Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
287s -
max time network
312s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 21:48
Static task
static1
Behavioral task
behavioral1
Sample
3184716a2fece1fc6f6379b74c0038e221db3beee6262f64b8ebcb07592037ac.exe
Resource
win7-20220812-en
General
-
Target
3184716a2fece1fc6f6379b74c0038e221db3beee6262f64b8ebcb07592037ac.exe
-
Size
2.0MB
-
MD5
f77dbad3a63a65649408c1dfe959b10a
-
SHA1
688f2302efd35b5e6c3067398640d55225c0717a
-
SHA256
3184716a2fece1fc6f6379b74c0038e221db3beee6262f64b8ebcb07592037ac
-
SHA512
82ccfbd93346ed4aa55b7b536c1720b7147820646057295c36027eb7db735437e60f2a823a2d2028cfa143a749f4be9a69e17cdd16bffd2737bacf8cc2a06f5d
-
SSDEEP
24576:h1OYdaOT8MtJWa++eHCk6GTOnJOZTtahifhUHz2RcZ01tj/W100azDRVBY8IGcyh:h1Os/JaTxZTtCChUT2vgorvcyXx
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1020 d1JeAnMjkheXZAe.exe -
Loads dropped DLL 1 IoCs
pid Process 1020 d1JeAnMjkheXZAe.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops Chrome extension 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cjjpnjehmhhfpdjlcfgbjaplhjgbbjeb\1.0\manifest.json d1JeAnMjkheXZAe.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\cjjpnjehmhhfpdjlcfgbjaplhjgbbjeb\1.0\manifest.json d1JeAnMjkheXZAe.exe File created C:\Users\DefaultAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\cjjpnjehmhhfpdjlcfgbjaplhjgbbjeb\1.0\manifest.json d1JeAnMjkheXZAe.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\cjjpnjehmhhfpdjlcfgbjaplhjgbbjeb\1.0\manifest.json d1JeAnMjkheXZAe.exe File created C:\Users\WDAGUtilityAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\cjjpnjehmhhfpdjlcfgbjaplhjgbbjeb\1.0\manifest.json d1JeAnMjkheXZAe.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\YoutUbeAdBllocke\tnjTLhclA6I6eK.dat d1JeAnMjkheXZAe.exe File created C:\Program Files (x86)\YoutUbeAdBllocke\tnjTLhclA6I6eK.dll d1JeAnMjkheXZAe.exe File opened for modification C:\Program Files (x86)\YoutUbeAdBllocke\tnjTLhclA6I6eK.dll d1JeAnMjkheXZAe.exe File created C:\Program Files (x86)\YoutUbeAdBllocke\tnjTLhclA6I6eK.tlb d1JeAnMjkheXZAe.exe File opened for modification C:\Program Files (x86)\YoutUbeAdBllocke\tnjTLhclA6I6eK.tlb d1JeAnMjkheXZAe.exe File created C:\Program Files (x86)\YoutUbeAdBllocke\tnjTLhclA6I6eK.dat d1JeAnMjkheXZAe.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4776 wrote to memory of 1020 4776 3184716a2fece1fc6f6379b74c0038e221db3beee6262f64b8ebcb07592037ac.exe 82 PID 4776 wrote to memory of 1020 4776 3184716a2fece1fc6f6379b74c0038e221db3beee6262f64b8ebcb07592037ac.exe 82 PID 4776 wrote to memory of 1020 4776 3184716a2fece1fc6f6379b74c0038e221db3beee6262f64b8ebcb07592037ac.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\3184716a2fece1fc6f6379b74c0038e221db3beee6262f64b8ebcb07592037ac.exe"C:\Users\Admin\AppData\Local\Temp\3184716a2fece1fc6f6379b74c0038e221db3beee6262f64b8ebcb07592037ac.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\7zS208E.tmp\d1JeAnMjkheXZAe.exe.\d1JeAnMjkheXZAe.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Drops file in Program Files directory
PID:1020
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
610KB
MD58630a0477e33bf7e401c82bb6f0bf9ef
SHA1d1933549c59d151aec77010e665d2e60eb16f24c
SHA25629d95c7d6c79159bbe46dc7c8dded2c2fc74d7a15d36c3ece2f8bbbc06718888
SHA512759b5148b829c44d81d8941a939b1bc17ddef7998cbc03f24e82c49378bbed57298242cf8178587636590d2965f4b45227f62fc95dae98ebffc39b5f0e503832
-
C:\Users\Admin\AppData\Local\Temp\7zS208E.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5df13f711e20e9c80171846d4f2f7ae06
SHA156d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA2566c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA5126c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e
-
C:\Users\Admin\AppData\Local\Temp\7zS208E.tmp\[email protected]\chrome.manifest
Filesize35B
MD5bed35c1429c7475e037e770eec980231
SHA12d6c6e35f8141f9b1bf3d1a2e37e676cff4c9525
SHA256eb2fe59b056600f9885b4667f9f743b1f84cfe4b3f669c1818c5ca03ef1f250f
SHA51222f6dff2246090164780fbb0d7ea412cbfcf80734c4f933f3dd3a19e54969e1f5d2c422739b691d4594b5953e06cbcd27c52634f80836b38fc070cbeff538b44
-
C:\Users\Admin\AppData\Local\Temp\7zS208E.tmp\[email protected]\content\bg.js
Filesize7KB
MD552e76751c9d768fc8f37b26205bcddcb
SHA192b187f96b7aaadb9f63d047671fe8c7cd98a9a5
SHA256a03479f9daec7a6bb3cb38d3ae1e1447702657118f6d6c530d26e3ab98f104ea
SHA5128a0f854a850cf8e6da8ac7119938585f2ac5fa99061780dd8656184b8a06b7c677602e2920dda1851476acf2a48c603737d0e5566d4f57fcb2a83954cb32d772
-
C:\Users\Admin\AppData\Local\Temp\7zS208E.tmp\[email protected]\install.rdf
Filesize607B
MD5cdd9ea50e22868b21102d7300a21d902
SHA1324dd21ee32f10adfda3edbab5840d001b8d66b4
SHA256bb0aba8c46432c53d462c7533433e46206509b1e8fc7bccce5a26d36478ef2bc
SHA5129a23a328805899949382a4e05c3a68cd80b532f55d1be4b1b070c0d4be201503b32ba06a9bd1c049fce702e723786c6078fc2f884c0585a1e9f8e4e15ff74862
-
Filesize
145B
MD5d768ded60afda9afa960a2218855c5ca
SHA1cbb873c368b46bf340eeb9c7c4702ca693a66d24
SHA25608a1fea1d96cb1eab946d597d26cc76bfa2be507b17c7a2e0beee5a703279972
SHA5125b8076cd19cfb1c4d0507aff0e69f8a527c70070944924c9a57071b5b9cc506962d03075dd0821b70bef24162f48b8d573710c4ddccc326194a37b1b009896d6
-
Filesize
144B
MD5fca19198fd8af21016a8b1dec7980002
SHA1fd01a47d14004e17a625efe66cc46a06c786cf40
SHA256332b00395bc23d4cb0bf6506b0fbb7e17d690ed41f91cf9b5d1c481cb1d3e82a
SHA51260f4286b3818f996fab50c09b191fbc82ed1c73b2b98d00b088b5afbbc0368c01819bd3868bd3c6bcb2cd083b719e29c28209317c7411213a25f923cfc1f0e47
-
Filesize
5KB
MD5aee5e2185b0cc479d2c290351e125935
SHA1971b222422e58f98b7f9884b075a6c225f9ae675
SHA25667a90d7058d3d66075e8734beeb644ee44a2b2091b4d08f60c59f6108af4e0c0
SHA512045d0fd861004a22361bb8049fa2fd0ec2c9b5d658dcf4fa816bec91f44ab29ef1514791df09b43aff92921b808cd34fa2a4ccc405c3c4251286ef20516fb476
-
Filesize
531B
MD536d98318ab2b3b2585a30984db328afb
SHA1f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA5126f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a
-
Filesize
508B
MD533c675108f86d80e1d7b36d7cee118c1
SHA149cc5d7c3576200c98021e75b5e44b1891a40faf
SHA256351c77f83bd2750c05c9085b8ac8c1d7b5b842bb477172a391a346e71bef99cd
SHA5122d96052d78744fb8bf13faef5c556058b9e8d41ca998385f421605c9525490be61fc15eca6d1f1ce59c2274b7f3a511f448a11543cee290aed4808e7f08e55c1
-
Filesize
6KB
MD5ac1af2bb907e79fdba20fb7c7cb3931e
SHA17f5a6e7e605b31850eb57d8e514440fa3b790577
SHA256cdf2c7ec2b8efd3b0864174d86666de20c46e06650366dc1f934a63d4cde38e4
SHA512704f02f334c091f1da9bcdfb0a6a4aff5071aab9b0f7c04c17c451e52fdd14c77ece9e1acd614c9b505f4f766a4368eb2613e71beb21faf41e30a363bba6bca7
-
Filesize
629KB
MD505b7b07469fca4597eb03a03eedb19cd
SHA1a0510838e7a5e9977d513c495ba969494c26ffbf
SHA2569254129be296968c1a9705ea7c5d39aa6537245a162543bcc79da756c9cf1ead
SHA5122531eb759bed4dc95cfdc4f4b7b09ecd069f8376ceb6b843ffbce6dd01c6676a9ba130b0153b014678a8c3f74d347bc8313d1cd618e53a0703882d7497648569
-
Filesize
629KB
MD505b7b07469fca4597eb03a03eedb19cd
SHA1a0510838e7a5e9977d513c495ba969494c26ffbf
SHA2569254129be296968c1a9705ea7c5d39aa6537245a162543bcc79da756c9cf1ead
SHA5122531eb759bed4dc95cfdc4f4b7b09ecd069f8376ceb6b843ffbce6dd01c6676a9ba130b0153b014678a8c3f74d347bc8313d1cd618e53a0703882d7497648569
-
Filesize
610KB
MD58630a0477e33bf7e401c82bb6f0bf9ef
SHA1d1933549c59d151aec77010e665d2e60eb16f24c
SHA25629d95c7d6c79159bbe46dc7c8dded2c2fc74d7a15d36c3ece2f8bbbc06718888
SHA512759b5148b829c44d81d8941a939b1bc17ddef7998cbc03f24e82c49378bbed57298242cf8178587636590d2965f4b45227f62fc95dae98ebffc39b5f0e503832
-
Filesize
3KB
MD58956d96d82e1ff91bc7500ec1408070e
SHA1fe73dbb0de2e727dd55073149490e7548826b42d
SHA2564e83e6b729f8dcd42d0e2d8bac469f7cd696e6fbcb6f5edca8b91c3925b9ae5a
SHA5129e8d87d5338d77f573787916500befbc49b93516713ac44fd8e98eb1698421c5ab536bc24071882c5179b6cd75df286c20306bde9bd59b5613f70ac53048ad15