Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
28s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
f87abeec4df617723759070b397a30fefc360ae635b27644ed26641986af695c.exe
Resource
win7-20220812-en
General
-
Target
f87abeec4df617723759070b397a30fefc360ae635b27644ed26641986af695c.exe
-
Size
2.1MB
-
MD5
8875fe92eae0a18c200a929d3ad18496
-
SHA1
031eaf69a49cd20ab1a9345f92ec16db85feb372
-
SHA256
f87abeec4df617723759070b397a30fefc360ae635b27644ed26641986af695c
-
SHA512
3122778ece1126f07d2c7640c2945488d1c56b0985580fe2810e2b4d2e9ba42688d1cc13f437a6818ecaf67eb6a0c12bb8cdf8c34c4de001e0f0ec7ffaa8eaed
-
SSDEEP
49152:h1OssyuyoY0IKAVWQrQSM5eeHY1h2PlSUQ8PciN:h1O5goP9oM5LF1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1240 CCwI1Du7gQmen32.exe -
Loads dropped DLL 4 IoCs
pid Process 1948 f87abeec4df617723759070b397a30fefc360ae635b27644ed26641986af695c.exe 1240 CCwI1Du7gQmen32.exe 960 regsvr32.exe 1392 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\fijhhiikabnaladkoclfchgbogolbncj\3.0\manifest.json CCwI1Du7gQmen32.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\fijhhiikabnaladkoclfchgbogolbncj\3.0\manifest.json CCwI1Du7gQmen32.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\fijhhiikabnaladkoclfchgbogolbncj\3.0\manifest.json CCwI1Du7gQmen32.exe -
Installs/modifies Browser Helper Object 2 TTPs 11 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ CCwI1Du7gQmen32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} CCwI1Du7gQmen32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} CCwI1Du7gQmen32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects CCwI1Du7gQmen32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} CCwI1Du7gQmen32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DBC80044-A445-435B-BC74-9C25C1C588A9} regsvr32.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\GoSauve\OM2nOSTdsThQUW.dll CCwI1Du7gQmen32.exe File opened for modification C:\Program Files (x86)\GoSauve\OM2nOSTdsThQUW.dll CCwI1Du7gQmen32.exe File created C:\Program Files (x86)\GoSauve\OM2nOSTdsThQUW.tlb CCwI1Du7gQmen32.exe File opened for modification C:\Program Files (x86)\GoSauve\OM2nOSTdsThQUW.tlb CCwI1Du7gQmen32.exe File created C:\Program Files (x86)\GoSauve\OM2nOSTdsThQUW.dat CCwI1Du7gQmen32.exe File opened for modification C:\Program Files (x86)\GoSauve\OM2nOSTdsThQUW.dat CCwI1Du7gQmen32.exe File created C:\Program Files (x86)\GoSauve\OM2nOSTdsThQUW.x64.dll CCwI1Du7gQmen32.exe File opened for modification C:\Program Files (x86)\GoSauve\OM2nOSTdsThQUW.x64.dll CCwI1Du7gQmen32.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1240 1948 f87abeec4df617723759070b397a30fefc360ae635b27644ed26641986af695c.exe 28 PID 1948 wrote to memory of 1240 1948 f87abeec4df617723759070b397a30fefc360ae635b27644ed26641986af695c.exe 28 PID 1948 wrote to memory of 1240 1948 f87abeec4df617723759070b397a30fefc360ae635b27644ed26641986af695c.exe 28 PID 1948 wrote to memory of 1240 1948 f87abeec4df617723759070b397a30fefc360ae635b27644ed26641986af695c.exe 28 PID 1240 wrote to memory of 960 1240 CCwI1Du7gQmen32.exe 29 PID 1240 wrote to memory of 960 1240 CCwI1Du7gQmen32.exe 29 PID 1240 wrote to memory of 960 1240 CCwI1Du7gQmen32.exe 29 PID 1240 wrote to memory of 960 1240 CCwI1Du7gQmen32.exe 29 PID 1240 wrote to memory of 960 1240 CCwI1Du7gQmen32.exe 29 PID 1240 wrote to memory of 960 1240 CCwI1Du7gQmen32.exe 29 PID 1240 wrote to memory of 960 1240 CCwI1Du7gQmen32.exe 29 PID 960 wrote to memory of 1392 960 regsvr32.exe 30 PID 960 wrote to memory of 1392 960 regsvr32.exe 30 PID 960 wrote to memory of 1392 960 regsvr32.exe 30 PID 960 wrote to memory of 1392 960 regsvr32.exe 30 PID 960 wrote to memory of 1392 960 regsvr32.exe 30 PID 960 wrote to memory of 1392 960 regsvr32.exe 30 PID 960 wrote to memory of 1392 960 regsvr32.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f87abeec4df617723759070b397a30fefc360ae635b27644ed26641986af695c.exe"C:\Users\Admin\AppData\Local\Temp\f87abeec4df617723759070b397a30fefc360ae635b27644ed26641986af695c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\7zS7714.tmp\CCwI1Du7gQmen32.exe.\CCwI1Du7gQmen32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\GoSauve\OM2nOSTdsThQUW.x64.dll"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\GoSauve\OM2nOSTdsThQUW.x64.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
PID:1392
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD542b734f4e4492b8b87032c1480804ff2
SHA14f4e504efbf9f73fdff12eaa18ed852d13c0548c
SHA2568cd055e25efef9626a1e536db1bd4533a5688c4ffd37ef196605aa124819f858
SHA5122b77ce57ad4f08ae6cddc04f22d920ece2b4f15d99fbbec3d7a41b5d9a05e38a1a879ba3a5b3ccacb747cfbfa51f418e3838acdd2dd44d5535d3f511a7a658d2
-
Filesize
698KB
MD548aea480f88ba159a05da8c3e1b938e5
SHA156cce3368fb512d03e4ed502c1ae1b4a64a54ce9
SHA25607fd15650c7ea9d453c9a86255445d32ba18b4f74876a1f099a473ff988f7ebf
SHA512448dfc81b3148be7031e6ebfc813c148c39a4ae86692ace9d0c98bf2605aa5b76052cc6d4f44e3103452fa26eb60a67a28dd3ce5d579e81277421cefdf9c9be5
-
Filesize
6KB
MD542b734f4e4492b8b87032c1480804ff2
SHA14f4e504efbf9f73fdff12eaa18ed852d13c0548c
SHA2568cd055e25efef9626a1e536db1bd4533a5688c4ffd37ef196605aa124819f858
SHA5122b77ce57ad4f08ae6cddc04f22d920ece2b4f15d99fbbec3d7a41b5d9a05e38a1a879ba3a5b3ccacb747cfbfa51f418e3838acdd2dd44d5535d3f511a7a658d2
-
Filesize
632KB
MD559ed6cd5a934e324d7ff694adb712b61
SHA1ee41b1da1ca21a050e548b04bbf37c47f251fd10
SHA256cb9b055b0e4049898db5c8d1df973692f7e57f57ad053fc9fec5372a294b8726
SHA51204238927495ce1720202db05e90c1efc0c8d409e5255188fff51ee5589048d7b5c56f080fe7e5a1f45f4a7ca1c0d73fadbc34b8a268547f2f2bbd1c994ec2fd8
-
Filesize
632KB
MD559ed6cd5a934e324d7ff694adb712b61
SHA1ee41b1da1ca21a050e548b04bbf37c47f251fd10
SHA256cb9b055b0e4049898db5c8d1df973692f7e57f57ad053fc9fec5372a294b8726
SHA51204238927495ce1720202db05e90c1efc0c8d409e5255188fff51ee5589048d7b5c56f080fe7e5a1f45f4a7ca1c0d73fadbc34b8a268547f2f2bbd1c994ec2fd8
-
Filesize
616KB
MD5ac2bb9f430ee63577e2e658e576fbaa3
SHA1661dad0abec24f1cd8400e09fd00881d9dd66b02
SHA25659bb2ef1513927977be1a94a9e7687a92fd078ad343d481ba40edbfbe85e8812
SHA512f0c2e9c780bcf67147a7c4803ffb292d6b2c4bf0a03f65273a86c6da85c0b5cd1d24d48726d95ed1e5c6b5662b7fcaba65b47bf1e7d906d97c263d2c92285769
-
Filesize
3KB
MD552acf269931e562ad7445f7a803bd5e3
SHA1ef86bb5f96b2bba4c85a73efef5df4a08ab99031
SHA256bc29a9426767cb54f6f11ea9d457613f858aa0d0e33137ab8ad1f53ff601d8f2
SHA512545cc433a340e0b6ef70c92ab7854058222bb76385fb4027f1cc174a0baececb48c8e04ea83e9387d2c664505d4dd3799d41512e06c3ec5b4e32d0bf4a84668b
-
Filesize
698KB
MD548aea480f88ba159a05da8c3e1b938e5
SHA156cce3368fb512d03e4ed502c1ae1b4a64a54ce9
SHA25607fd15650c7ea9d453c9a86255445d32ba18b4f74876a1f099a473ff988f7ebf
SHA512448dfc81b3148be7031e6ebfc813c148c39a4ae86692ace9d0c98bf2605aa5b76052cc6d4f44e3103452fa26eb60a67a28dd3ce5d579e81277421cefdf9c9be5
-
Filesize
5KB
MD5b57dbef8d68140697650fd315f428e8e
SHA1b82147c6fc1005a353f91805eaff0a3eba856b50
SHA2568ae89f49b56892d828be8367650a69c10846af3d1257c5b14b112f8ea0bef908
SHA51254e61a398d5d25e4bab46cebd2d05e90df3710fa11d7b4e01b6bfe29ecb9d60dffe0b5490444e537f8566a760092231af9eb1721739fb3b9578bc4912023a674
-
Filesize
144B
MD5ab9c73e972fd04897e0d2483c6804ff1
SHA10257e86e17e12154d8fcd958d285e7b65bf2aef6
SHA256ab3275a6127140c0510ecc464cfde01d12eced26d10e8b7ee77715f00956a2d4
SHA512888f95a74ee4d50878ccf8aa0c32faf210a629b8c68e2e0a55eef17d56d8fa4c2cedb2067166176d5135c39b0da0327225157b747008908fcd83f644d0e22cba
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
499B
MD597fe9b5d8f1abb79bdc02f798b115155
SHA1a8de86b079a3dcf793aa7190facb19eb9305d999
SHA256a408c7f9407b5d98442e118b8c5fba9f0caab346b0700a348a33fb4946eaab37
SHA512cf7ae6a467888086d9ce46983a1fac37a61374714d6592fdfb141aa06e5815617f28d6fc96a76928b3d915e2f27d3be0e6ad92fb1549ac7d9e1384bb09b3562b
-
C:\Users\Admin\AppData\Local\Temp\7zS7714.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zS7714.tmp\[email protected]\chrome.manifest
Filesize35B
MD5d647dfc28b6394f7f3697ef651e86e07
SHA10e2b0f0c206b7f7d64d04afde4672ca727329ec9
SHA2565141c0ce79cf7320a69cab4b2ebe081112837fd08488f5f0863834c8100fd97d
SHA5125e7942c851211a19d0de7ef8ddcc297d5e34df359fd2165c374a2f6a3ecfea270c946f2d294c2351acb12c1e22621b03061a56add501b8743e080d58715f743a
-
C:\Users\Admin\AppData\Local\Temp\7zS7714.tmp\[email protected]\content\bg.js
Filesize7KB
MD5c0de90d5098eee2db2ae9f0714a07040
SHA1bb34953340b71c6cc3bf0e27c710e86ce7cbab68
SHA2560de0a843e51805c4e32c1a181fed6f48e84483b5d341e0473e7bd3d15b26e74b
SHA5128fac1bde8e4fd3107cd99472dc1b84b470e243c1ecbc450fe6d420128e990cfbdd4e2fd6bbe6205633dba8a6cd6a3cbce00bbe5a1cedea32e6654d6e1f2e2c68
-
C:\Users\Admin\AppData\Local\Temp\7zS7714.tmp\[email protected]\install.rdf
Filesize597B
MD5a5fca3089393f703bee8f90aabdb73ae
SHA16264bb8945733bf04e455cea253bcc959d8bba49
SHA2565bc5769c628b3d380f65c7fe3b82e9221a85ce5c2a4858d4a1389e5b21f1b072
SHA512225e99f7e754132a460001e07a6cf371ef17c1aa19436d3f1b6d785d6e9a7210a9c3526cf38977dc387e30f03dacb222a086e929f0ea2e8cf109cd5a942a35a7
-
Filesize
616KB
MD5ac2bb9f430ee63577e2e658e576fbaa3
SHA1661dad0abec24f1cd8400e09fd00881d9dd66b02
SHA25659bb2ef1513927977be1a94a9e7687a92fd078ad343d481ba40edbfbe85e8812
SHA512f0c2e9c780bcf67147a7c4803ffb292d6b2c4bf0a03f65273a86c6da85c0b5cd1d24d48726d95ed1e5c6b5662b7fcaba65b47bf1e7d906d97c263d2c92285769
-
Filesize
698KB
MD548aea480f88ba159a05da8c3e1b938e5
SHA156cce3368fb512d03e4ed502c1ae1b4a64a54ce9
SHA25607fd15650c7ea9d453c9a86255445d32ba18b4f74876a1f099a473ff988f7ebf
SHA512448dfc81b3148be7031e6ebfc813c148c39a4ae86692ace9d0c98bf2605aa5b76052cc6d4f44e3103452fa26eb60a67a28dd3ce5d579e81277421cefdf9c9be5
-
Filesize
698KB
MD548aea480f88ba159a05da8c3e1b938e5
SHA156cce3368fb512d03e4ed502c1ae1b4a64a54ce9
SHA25607fd15650c7ea9d453c9a86255445d32ba18b4f74876a1f099a473ff988f7ebf
SHA512448dfc81b3148be7031e6ebfc813c148c39a4ae86692ace9d0c98bf2605aa5b76052cc6d4f44e3103452fa26eb60a67a28dd3ce5d579e81277421cefdf9c9be5
-
Filesize
632KB
MD559ed6cd5a934e324d7ff694adb712b61
SHA1ee41b1da1ca21a050e548b04bbf37c47f251fd10
SHA256cb9b055b0e4049898db5c8d1df973692f7e57f57ad053fc9fec5372a294b8726
SHA51204238927495ce1720202db05e90c1efc0c8d409e5255188fff51ee5589048d7b5c56f080fe7e5a1f45f4a7ca1c0d73fadbc34b8a268547f2f2bbd1c994ec2fd8