54a251
SHA256963728f71b4ecee9380a18f5bbc6930256be6018a8087a9964f98ba3e17b7a7c
SHA5122a8f9ce8854bab77b801eb146934e267de3cca83727a8a7c13885b41c75a0b563fdd0cb1683f78057fc6833b22d9d14c5ef0d3707753293d59d4b61f7a9744c3
-
Filesize
700KB
MD5401087ab67c6d917bf08d82f011d9eee
SHA1d13dbf241d214d6036f8c6276e0e305fc2ac2b8a
SHA256fada9f28483ab94341359011d5ab92a6fa2418d010aa3eb1c485c19db15e62f5
SHA5124d952fc0a2ef968997d62d901a731193105da2f4541abf4eb3e5c99e247edc7ffb15ae55a8d0e5d228ae704b0a7ff7dca24e14312f778896d834971e7f3d8af6
-
Filesize
700KB
MD5401087ab67c6d917bf08d82f011d9eee
SHA1d13dbf241d214d6036f8c6276e0e305fc2ac2b8a
SHA256fada9f28483ab94341359011d5ab92a6fa2418d010aa3eb1c485c19db15e62f5
SHA5124d952fc0a2ef968997d62d901a731193105da2f4541abf4eb3e5c99e247edc7ffb15ae55a8d0e5d228ae704b0a7ff7dca24e14312f778896d834971e7f3d8af6
-
Filesize
700KB
MD5401087ab67c6d917bf08d82f011d9eee
SHA1d13dbf241d214d6036f8c6276e0e305fc2ac2b8a
SHA256fada9f28483ab94341359011d5ab92a6fa2418d010aa3eb1c485c19db15e62f5
SHA5124d952fc0a2ef968997d62d901a731193105da2f4541abf4eb3e5c99e247edc7ffb15ae55a8d0e5d228ae704b0a7ff7dca24e14312f778896d834971e7f3d8af6
-
C:\Users\Admin\AppData\Local\Temp\7zSEC5.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zSEC5.tmp\[email protected]\chrome.manifest
Filesize35B
MD522c280ad2bd8e5c2498f8a18bfc7a5b2
SHA148bae8805452865f49f7f78ff85b6bdf38249edb
SHA256710cea05c2bef2d57a2f7e36fde7931662213a0ab6cfabecccea52f5171fbf93
SHA5129771452c93f66751f53e70229a1d2b8fe46b5c79880c732c697d0c3a582e59f792d3c6f74fba361f01ef06c75f3ebe8e3618b967a5e4361e308c51217f6acce8
-
C:\Users\Admin\AppData\Local\Temp\7zSEC5.tmp\[email protected]\content\bg.js
Filesize7KB
MD5ad63521be922d192e8216d78d51479e1
SHA1e752fee03a270a3bb60fccca1c65b6227c40cc33
SHA2568f83484ec75ab69419ceefe053cce521c1084103871a914e9354379999894b77
SHA512ee794bf062bac6cb1293700883c8e3b743089c0a58365ecd55bf1f628d4d5f61a8b1dfd095f87f14186b90848854148768a56dd0bd17705119b289c67dd784a5
-
C:\Users\Admin\AppData\Local\Temp\7zSEC5.tmp\[email protected]\install.rdf
Filesize605B
MD55a62d5b2d9c040ecc0b122ee7ff9ffea
SHA105db4f7ebd76aa26121f1d9d6bc3ff1d5a111b1c
SHA2568c08f4783d2c35e30d8a03e105db2448202a920990f359758db9a84c41ca35cb
SHA512091bbbc35a1d676e40cff207331b5ed8ca19e0348fa975dd88c4014b4f9e2f8ab7972d9ea009818b5a975f4491029db4d6993a6a760a010e9259bfa3f697b9fe
-
Filesize
623KB
MD5103866fff4628ada4be6e5235b2ebf5d
SHA186ca018b33c7cdb953371ee1e290313b9a54a251
SHA256963728f71b4ecee9380a18f5bbc6930256be6018a8087a9964f98ba3e17b7a7c
SHA5122a8f9ce8854bab77b801eb146934e267de3cca83727a8a7c13885b41c75a0b563fdd0cb1683f78057fc6833b22d9d14c5ef0d3707753293d59d4b61f7a9744c3
-
Filesize
3KB
MD53c920faafd032eeda08e4166860d4318
SHA126451ee3659c4a217f42ebd07f254679ab452f3a
SHA2563377d0af1044505271c64fc342e22a7a24b757e5471657f656ac743373e22857
SHA512327668001f94842eee3ff1dc44c70ddca5da3a0bb49aeea6b3162608b07496456e78bcb3de0462e5e375b349e813f13fd02e61b9e389b1d954cea2628c3c4a6e
-
Filesize
700KB
MD5401087ab67c6d917bf08d82f011d9eee
SHA1d13dbf241d214d6036f8c6276e0e305fc2ac2b8a
SHA256fada9f28483ab94341359011d5ab92a6fa2418d010aa3eb1c485c19db15e62f5
SHA5124d952fc0a2ef968997d62d901a731193105da2f4541abf4eb3e5c99e247edc7ffb15ae55a8d0e5d228ae704b0a7ff7dca24e14312f778896d834971e7f3d8af6
-
Filesize
6KB
MD5ff9b1b15f9869fde4740c0be8a1ddfc4
SHA198de6f9e18afb76f4fb099cd39bcdcb06abb4dfb
SHA256cebfb6af240a2d5a7f76b39f740c110869f83c6a19737c35609a57e6ec3716a8
SHA512b69ff3f0d1fa1f6b5fea873952c0bf672e2191d7d0b599285322a92d78b8fa0544c6da96a2f71f242e73293775f99d6f3d932eed445173489a39eb9a016e02ce
-
Filesize
629KB
MD5150107c0a55484355ce5881240cca669
SHA135d2f6723091fc4af5c4a00645b6b0f43efd4a06
SHA256c422b33bee8c0b6664a7462093734aea98026ebf7cc9dc65589572213f576f0e
SHA512eb189951a9a89c54c8d7b3a9fcfb97777bd55088186814597ba13e9f985f846e313b5fcd1566de56060ef8cdfb815ed2a77f5c41c02d1c666c47691b1c0aba04
-
Filesize
629KB
MD5150107c0a55484355ce5881240cca669
SHA135d2f6723091fc4af5c4a00645b6b0f43efd4a06
SHA256c422b33bee8c0b6664a7462093734aea98026ebf7cc9dc65589572213f576f0e
SHA512eb189951a9a89c54c8d7b3a9fcfb97777bd55088186814597ba13e9f985f846e313b5fcd1566de56060ef8cdfb815ed2a77f5c41c02d1c666c47691b1c0aba04
-
Filesize
144B
MD58f70952443fa60ab1380924925423403
SHA167a27e2f633fc8ce36b0ea537b39880926313d0a
SHA25669a3541391c95c95aec4166ec5c7f9a58296754f7c330d6458fddbafb3c0c545
SHA51266fbc2c3441df77e7b17b9eff7f63f1d45e49e43047364ebb9a07b7685545905550cd6739c8aa70fea69263a582011ba87bd2b86413fb0d2638a3ee9bc303fdc
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
506B
MD58cc6f7359463b59c768323f76b3c7c48
SHA1a3ade75615b84844f4c4ce68ec8669ab80842ef9
SHA2560ae5f0f7d8461b23e03c567879c2cb2d534558067e059b719e60c24ae00076c3
SHA5126a9af174246403d11eee2a8bc2ebacb513d299c3b45e8651b9bdc8694cb19284edf72137d35300ced3fb1dc77096a1fdd8b3853d24e012c0ed554ce7bdcca409
-
Filesize
5KB
MD50666590c46fd58c5464e936a3761ad85
SHA1e7e044eb2c0a12602b75cad2a7f9aa42090a775a
SHA2566f9f8144542971cbe7e951e3cbc638f6eef1903181f37ba84878e6975a436e84
SHA512b83b2366882c56347a74d555e61e4a3a9e1472e19fe9e7f666c02cf8859a0d1b303f9003ec636ee5c4022a643146fcd04fca32f6e843feaa73b9599396043286