Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    195s
  • max time network
    208s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    28/11/2022, 04:17

General

  • Target

    e555821b5492a3b516940e156657860f00ce034c2149b101e18fb59112ff4905.exe

  • Size

    595KB

  • MD5

    783d2bea764af0c2a775b197a5c2ccc6

  • SHA1

    36f287818b5fb3c703a9b5d6f1790b372b896b68

  • SHA256

    e555821b5492a3b516940e156657860f00ce034c2149b101e18fb59112ff4905

  • SHA512

    781edd5e2c37415cbc386d8af6a09f023794cc1c530ab7ff78cb9952fc4cebfa62b7c881d8158c6bbc4a00a88bf1ec972791d750cc5cd398d88ee1a318e52e0f

  • SSDEEP

    12288:/3k6NsIiLy413Nm2UX+O7FsRYMIAJk8DfCjetsb4XMPfOV:vk6VieGNK+ajMhDfJmb4XeOV

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • NirSoft MailPassView 11 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 11 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 16 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e555821b5492a3b516940e156657860f00ce034c2149b101e18fb59112ff4905.exe
    "C:\Users\Admin\AppData\Local\Temp\e555821b5492a3b516940e156657860f00ce034c2149b101e18fb59112ff4905.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Users\Admin\AppData\Local\Temp\e555821b5492a3b516940e156657860f00ce034c2149b101e18fb59112ff4905.exe
      "C:\Users\Admin\AppData\Local\Temp\e555821b5492a3b516940e156657860f00ce034c2149b101e18fb59112ff4905.exe"
      2⤵
        PID:1548
      • C:\Users\Admin\AppData\Local\Temp\csrss.exe
        "C:\Users\Admin\AppData\Local\Temp\csrss.exe" -keyhide -prochide 1548 -reg C:\Users\Admin\AppData\Local\Temp\e555821b5492a3b516940e156657860f00ce034c2149b101e18fb59112ff4905.exe -proc 1548 C:\Users\Admin\AppData\Local\Temp\e555821b5492a3b516940e156657860f00ce034c2149b101e18fb59112ff4905.exe
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1756
        • C:\Users\Admin\AppData\Local\Temp\e555821b5492a3b516940e156657860f00ce034c2149b101e18fb59112ff4905.exe
          "C:\Users\Admin\AppData\Local\Temp\e555821b5492a3b516940e156657860f00ce034c2149b101e18fb59112ff4905.exe"
          3⤵
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:768
          • C:\Users\Admin\AppData\Local\Temp\e555821b5492a3b516940e156657860f00ce034c2149b101e18fb59112ff4905.exe
            "C:\Users\Admin\AppData\Local\Temp\e555821b5492a3b516940e156657860f00ce034c2149b101e18fb59112ff4905.exe"
            4⤵
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1884
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
              C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
              5⤵
              • Accesses Microsoft Outlook accounts
              PID:1784
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
              C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"
              5⤵
                PID:632
            • C:\Users\Admin\AppData\Local\Temp\csrss.exe
              "C:\Users\Admin\AppData\Local\Temp\csrss.exe" -keyhide -prochide 1884 -reg C:\Users\Admin\AppData\Local\Temp\e555821b5492a3b516940e156657860f00ce034c2149b101e18fb59112ff4905.exe -proc 1884 C:\Users\Admin\AppData\Local\Temp\e555821b5492a3b516940e156657860f00ce034c2149b101e18fb59112ff4905.exe
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1220

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1B1F4BA66CDBFEC85A20E11BF729AF23_0FDA2E67E371AEB03992D56035802B07

        Filesize

        1KB

        MD5

        0b8050814dacc6f1ee8e1f3fdb9f49bc

        SHA1

        d0724eabbc4b7150459696dab7d1c68cf3894da3

        SHA256

        e287141495a2b8e5af2cbe432549011953ebdc121a2bc557a05b019a62b70e1a

        SHA512

        98b57adcf360ef87920c4c9dc10cba1c5ceef89fd9c7a8ec4bded51d196fa7e2ffe8c24926ed36628215cf47df7ad6d37b42b4e3f5867533219536e2b2e343f9

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CE4CFAB51DB3F9AB265C1526D1E6F12F_3E2D1C1422740EC934E275AEAA05CEA6

        Filesize

        1KB

        MD5

        3ea1e94e127129ea14bdb3767e79644e

        SHA1

        5e01bd01de4b3f5eee4552cbaa2cd4902d7194f7

        SHA256

        3592b1d049666fe5a870f317b91f5e151086ccf75c3afb3f49abb77a288a485c

        SHA512

        f4a8b26fa02af820cc0c35174be844b0af0e99dad473e6e65903d04254922e7e18f9eedd2017b85d15495e4c31559895b49d1001851a1f2cfb0db6c108f77a37

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1B1F4BA66CDBFEC85A20E11BF729AF23_0FDA2E67E371AEB03992D56035802B07

        Filesize

        416B

        MD5

        3732d3fb46138267bdac6211c62d3e76

        SHA1

        9be039506fc94a54225e56af9fc9808e2e0292d2

        SHA256

        ec7a801781dd52071a6df04f0d067a6cd772bb672dd81ede0ee3098f1d1bc767

        SHA512

        51f6d5b3516eceb3c860de0f2f66d45ac6e6b059d356344796e58e7c05f15a6dd148d41a65e3358481e5e9cc35283944ee0753b36f226634e903ba4b9126fb45

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1B1F4BA66CDBFEC85A20E11BF729AF23_0FDA2E67E371AEB03992D56035802B07

        Filesize

        416B

        MD5

        3732d3fb46138267bdac6211c62d3e76

        SHA1

        9be039506fc94a54225e56af9fc9808e2e0292d2

        SHA256

        ec7a801781dd52071a6df04f0d067a6cd772bb672dd81ede0ee3098f1d1bc767

        SHA512

        51f6d5b3516eceb3c860de0f2f66d45ac6e6b059d356344796e58e7c05f15a6dd148d41a65e3358481e5e9cc35283944ee0753b36f226634e903ba4b9126fb45

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        3ed6f3ae0b3a34f8ab9b7f8f55d7141d

        SHA1

        5189109095e37515a826a65c9e512ef74925ba06

        SHA256

        a5afc2c116df20f0a31b2d62fe77b52b88a5a358bd2ffa9a8646e34588cc2c9d

        SHA512

        1fc7aee40e5daec00adae59a2f65a437da22c8056dc96dc6f9af0d55d8eb95483eb840f24067eb378aeb3715c6131d0e4c422f5349d3a8308c0eb11f9a19329d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CE4CFAB51DB3F9AB265C1526D1E6F12F_3E2D1C1422740EC934E275AEAA05CEA6

        Filesize

        406B

        MD5

        361dcf929e0ff872ac69d2c34ee83ca4

        SHA1

        fbaf61219f9f626ab9f4c65919b0b6a6f589531e

        SHA256

        21a03cd4f8ce2395ddaa691ef9dfadda179018b3bc2122c5e28f81a8ca6d2d0c

        SHA512

        8a66b57047bbd649cabd23e79045f8bdf06e493fb4805d3fd9f0db8821ca9d9e662d096519231dacc607b6fd5eea80c9b38fc310809275b029285448ff9b572b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CE4CFAB51DB3F9AB265C1526D1E6F12F_3E2D1C1422740EC934E275AEAA05CEA6

        Filesize

        406B

        MD5

        361dcf929e0ff872ac69d2c34ee83ca4

        SHA1

        fbaf61219f9f626ab9f4c65919b0b6a6f589531e

        SHA256

        21a03cd4f8ce2395ddaa691ef9dfadda179018b3bc2122c5e28f81a8ca6d2d0c

        SHA512

        8a66b57047bbd649cabd23e79045f8bdf06e493fb4805d3fd9f0db8821ca9d9e662d096519231dacc607b6fd5eea80c9b38fc310809275b029285448ff9b572b

      • C:\Users\Admin\AppData\Local\Temp\csrss.exe

        Filesize

        595KB

        MD5

        783d2bea764af0c2a775b197a5c2ccc6

        SHA1

        36f287818b5fb3c703a9b5d6f1790b372b896b68

        SHA256

        e555821b5492a3b516940e156657860f00ce034c2149b101e18fb59112ff4905

        SHA512

        781edd5e2c37415cbc386d8af6a09f023794cc1c530ab7ff78cb9952fc4cebfa62b7c881d8158c6bbc4a00a88bf1ec972791d750cc5cd398d88ee1a318e52e0f

      • C:\Users\Admin\AppData\Local\Temp\csrss.exe

        Filesize

        595KB

        MD5

        783d2bea764af0c2a775b197a5c2ccc6

        SHA1

        36f287818b5fb3c703a9b5d6f1790b372b896b68

        SHA256

        e555821b5492a3b516940e156657860f00ce034c2149b101e18fb59112ff4905

        SHA512

        781edd5e2c37415cbc386d8af6a09f023794cc1c530ab7ff78cb9952fc4cebfa62b7c881d8158c6bbc4a00a88bf1ec972791d750cc5cd398d88ee1a318e52e0f

      • C:\Users\Admin\AppData\Local\Temp\csrss.exe

        Filesize

        595KB

        MD5

        783d2bea764af0c2a775b197a5c2ccc6

        SHA1

        36f287818b5fb3c703a9b5d6f1790b372b896b68

        SHA256

        e555821b5492a3b516940e156657860f00ce034c2149b101e18fb59112ff4905

        SHA512

        781edd5e2c37415cbc386d8af6a09f023794cc1c530ab7ff78cb9952fc4cebfa62b7c881d8158c6bbc4a00a88bf1ec972791d750cc5cd398d88ee1a318e52e0f

      • C:\Users\Admin\AppData\Local\Temp\csrss.exe

        Filesize

        595KB

        MD5

        783d2bea764af0c2a775b197a5c2ccc6

        SHA1

        36f287818b5fb3c703a9b5d6f1790b372b896b68

        SHA256

        e555821b5492a3b516940e156657860f00ce034c2149b101e18fb59112ff4905

        SHA512

        781edd5e2c37415cbc386d8af6a09f023794cc1c530ab7ff78cb9952fc4cebfa62b7c881d8158c6bbc4a00a88bf1ec972791d750cc5cd398d88ee1a318e52e0f

      • C:\Users\Admin\AppData\Local\Temp\holderwb.txt

        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • \Users\Admin\AppData\Local\Temp\csrss.exe

        Filesize

        595KB

        MD5

        783d2bea764af0c2a775b197a5c2ccc6

        SHA1

        36f287818b5fb3c703a9b5d6f1790b372b896b68

        SHA256

        e555821b5492a3b516940e156657860f00ce034c2149b101e18fb59112ff4905

        SHA512

        781edd5e2c37415cbc386d8af6a09f023794cc1c530ab7ff78cb9952fc4cebfa62b7c881d8158c6bbc4a00a88bf1ec972791d750cc5cd398d88ee1a318e52e0f

      • \Users\Admin\AppData\Local\Temp\csrss.exe

        Filesize

        595KB

        MD5

        783d2bea764af0c2a775b197a5c2ccc6

        SHA1

        36f287818b5fb3c703a9b5d6f1790b372b896b68

        SHA256

        e555821b5492a3b516940e156657860f00ce034c2149b101e18fb59112ff4905

        SHA512

        781edd5e2c37415cbc386d8af6a09f023794cc1c530ab7ff78cb9952fc4cebfa62b7c881d8158c6bbc4a00a88bf1ec972791d750cc5cd398d88ee1a318e52e0f

      • \Users\Admin\AppData\Local\Temp\csrss.exe

        Filesize

        595KB

        MD5

        783d2bea764af0c2a775b197a5c2ccc6

        SHA1

        36f287818b5fb3c703a9b5d6f1790b372b896b68

        SHA256

        e555821b5492a3b516940e156657860f00ce034c2149b101e18fb59112ff4905

        SHA512

        781edd5e2c37415cbc386d8af6a09f023794cc1c530ab7ff78cb9952fc4cebfa62b7c881d8158c6bbc4a00a88bf1ec972791d750cc5cd398d88ee1a318e52e0f

      • \Users\Admin\AppData\Local\Temp\csrss.exe

        Filesize

        595KB

        MD5

        783d2bea764af0c2a775b197a5c2ccc6

        SHA1

        36f287818b5fb3c703a9b5d6f1790b372b896b68

        SHA256

        e555821b5492a3b516940e156657860f00ce034c2149b101e18fb59112ff4905

        SHA512

        781edd5e2c37415cbc386d8af6a09f023794cc1c530ab7ff78cb9952fc4cebfa62b7c881d8158c6bbc4a00a88bf1ec972791d750cc5cd398d88ee1a318e52e0f

      • memory/632-120-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/632-125-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/632-124-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/632-127-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/768-86-0x0000000075000000-0x00000000755AB000-memory.dmp

        Filesize

        5.7MB

      • memory/768-108-0x0000000075000000-0x00000000755AB000-memory.dmp

        Filesize

        5.7MB

      • memory/1220-109-0x0000000075000000-0x00000000755AB000-memory.dmp

        Filesize

        5.7MB

      • memory/1220-111-0x0000000075000000-0x00000000755AB000-memory.dmp

        Filesize

        5.7MB

      • memory/1308-56-0x0000000075000000-0x00000000755AB000-memory.dmp

        Filesize

        5.7MB

      • memory/1308-54-0x00000000766F1000-0x00000000766F3000-memory.dmp

        Filesize

        8KB

      • memory/1308-73-0x0000000075000000-0x00000000755AB000-memory.dmp

        Filesize

        5.7MB

      • memory/1308-55-0x0000000075000000-0x00000000755AB000-memory.dmp

        Filesize

        5.7MB

      • memory/1548-64-0x0000000000400000-0x0000000000484000-memory.dmp

        Filesize

        528KB

      • memory/1548-58-0x0000000000400000-0x0000000000484000-memory.dmp

        Filesize

        528KB

      • memory/1548-60-0x0000000000400000-0x0000000000484000-memory.dmp

        Filesize

        528KB

      • memory/1548-62-0x0000000000400000-0x0000000000484000-memory.dmp

        Filesize

        528KB

      • memory/1548-57-0x0000000000400000-0x0000000000484000-memory.dmp

        Filesize

        528KB

      • memory/1756-83-0x0000000075000000-0x00000000755AB000-memory.dmp

        Filesize

        5.7MB

      • memory/1756-80-0x0000000075000000-0x00000000755AB000-memory.dmp

        Filesize

        5.7MB

      • memory/1756-79-0x0000000075000000-0x00000000755AB000-memory.dmp

        Filesize

        5.7MB

      • memory/1784-113-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1784-117-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1784-118-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1784-119-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1884-100-0x0000000000400000-0x0000000000484000-memory.dmp

        Filesize

        528KB

      • memory/1884-112-0x0000000075000000-0x00000000755AB000-memory.dmp

        Filesize

        5.7MB

      • memory/1884-110-0x0000000075000000-0x00000000755AB000-memory.dmp

        Filesize

        5.7MB

      • memory/1884-98-0x0000000000400000-0x0000000000484000-memory.dmp

        Filesize

        528KB