Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
68s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 14:24
Static task
static1
Behavioral task
behavioral1
Sample
7dfa8052f22eb2a072b7821c29dd292b36dc59baf3155bf4f371af777547b3bb.exe
Resource
win7-20221111-en
General
-
Target
7dfa8052f22eb2a072b7821c29dd292b36dc59baf3155bf4f371af777547b3bb.exe
-
Size
2.1MB
-
MD5
431e36cea4e356274e7474c6e2f2cbe4
-
SHA1
f508fb75e8aaaa87924119aca6a66f986eb429be
-
SHA256
7dfa8052f22eb2a072b7821c29dd292b36dc59baf3155bf4f371af777547b3bb
-
SHA512
3682749d09241fedb845cc45daf2168f0cb22da03e89261ab90d55491c7b03589bf5ef807d38d651250c0b4a29aaaaea630b1065a5770e223c7e87126cc0bc0b
-
SSDEEP
49152:h1Os+aFBQd+eIvim2CQHSM3OYVv8JGUpqq0:h1OhaFBw+LNRR2FQt0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1332 BAADOdPOsxgIILu.exe -
Loads dropped DLL 4 IoCs
pid Process 1096 7dfa8052f22eb2a072b7821c29dd292b36dc59baf3155bf4f371af777547b3bb.exe 1332 BAADOdPOsxgIILu.exe 676 regsvr32.exe 980 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
description ioc Process File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\eelhanccmofmfjlallhihmellemdjnbf\2.0\manifest.json BAADOdPOsxgIILu.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\eelhanccmofmfjlallhihmellemdjnbf\2.0\manifest.json BAADOdPOsxgIILu.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\eelhanccmofmfjlallhihmellemdjnbf\2.0\manifest.json BAADOdPOsxgIILu.exe -
Installs/modifies Browser Helper Object 2 TTPs 11 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects BAADOdPOsxgIILu.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} BAADOdPOsxgIILu.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} BAADOdPOsxgIILu.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} BAADOdPOsxgIILu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ BAADOdPOsxgIILu.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\GooSave\3RnAq5v7wiPIxm.dat BAADOdPOsxgIILu.exe File created C:\Program Files (x86)\GooSave\3RnAq5v7wiPIxm.x64.dll BAADOdPOsxgIILu.exe File opened for modification C:\Program Files (x86)\GooSave\3RnAq5v7wiPIxm.x64.dll BAADOdPOsxgIILu.exe File created C:\Program Files (x86)\GooSave\3RnAq5v7wiPIxm.dll BAADOdPOsxgIILu.exe File opened for modification C:\Program Files (x86)\GooSave\3RnAq5v7wiPIxm.dll BAADOdPOsxgIILu.exe File created C:\Program Files (x86)\GooSave\3RnAq5v7wiPIxm.tlb BAADOdPOsxgIILu.exe File opened for modification C:\Program Files (x86)\GooSave\3RnAq5v7wiPIxm.tlb BAADOdPOsxgIILu.exe File created C:\Program Files (x86)\GooSave\3RnAq5v7wiPIxm.dat BAADOdPOsxgIILu.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1096 wrote to memory of 1332 1096 7dfa8052f22eb2a072b7821c29dd292b36dc59baf3155bf4f371af777547b3bb.exe 28 PID 1096 wrote to memory of 1332 1096 7dfa8052f22eb2a072b7821c29dd292b36dc59baf3155bf4f371af777547b3bb.exe 28 PID 1096 wrote to memory of 1332 1096 7dfa8052f22eb2a072b7821c29dd292b36dc59baf3155bf4f371af777547b3bb.exe 28 PID 1096 wrote to memory of 1332 1096 7dfa8052f22eb2a072b7821c29dd292b36dc59baf3155bf4f371af777547b3bb.exe 28 PID 1332 wrote to memory of 676 1332 BAADOdPOsxgIILu.exe 29 PID 1332 wrote to memory of 676 1332 BAADOdPOsxgIILu.exe 29 PID 1332 wrote to memory of 676 1332 BAADOdPOsxgIILu.exe 29 PID 1332 wrote to memory of 676 1332 BAADOdPOsxgIILu.exe 29 PID 1332 wrote to memory of 676 1332 BAADOdPOsxgIILu.exe 29 PID 1332 wrote to memory of 676 1332 BAADOdPOsxgIILu.exe 29 PID 1332 wrote to memory of 676 1332 BAADOdPOsxgIILu.exe 29 PID 676 wrote to memory of 980 676 regsvr32.exe 30 PID 676 wrote to memory of 980 676 regsvr32.exe 30 PID 676 wrote to memory of 980 676 regsvr32.exe 30 PID 676 wrote to memory of 980 676 regsvr32.exe 30 PID 676 wrote to memory of 980 676 regsvr32.exe 30 PID 676 wrote to memory of 980 676 regsvr32.exe 30 PID 676 wrote to memory of 980 676 regsvr32.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dfa8052f22eb2a072b7821c29dd292b36dc59baf3155bf4f371af777547b3bb.exe"C:\Users\Admin\AppData\Local\Temp\7dfa8052f22eb2a072b7821c29dd292b36dc59baf3155bf4f371af777547b3bb.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\7zSA2A6.tmp\BAADOdPOsxgIILu.exe.\BAADOdPOsxgIILu.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\GooSave\3RnAq5v7wiPIxm.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\GooSave\3RnAq5v7wiPIxm.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
PID:980
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5c61c1379bae7c7171a26cdde4f057aa7
SHA1340e3f7afb0f16fe9d9d16540637cb83d403db80
SHA256c354d0ab975433c6f2e40a0aeeca82a2052149ed7e1f55127f926c7aea825e77
SHA512fcf2af62b94c04dc499c62889dd7aeeaf22d4ab51a6e35b150e24204a1a75d4b1e2d99ea78beffe64b81cf7a6bae270705a5a83959fba11d2bb989bb1bea91e0
-
Filesize
696KB
MD58f30c38a6da083d86b39a511dcef943a
SHA10a6e8dd59ede58b74d2e3ea0176260f2c51a4b23
SHA25609428431f07c3a45a7e38933bf2e4a271ad501f35a43305962259dfa84161166
SHA512e0326b5e58ced39a6c6b75534aa6db531fdbae68882224ebb4cfbb306a4578847481fe1902bb1c0c1d84e6db997f250d801303b9cc5f51dddeff80dadd9f6ef3
-
Filesize
616KB
MD51120f8874c79b25d1298a34781f5f753
SHA1f7818c6893c2b5edcc4321b011ce30f5494a5cf1
SHA256c6bbf05c75c90b71c4365aec702ccf85a42522925ae58fe3d99c91f5b8d4e4da
SHA5125a97c876b83b063069be7748f1e9667d7684c4f3ae6f6345cc1af3bd609805eb9616ba51467ca4493894f1a79e4e23c1a6d1828c771fcbcaff0ab02defa7759b
-
Filesize
3KB
MD5633d469f7307d711a7f6b08d024cbe2d
SHA1a8c01e9c7a081c175a393345a7a60fb3be0f8cde
SHA256b3c5da764bfb906053b84e92b31e3d9b04a46b65b4e35d34c0c645496a80d054
SHA5128b66733187095168668526f37d0348d0e78889d44edc4c0da4be486bc10fe443862228af3b112f968d08d2afe5e86a21ab26ef72d4365a15785bef400652d485
-
Filesize
696KB
MD58f30c38a6da083d86b39a511dcef943a
SHA10a6e8dd59ede58b74d2e3ea0176260f2c51a4b23
SHA25609428431f07c3a45a7e38933bf2e4a271ad501f35a43305962259dfa84161166
SHA512e0326b5e58ced39a6c6b75534aa6db531fdbae68882224ebb4cfbb306a4578847481fe1902bb1c0c1d84e6db997f250d801303b9cc5f51dddeff80dadd9f6ef3
-
Filesize
6KB
MD5c61c1379bae7c7171a26cdde4f057aa7
SHA1340e3f7afb0f16fe9d9d16540637cb83d403db80
SHA256c354d0ab975433c6f2e40a0aeeca82a2052149ed7e1f55127f926c7aea825e77
SHA512fcf2af62b94c04dc499c62889dd7aeeaf22d4ab51a6e35b150e24204a1a75d4b1e2d99ea78beffe64b81cf7a6bae270705a5a83959fba11d2bb989bb1bea91e0
-
Filesize
624KB
MD5bfdd027de2e75467ce1d542d4e925e19
SHA11c076814ad25983cbdf0cd061978090014ebfcd1
SHA256ebb6c1511f94ddb23847bbfe73a41bc99496c97287bfce1942af48c52e0db84a
SHA51263c6f40107d20f4e186dbfece46c8889d17af15e641ca71db39d3dde4689c08248be12318925a3d3eeb6b6bf29b8276994feb5548a92cdcd1149118e7d857fc7
-
Filesize
624KB
MD5bfdd027de2e75467ce1d542d4e925e19
SHA11c076814ad25983cbdf0cd061978090014ebfcd1
SHA256ebb6c1511f94ddb23847bbfe73a41bc99496c97287bfce1942af48c52e0db84a
SHA51263c6f40107d20f4e186dbfece46c8889d17af15e641ca71db39d3dde4689c08248be12318925a3d3eeb6b6bf29b8276994feb5548a92cdcd1149118e7d857fc7
-
Filesize
5KB
MD5241a8f5266e42d78ca79aa1b2c2b2bfc
SHA1bb5292edcb71c79d60443e5ecb03d53a489328d6
SHA256006f9cc20d72462531d2095ecbbb900265f36f807639a76870e41492aa9da5ad
SHA5129a35a3ca6baa34be9280b69acd98aa3070d4f1681c7dced23548d00a2cc887ca2e7e8b5a239708660267b7cd07a6c67279f234b0ed2392d43f455d8b860108de
-
Filesize
141B
MD5992e1e2e5f2a2bd272130e10e18b4c38
SHA14842eb9bf67c6638633c9831f986a41c9d8580da
SHA256bd2e2a3b41c82f83ad7e9bfe1057a1cee8209ecafdd2162fcd37b054003050a1
SHA512e111e827b391af2554df462f5db766d1e509380b16ecdd063843191f08db70baae1b88e2852cbb9d1e5b0126782974b4e65641a6bbd097021cb0aa37af3c17df
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
499B
MD52bafae0ea4ab5ac51958f72d544ef543
SHA14a4665d6b13fbba59d92c908b8fc30aac3bedd08
SHA2569c47ef92b7f138a1487632f023fb3f9ff2c379b29c627b716707b162ae56f473
SHA5121f76f2b5423a040f29ecbc58e257c336faade2f80fc41917d165d02989858057508ed0cf5c7eecd12b6238885331f27d4f05d61ec0334200f6c17f2e4974b72f
-
C:\Users\Admin\AppData\Local\Temp\7zSA2A6.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zSA2A6.tmp\[email protected]\chrome.manifest
Filesize35B
MD5e8161069c2ba2958edbf7d8998ab4038
SHA17cec2ef588e2aa75ecfc971467d25c37169cbc9c
SHA2564065a158a07a235da5bc8ff28b28943889c7f738f2bf56313dabdf105feb89bb
SHA51215a1d1176e4f9a2f1bfd284ff234a1e4f6c7d0f12e71125b2a3f7fc803c02dc0ee1a49d412c904113d07400fedf38875716f4de1cbc1b536bdc044ce2d67b418
-
C:\Users\Admin\AppData\Local\Temp\7zSA2A6.tmp\[email protected]\content\bg.js
Filesize7KB
MD585a9618ff5a3479d8dee9f1ec4a7442c
SHA1fb7e1c9ba4070286e5a99acd9322c8a62bb1b4d0
SHA256ebc68510251dc7e2febcbf74b5e2109420074ed725eb68cb369abca310dfdc59
SHA512712b6227bde772c43d8ef093e38456c46affd205c2bf9324cb1cb8b757e1c5e946d99e2d5e029aae5613e4bfc3e91838a623141e04c656e269d8f5e75da3117a
-
C:\Users\Admin\AppData\Local\Temp\7zSA2A6.tmp\[email protected]\install.rdf
Filesize600B
MD5d8928e6094bff0f55c1315797ad6e57e
SHA11da2cee5e313bcbf0124e86704c07b3d26e9f216
SHA2567afd81adc1771ca9e60b0d9ab57b729df3f0ae0ed6536a1174e9b6aab3660c29
SHA512911dceb4c419d1d4c45439a6b004158501884b8e7ad081317a3a40b312cb02a107cf3cb1e31f0fe6169e7df09bbf2e643cd074820f4bad79ee2095823657aa7a
-
Filesize
616KB
MD51120f8874c79b25d1298a34781f5f753
SHA1f7818c6893c2b5edcc4321b011ce30f5494a5cf1
SHA256c6bbf05c75c90b71c4365aec702ccf85a42522925ae58fe3d99c91f5b8d4e4da
SHA5125a97c876b83b063069be7748f1e9667d7684c4f3ae6f6345cc1af3bd609805eb9616ba51467ca4493894f1a79e4e23c1a6d1828c771fcbcaff0ab02defa7759b
-
Filesize
696KB
MD58f30c38a6da083d86b39a511dcef943a
SHA10a6e8dd59ede58b74d2e3ea0176260f2c51a4b23
SHA25609428431f07c3a45a7e38933bf2e4a271ad501f35a43305962259dfa84161166
SHA512e0326b5e58ced39a6c6b75534aa6db531fdbae68882224ebb4cfbb306a4578847481fe1902bb1c0c1d84e6db997f250d801303b9cc5f51dddeff80dadd9f6ef3
-
Filesize
696KB
MD58f30c38a6da083d86b39a511dcef943a
SHA10a6e8dd59ede58b74d2e3ea0176260f2c51a4b23
SHA25609428431f07c3a45a7e38933bf2e4a271ad501f35a43305962259dfa84161166
SHA512e0326b5e58ced39a6c6b75534aa6db531fdbae68882224ebb4cfbb306a4578847481fe1902bb1c0c1d84e6db997f250d801303b9cc5f51dddeff80dadd9f6ef3
-
Filesize
624KB
MD5bfdd027de2e75467ce1d542d4e925e19
SHA11c076814ad25983cbdf0cd061978090014ebfcd1
SHA256ebb6c1511f94ddb23847bbfe73a41bc99496c97287bfce1942af48c52e0db84a
SHA51263c6f40107d20f4e186dbfece46c8889d17af15e641ca71db39d3dde4689c08248be12318925a3d3eeb6b6bf29b8276994feb5548a92cdcd1149118e7d857fc7