Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    43s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23/11/2022, 23:50

General

  • Target

    0531b1898198da22e6d417ee97f21c48170647c83130d725554fa68fad3c8aa6.exe

  • Size

    2.1MB

  • MD5

    61261d84732284c156a220090c3cd1fc

  • SHA1

    2b93e89d5ad3b4af7dee3c154bddb3171b94c7f0

  • SHA256

    0531b1898198da22e6d417ee97f21c48170647c83130d725554fa68fad3c8aa6

  • SHA512

    14754ef59246af813c42e69c18e2458edc6f650b3b46e924fdfc34b9130848df6bc88b92f136e4201582bd07624576dac7a6b1018e400207be899af17913504b

  • SSDEEP

    49152:h1OsqyuyoY0IKAVWQrQSM5eeHY1h2PlSUQ8Pci2:h1OTgoP9oM5LFe

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 3 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 11 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0531b1898198da22e6d417ee97f21c48170647c83130d725554fa68fad3c8aa6.exe
    "C:\Users\Admin\AppData\Local\Temp\0531b1898198da22e6d417ee97f21c48170647c83130d725554fa68fad3c8aa6.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1104
    • C:\Users\Admin\AppData\Local\Temp\7zSA7D.tmp\g9Zj9V04Ok8IYvy.exe
      .\g9Zj9V04Ok8IYvy.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1732
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s "C:\Program Files (x86)\GoSaVe\Ly1JW4KVXMKYJr.x64.dll"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:268
        • C:\Windows\system32\regsvr32.exe
          /s "C:\Program Files (x86)\GoSaVe\Ly1JW4KVXMKYJr.x64.dll"
          4⤵
          • Loads dropped DLL
          • Installs/modifies Browser Helper Object
          PID:1652

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\GoSaVe\Ly1JW4KVXMKYJr.dat

    Filesize

    6KB

    MD5

    b0bb3cbc1540ae782df15d85b5dfa152

    SHA1

    4cfaffc9b21e6b66170200d81ea0d6ad8a1866b2

    SHA256

    bcdbd2d3339e327c63e9136333313b2d4ab55d439ac3eaee776a183c5870ae94

    SHA512

    3e4f266d794d134e88a1eaa75a7f3ac953ae694d54c60909c15181f62532b88632524b7c5ff1712dd2582e2d7bc46b61fb7565e31a2e7b71f63c8bc36e016c97

  • C:\Program Files (x86)\GoSaVe\Ly1JW4KVXMKYJr.x64.dll

    Filesize

    698KB

    MD5

    48aea480f88ba159a05da8c3e1b938e5

    SHA1

    56cce3368fb512d03e4ed502c1ae1b4a64a54ce9

    SHA256

    07fd15650c7ea9d453c9a86255445d32ba18b4f74876a1f099a473ff988f7ebf

    SHA512

    448dfc81b3148be7031e6ebfc813c148c39a4ae86692ace9d0c98bf2605aa5b76052cc6d4f44e3103452fa26eb60a67a28dd3ce5d579e81277421cefdf9c9be5

  • C:\Users\Admin\AppData\Local\Temp\7zSA7D.tmp\Ly1JW4KVXMKYJr.dll

    Filesize

    616KB

    MD5

    ac2bb9f430ee63577e2e658e576fbaa3

    SHA1

    661dad0abec24f1cd8400e09fd00881d9dd66b02

    SHA256

    59bb2ef1513927977be1a94a9e7687a92fd078ad343d481ba40edbfbe85e8812

    SHA512

    f0c2e9c780bcf67147a7c4803ffb292d6b2c4bf0a03f65273a86c6da85c0b5cd1d24d48726d95ed1e5c6b5662b7fcaba65b47bf1e7d906d97c263d2c92285769

  • C:\Users\Admin\AppData\Local\Temp\7zSA7D.tmp\Ly1JW4KVXMKYJr.tlb

    Filesize

    3KB

    MD5

    52acf269931e562ad7445f7a803bd5e3

    SHA1

    ef86bb5f96b2bba4c85a73efef5df4a08ab99031

    SHA256

    bc29a9426767cb54f6f11ea9d457613f858aa0d0e33137ab8ad1f53ff601d8f2

    SHA512

    545cc433a340e0b6ef70c92ab7854058222bb76385fb4027f1cc174a0baececb48c8e04ea83e9387d2c664505d4dd3799d41512e06c3ec5b4e32d0bf4a84668b

  • C:\Users\Admin\AppData\Local\Temp\7zSA7D.tmp\Ly1JW4KVXMKYJr.x64.dll

    Filesize

    698KB

    MD5

    48aea480f88ba159a05da8c3e1b938e5

    SHA1

    56cce3368fb512d03e4ed502c1ae1b4a64a54ce9

    SHA256

    07fd15650c7ea9d453c9a86255445d32ba18b4f74876a1f099a473ff988f7ebf

    SHA512

    448dfc81b3148be7031e6ebfc813c148c39a4ae86692ace9d0c98bf2605aa5b76052cc6d4f44e3103452fa26eb60a67a28dd3ce5d579e81277421cefdf9c9be5

  • C:\Users\Admin\AppData\Local\Temp\7zSA7D.tmp\ceobaffhhgknokcekhlnaacbfaodldci\Xyhj0hqLZ.js

    Filesize

    5KB

    MD5

    7d103a2e8857805ee55f8ca1bfba6966

    SHA1

    9b9bcfa54c72318c18c479ad8e08a73afa88c985

    SHA256

    4475c733586cdb067517ba7a9a34ec80311d0443b8312d85a32ccca734254682

    SHA512

    10610711eedb7d262291498b7dac222ed2085cad87555919946b2409b46361561c650cb9defe4de9cb6531f67e43148f842974e947bfc5efca238cb51d3c756a

  • C:\Users\Admin\AppData\Local\Temp\7zSA7D.tmp\ceobaffhhgknokcekhlnaacbfaodldci\background.html

    Filesize

    146B

    MD5

    7106b9501cae285b11059c1f3195ec23

    SHA1

    77cefacf5b8f793e4aadcf3b90be33b32f72cf8d

    SHA256

    a15700548b4021121d0fc3cd2ddd52bc895761fb4c1ca199360746d965a6393f

    SHA512

    eaf09ddae324b29339f7eef6b11356a18e776b4a4ab11f7248dfed89b8cb3597873f2dd626eafdf22446a4bfa2029924fc307bda1767ee7d33ec6a4e6530b071

  • C:\Users\Admin\AppData\Local\Temp\7zSA7D.tmp\ceobaffhhgknokcekhlnaacbfaodldci\content.js

    Filesize

    144B

    MD5

    fca19198fd8af21016a8b1dec7980002

    SHA1

    fd01a47d14004e17a625efe66cc46a06c786cf40

    SHA256

    332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a

    SHA512

    60f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47

  • C:\Users\Admin\AppData\Local\Temp\7zSA7D.tmp\ceobaffhhgknokcekhlnaacbfaodldci\lsdb.js

    Filesize

    531B

    MD5

    36d98318ab2b3b2585a30984db328afb

    SHA1

    f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5

    SHA256

    ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7

    SHA512

    6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

  • C:\Users\Admin\AppData\Local\Temp\7zSA7D.tmp\ceobaffhhgknokcekhlnaacbfaodldci\manifest.json

    Filesize

    498B

    MD5

    89a241d9a52cb219f29cebedc468a56c

    SHA1

    32d0c1c01e5edcd477ab02fe1ea66ee36f3edd66

    SHA256

    3e1d41b33440994a6f512014f98fae28bd40b625a2bc80f16290cf8a961fd4a8

    SHA512

    cc783a38629e69e98f45d4bbc69e6cad70b59caf7886b95aefc6b564be79730d7bd7c4268e20c2be8bc3e3073ecb0c2eed584c7226b95f9707661c82fc7455be

  • C:\Users\Admin\AppData\Local\Temp\7zSA7D.tmp\g9Zj9V04Ok8IYvy.dat

    Filesize

    6KB

    MD5

    b0bb3cbc1540ae782df15d85b5dfa152

    SHA1

    4cfaffc9b21e6b66170200d81ea0d6ad8a1866b2

    SHA256

    bcdbd2d3339e327c63e9136333313b2d4ab55d439ac3eaee776a183c5870ae94

    SHA512

    3e4f266d794d134e88a1eaa75a7f3ac953ae694d54c60909c15181f62532b88632524b7c5ff1712dd2582e2d7bc46b61fb7565e31a2e7b71f63c8bc36e016c97

  • C:\Users\Admin\AppData\Local\Temp\7zSA7D.tmp\g9Zj9V04Ok8IYvy.exe

    Filesize

    632KB

    MD5

    59ed6cd5a934e324d7ff694adb712b61

    SHA1

    ee41b1da1ca21a050e548b04bbf37c47f251fd10

    SHA256

    cb9b055b0e4049898db5c8d1df973692f7e57f57ad053fc9fec5372a294b8726

    SHA512

    04238927495ce1720202db05e90c1efc0c8d409e5255188fff51ee5589048d7b5c56f080fe7e5a1f45f4a7ca1c0d73fadbc34b8a268547f2f2bbd1c994ec2fd8

  • C:\Users\Admin\AppData\Local\Temp\7zSA7D.tmp\g9Zj9V04Ok8IYvy.exe

    Filesize

    632KB

    MD5

    59ed6cd5a934e324d7ff694adb712b61

    SHA1

    ee41b1da1ca21a050e548b04bbf37c47f251fd10

    SHA256

    cb9b055b0e4049898db5c8d1df973692f7e57f57ad053fc9fec5372a294b8726

    SHA512

    04238927495ce1720202db05e90c1efc0c8d409e5255188fff51ee5589048d7b5c56f080fe7e5a1f45f4a7ca1c0d73fadbc34b8a268547f2f2bbd1c994ec2fd8

  • C:\Users\Admin\AppData\Local\Temp\7zSA7D.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    df13f711e20e9c80171846d4f2f7ae06

    SHA1

    56d29cda58427efe0e21d3880d39eb1b0ef60bee

    SHA256

    6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4

    SHA512

    6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

  • C:\Users\Admin\AppData\Local\Temp\7zSA7D.tmp\[email protected]\chrome.manifest

    Filesize

    35B

    MD5

    518631f50e39b4474a15460b028b2fd1

    SHA1

    3b68383c7fed519adf71e08fb5d975bb281d1a34

    SHA256

    47d2d243b6f1aa0cbe69d77543cab65dbba5e2938c1057585ff9c81518ee01ab

    SHA512

    698083fb04f2e990c7b83ee306c3454d03233631c409f3db4444e9028eee87a77b8ad51d6d2c9a0f291da9edcbc263192dba28acb90aacb432426dbea0063284

  • C:\Users\Admin\AppData\Local\Temp\7zSA7D.tmp\[email protected]\content\bg.js

    Filesize

    7KB

    MD5

    8c7d773b011cc67342d646908a5c007c

    SHA1

    c63a58e83a5e2b8cfebb8cbdcc95a46228575062

    SHA256

    cf77eaa616a9d8678710dde4aa303ff2788e3dde7f04b6c803ea0ca41c498385

    SHA512

    1a52ba0bbdb580e0745a14c15e6a60a79a381be2b61bb18db753d2b26d660360e7b04e4bc28fd6f7fb365a01b1b011d405d3314ade35b1cc20d89fa03e824068

  • C:\Users\Admin\AppData\Local\Temp\7zSA7D.tmp\[email protected]\install.rdf

    Filesize

    593B

    MD5

    13a04f75938930bc725ca0ffe6a5ad92

    SHA1

    fedac78ba7c25ec60351a5f2a84149bd68ecca21

    SHA256

    52c70180e264b36b0513150020750bcf39be9fee458ff37c42691133de1c560c

    SHA512

    ee45262a92bd5fa658084bfbbe4f17dd95cd7558cac38f05d318a50eaabe4ccdec1743653c5126855f5debd11bc389ed37d1a595930e3cc46bb112732a9eaeb9

  • \Program Files (x86)\GoSaVe\Ly1JW4KVXMKYJr.dll

    Filesize

    616KB

    MD5

    ac2bb9f430ee63577e2e658e576fbaa3

    SHA1

    661dad0abec24f1cd8400e09fd00881d9dd66b02

    SHA256

    59bb2ef1513927977be1a94a9e7687a92fd078ad343d481ba40edbfbe85e8812

    SHA512

    f0c2e9c780bcf67147a7c4803ffb292d6b2c4bf0a03f65273a86c6da85c0b5cd1d24d48726d95ed1e5c6b5662b7fcaba65b47bf1e7d906d97c263d2c92285769

  • \Program Files (x86)\GoSaVe\Ly1JW4KVXMKYJr.x64.dll

    Filesize

    698KB

    MD5

    48aea480f88ba159a05da8c3e1b938e5

    SHA1

    56cce3368fb512d03e4ed502c1ae1b4a64a54ce9

    SHA256

    07fd15650c7ea9d453c9a86255445d32ba18b4f74876a1f099a473ff988f7ebf

    SHA512

    448dfc81b3148be7031e6ebfc813c148c39a4ae86692ace9d0c98bf2605aa5b76052cc6d4f44e3103452fa26eb60a67a28dd3ce5d579e81277421cefdf9c9be5

  • \Program Files (x86)\GoSaVe\Ly1JW4KVXMKYJr.x64.dll

    Filesize

    698KB

    MD5

    48aea480f88ba159a05da8c3e1b938e5

    SHA1

    56cce3368fb512d03e4ed502c1ae1b4a64a54ce9

    SHA256

    07fd15650c7ea9d453c9a86255445d32ba18b4f74876a1f099a473ff988f7ebf

    SHA512

    448dfc81b3148be7031e6ebfc813c148c39a4ae86692ace9d0c98bf2605aa5b76052cc6d4f44e3103452fa26eb60a67a28dd3ce5d579e81277421cefdf9c9be5

  • \Users\Admin\AppData\Local\Temp\7zSA7D.tmp\g9Zj9V04Ok8IYvy.exe

    Filesize

    632KB

    MD5

    59ed6cd5a934e324d7ff694adb712b61

    SHA1

    ee41b1da1ca21a050e548b04bbf37c47f251fd10

    SHA256

    cb9b055b0e4049898db5c8d1df973692f7e57f57ad053fc9fec5372a294b8726

    SHA512

    04238927495ce1720202db05e90c1efc0c8d409e5255188fff51ee5589048d7b5c56f080fe7e5a1f45f4a7ca1c0d73fadbc34b8a268547f2f2bbd1c994ec2fd8

  • memory/1104-54-0x0000000075BB1000-0x0000000075BB3000-memory.dmp

    Filesize

    8KB

  • memory/1652-78-0x000007FEFBDB1000-0x000007FEFBDB3000-memory.dmp

    Filesize

    8KB