Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
43s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 23:50
Static task
static1
Behavioral task
behavioral1
Sample
0531b1898198da22e6d417ee97f21c48170647c83130d725554fa68fad3c8aa6.exe
Resource
win7-20220901-en
General
-
Target
0531b1898198da22e6d417ee97f21c48170647c83130d725554fa68fad3c8aa6.exe
-
Size
2.1MB
-
MD5
61261d84732284c156a220090c3cd1fc
-
SHA1
2b93e89d5ad3b4af7dee3c154bddb3171b94c7f0
-
SHA256
0531b1898198da22e6d417ee97f21c48170647c83130d725554fa68fad3c8aa6
-
SHA512
14754ef59246af813c42e69c18e2458edc6f650b3b46e924fdfc34b9130848df6bc88b92f136e4201582bd07624576dac7a6b1018e400207be899af17913504b
-
SSDEEP
49152:h1OsqyuyoY0IKAVWQrQSM5eeHY1h2PlSUQ8Pci2:h1OTgoP9oM5LFe
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1732 g9Zj9V04Ok8IYvy.exe -
Loads dropped DLL 4 IoCs
pid Process 1104 0531b1898198da22e6d417ee97f21c48170647c83130d725554fa68fad3c8aa6.exe 1732 g9Zj9V04Ok8IYvy.exe 268 regsvr32.exe 1652 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ceobaffhhgknokcekhlnaacbfaodldci\2.0\manifest.json g9Zj9V04Ok8IYvy.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\ceobaffhhgknokcekhlnaacbfaodldci\2.0\manifest.json g9Zj9V04Ok8IYvy.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\ceobaffhhgknokcekhlnaacbfaodldci\2.0\manifest.json g9Zj9V04Ok8IYvy.exe -
Installs/modifies Browser Helper Object 2 TTPs 11 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} g9Zj9V04Ok8IYvy.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} g9Zj9V04Ok8IYvy.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} g9Zj9V04Ok8IYvy.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects g9Zj9V04Ok8IYvy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ g9Zj9V04Ok8IYvy.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\GoSaVe\Ly1JW4KVXMKYJr.dat g9Zj9V04Ok8IYvy.exe File created C:\Program Files (x86)\GoSaVe\Ly1JW4KVXMKYJr.x64.dll g9Zj9V04Ok8IYvy.exe File opened for modification C:\Program Files (x86)\GoSaVe\Ly1JW4KVXMKYJr.x64.dll g9Zj9V04Ok8IYvy.exe File created C:\Program Files (x86)\GoSaVe\Ly1JW4KVXMKYJr.dll g9Zj9V04Ok8IYvy.exe File opened for modification C:\Program Files (x86)\GoSaVe\Ly1JW4KVXMKYJr.dll g9Zj9V04Ok8IYvy.exe File created C:\Program Files (x86)\GoSaVe\Ly1JW4KVXMKYJr.tlb g9Zj9V04Ok8IYvy.exe File opened for modification C:\Program Files (x86)\GoSaVe\Ly1JW4KVXMKYJr.tlb g9Zj9V04Ok8IYvy.exe File created C:\Program Files (x86)\GoSaVe\Ly1JW4KVXMKYJr.dat g9Zj9V04Ok8IYvy.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1104 wrote to memory of 1732 1104 0531b1898198da22e6d417ee97f21c48170647c83130d725554fa68fad3c8aa6.exe 27 PID 1104 wrote to memory of 1732 1104 0531b1898198da22e6d417ee97f21c48170647c83130d725554fa68fad3c8aa6.exe 27 PID 1104 wrote to memory of 1732 1104 0531b1898198da22e6d417ee97f21c48170647c83130d725554fa68fad3c8aa6.exe 27 PID 1104 wrote to memory of 1732 1104 0531b1898198da22e6d417ee97f21c48170647c83130d725554fa68fad3c8aa6.exe 27 PID 1732 wrote to memory of 268 1732 g9Zj9V04Ok8IYvy.exe 28 PID 1732 wrote to memory of 268 1732 g9Zj9V04Ok8IYvy.exe 28 PID 1732 wrote to memory of 268 1732 g9Zj9V04Ok8IYvy.exe 28 PID 1732 wrote to memory of 268 1732 g9Zj9V04Ok8IYvy.exe 28 PID 1732 wrote to memory of 268 1732 g9Zj9V04Ok8IYvy.exe 28 PID 1732 wrote to memory of 268 1732 g9Zj9V04Ok8IYvy.exe 28 PID 1732 wrote to memory of 268 1732 g9Zj9V04Ok8IYvy.exe 28 PID 268 wrote to memory of 1652 268 regsvr32.exe 29 PID 268 wrote to memory of 1652 268 regsvr32.exe 29 PID 268 wrote to memory of 1652 268 regsvr32.exe 29 PID 268 wrote to memory of 1652 268 regsvr32.exe 29 PID 268 wrote to memory of 1652 268 regsvr32.exe 29 PID 268 wrote to memory of 1652 268 regsvr32.exe 29 PID 268 wrote to memory of 1652 268 regsvr32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0531b1898198da22e6d417ee97f21c48170647c83130d725554fa68fad3c8aa6.exe"C:\Users\Admin\AppData\Local\Temp\0531b1898198da22e6d417ee97f21c48170647c83130d725554fa68fad3c8aa6.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\7zSA7D.tmp\g9Zj9V04Ok8IYvy.exe.\g9Zj9V04Ok8IYvy.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\GoSaVe\Ly1JW4KVXMKYJr.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\GoSaVe\Ly1JW4KVXMKYJr.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
PID:1652
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5b0bb3cbc1540ae782df15d85b5dfa152
SHA14cfaffc9b21e6b66170200d81ea0d6ad8a1866b2
SHA256bcdbd2d3339e327c63e9136333313b2d4ab55d439ac3eaee776a183c5870ae94
SHA5123e4f266d794d134e88a1eaa75a7f3ac953ae694d54c60909c15181f62532b88632524b7c5ff1712dd2582e2d7bc46b61fb7565e31a2e7b71f63c8bc36e016c97
-
Filesize
698KB
MD548aea480f88ba159a05da8c3e1b938e5
SHA156cce3368fb512d03e4ed502c1ae1b4a64a54ce9
SHA25607fd15650c7ea9d453c9a86255445d32ba18b4f74876a1f099a473ff988f7ebf
SHA512448dfc81b3148be7031e6ebfc813c148c39a4ae86692ace9d0c98bf2605aa5b76052cc6d4f44e3103452fa26eb60a67a28dd3ce5d579e81277421cefdf9c9be5
-
Filesize
616KB
MD5ac2bb9f430ee63577e2e658e576fbaa3
SHA1661dad0abec24f1cd8400e09fd00881d9dd66b02
SHA25659bb2ef1513927977be1a94a9e7687a92fd078ad343d481ba40edbfbe85e8812
SHA512f0c2e9c780bcf67147a7c4803ffb292d6b2c4bf0a03f65273a86c6da85c0b5cd1d24d48726d95ed1e5c6b5662b7fcaba65b47bf1e7d906d97c263d2c92285769
-
Filesize
3KB
MD552acf269931e562ad7445f7a803bd5e3
SHA1ef86bb5f96b2bba4c85a73efef5df4a08ab99031
SHA256bc29a9426767cb54f6f11ea9d457613f858aa0d0e33137ab8ad1f53ff601d8f2
SHA512545cc433a340e0b6ef70c92ab7854058222bb76385fb4027f1cc174a0baececb48c8e04ea83e9387d2c664505d4dd3799d41512e06c3ec5b4e32d0bf4a84668b
-
Filesize
698KB
MD548aea480f88ba159a05da8c3e1b938e5
SHA156cce3368fb512d03e4ed502c1ae1b4a64a54ce9
SHA25607fd15650c7ea9d453c9a86255445d32ba18b4f74876a1f099a473ff988f7ebf
SHA512448dfc81b3148be7031e6ebfc813c148c39a4ae86692ace9d0c98bf2605aa5b76052cc6d4f44e3103452fa26eb60a67a28dd3ce5d579e81277421cefdf9c9be5
-
Filesize
5KB
MD57d103a2e8857805ee55f8ca1bfba6966
SHA19b9bcfa54c72318c18c479ad8e08a73afa88c985
SHA2564475c733586cdb067517ba7a9a34ec80311d0443b8312d85a32ccca734254682
SHA51210610711eedb7d262291498b7dac222ed2085cad87555919946b2409b46361561c650cb9defe4de9cb6531f67e43148f842974e947bfc5efca238cb51d3c756a
-
Filesize
146B
MD57106b9501cae285b11059c1f3195ec23
SHA177cefacf5b8f793e4aadcf3b90be33b32f72cf8d
SHA256a15700548b4021121d0fc3cd2ddd52bc895761fb4c1ca199360746d965a6393f
SHA512eaf09ddae324b29339f7eef6b11356a18e776b4a4ab11f7248dfed89b8cb3597873f2dd626eafdf22446a4bfa2029924fc307bda1767ee7d33ec6a4e6530b071
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
498B
MD589a241d9a52cb219f29cebedc468a56c
SHA132d0c1c01e5edcd477ab02fe1ea66ee36f3edd66
SHA2563e1d41b33440994a6f512014f98fae28bd40b625a2bc80f16290cf8a961fd4a8
SHA512cc783a38629e69e98f45d4bbc69e6cad70b59caf7886b95aefc6b564be79730d7bd7c4268e20c2be8bc3e3073ecb0c2eed584c7226b95f9707661c82fc7455be
-
Filesize
6KB
MD5b0bb3cbc1540ae782df15d85b5dfa152
SHA14cfaffc9b21e6b66170200d81ea0d6ad8a1866b2
SHA256bcdbd2d3339e327c63e9136333313b2d4ab55d439ac3eaee776a183c5870ae94
SHA5123e4f266d794d134e88a1eaa75a7f3ac953ae694d54c60909c15181f62532b88632524b7c5ff1712dd2582e2d7bc46b61fb7565e31a2e7b71f63c8bc36e016c97
-
Filesize
632KB
MD559ed6cd5a934e324d7ff694adb712b61
SHA1ee41b1da1ca21a050e548b04bbf37c47f251fd10
SHA256cb9b055b0e4049898db5c8d1df973692f7e57f57ad053fc9fec5372a294b8726
SHA51204238927495ce1720202db05e90c1efc0c8d409e5255188fff51ee5589048d7b5c56f080fe7e5a1f45f4a7ca1c0d73fadbc34b8a268547f2f2bbd1c994ec2fd8
-
Filesize
632KB
MD559ed6cd5a934e324d7ff694adb712b61
SHA1ee41b1da1ca21a050e548b04bbf37c47f251fd10
SHA256cb9b055b0e4049898db5c8d1df973692f7e57f57ad053fc9fec5372a294b8726
SHA51204238927495ce1720202db05e90c1efc0c8d409e5255188fff51ee5589048d7b5c56f080fe7e5a1f45f4a7ca1c0d73fadbc34b8a268547f2f2bbd1c994ec2fd8
-
C:\Users\Admin\AppData\Local\Temp\7zSA7D.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zSA7D.tmp\[email protected]\chrome.manifest
Filesize35B
MD5518631f50e39b4474a15460b028b2fd1
SHA13b68383c7fed519adf71e08fb5d975bb281d1a34
SHA25647d2d243b6f1aa0cbe69d77543cab65dbba5e2938c1057585ff9c81518ee01ab
SHA512698083fb04f2e990c7b83ee306c3454d03233631c409f3db4444e9028eee87a77b8ad51d6d2c9a0f291da9edcbc263192dba28acb90aacb432426dbea0063284
-
C:\Users\Admin\AppData\Local\Temp\7zSA7D.tmp\[email protected]\content\bg.js
Filesize7KB
MD58c7d773b011cc67342d646908a5c007c
SHA1c63a58e83a5e2b8cfebb8cbdcc95a46228575062
SHA256cf77eaa616a9d8678710dde4aa303ff2788e3dde7f04b6c803ea0ca41c498385
SHA5121a52ba0bbdb580e0745a14c15e6a60a79a381be2b61bb18db753d2b26d660360e7b04e4bc28fd6f7fb365a01b1b011d405d3314ade35b1cc20d89fa03e824068
-
C:\Users\Admin\AppData\Local\Temp\7zSA7D.tmp\[email protected]\install.rdf
Filesize593B
MD513a04f75938930bc725ca0ffe6a5ad92
SHA1fedac78ba7c25ec60351a5f2a84149bd68ecca21
SHA25652c70180e264b36b0513150020750bcf39be9fee458ff37c42691133de1c560c
SHA512ee45262a92bd5fa658084bfbbe4f17dd95cd7558cac38f05d318a50eaabe4ccdec1743653c5126855f5debd11bc389ed37d1a595930e3cc46bb112732a9eaeb9
-
Filesize
616KB
MD5ac2bb9f430ee63577e2e658e576fbaa3
SHA1661dad0abec24f1cd8400e09fd00881d9dd66b02
SHA25659bb2ef1513927977be1a94a9e7687a92fd078ad343d481ba40edbfbe85e8812
SHA512f0c2e9c780bcf67147a7c4803ffb292d6b2c4bf0a03f65273a86c6da85c0b5cd1d24d48726d95ed1e5c6b5662b7fcaba65b47bf1e7d906d97c263d2c92285769
-
Filesize
698KB
MD548aea480f88ba159a05da8c3e1b938e5
SHA156cce3368fb512d03e4ed502c1ae1b4a64a54ce9
SHA25607fd15650c7ea9d453c9a86255445d32ba18b4f74876a1f099a473ff988f7ebf
SHA512448dfc81b3148be7031e6ebfc813c148c39a4ae86692ace9d0c98bf2605aa5b76052cc6d4f44e3103452fa26eb60a67a28dd3ce5d579e81277421cefdf9c9be5
-
Filesize
698KB
MD548aea480f88ba159a05da8c3e1b938e5
SHA156cce3368fb512d03e4ed502c1ae1b4a64a54ce9
SHA25607fd15650c7ea9d453c9a86255445d32ba18b4f74876a1f099a473ff988f7ebf
SHA512448dfc81b3148be7031e6ebfc813c148c39a4ae86692ace9d0c98bf2605aa5b76052cc6d4f44e3103452fa26eb60a67a28dd3ce5d579e81277421cefdf9c9be5
-
Filesize
632KB
MD559ed6cd5a934e324d7ff694adb712b61
SHA1ee41b1da1ca21a050e548b04bbf37c47f251fd10
SHA256cb9b055b0e4049898db5c8d1df973692f7e57f57ad053fc9fec5372a294b8726
SHA51204238927495ce1720202db05e90c1efc0c8d409e5255188fff51ee5589048d7b5c56f080fe7e5a1f45f4a7ca1c0d73fadbc34b8a268547f2f2bbd1c994ec2fd8