Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    191s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    28/11/2022, 06:04

General

  • Target

    7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe

  • Size

    183KB

  • MD5

    65acc5a3a0c9b7aad29e3d3ff64691a7

  • SHA1

    3e12eb0c6a4032b44008ff7f23b9ded73b8d06ae

  • SHA256

    7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914

  • SHA512

    aec411b23bb254f81620d29327a8661a57deccf0abae498980fd6bd3ee8831dd6e0b3fa3fbb165764389a4e3d2a74f0ce4af470a28b220efc1d7dc710ce48553

  • SSDEEP

    3072:6pMG+JvtcknLUAiow8j5pLxiASDTVnrTOvBnRltfjx37Wfzg1pNVjW:mMbRukLcled2TtrsBpV7Wfzg1DVi

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1268
      • C:\Users\Admin\AppData\Local\Temp\7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe
        "C:\Users\Admin\AppData\Local\Temp\7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1376
        • C:\Users\Admin\AppData\Local\Temp\7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe
          C:\Users\Admin\AppData\Local\Temp\7e1a6f277aa6da8ba642970267c1f6921dc2a075442b6b4069a3af9439b95914.exe
          3⤵
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Modifies Internet Explorer settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:940
          • C:\Users\Admin\AppData\Roaming\Weuzca\xiakb.exe
            "C:\Users\Admin\AppData\Roaming\Weuzca\xiakb.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1400
            • C:\Users\Admin\AppData\Roaming\Weuzca\xiakb.exe
              C:\Users\Admin\AppData\Roaming\Weuzca\xiakb.exe
              5⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:680
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpf27566a2.bat"
            4⤵
            • Deletes itself
            • Suspicious use of AdjustPrivilegeToken
            PID:972
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1192
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1124
        • C:\Windows\system32\conhost.exe
          \??\C:\Windows\system32\conhost.exe "1859174906-6570579231492835977-18459092971135926192-177466481660024591-773999302"
          1⤵
            PID:1968
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            1⤵
              PID:292
            • C:\Program Files\Windows Mail\WinMail.exe
              "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
              1⤵
              • NTFS ADS
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of SetWindowsHookEx
              PID:1704
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
              1⤵
                PID:1172
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                1⤵
                  PID:996
                • C:\Windows\system32\DllHost.exe
                  C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                  1⤵
                    PID:1908
                  • C:\Windows\system32\DllHost.exe
                    C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                    1⤵
                      PID:1464

                    Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\tmpf27566a2.bat

                      Filesize

                      307B

                      MD5

                      d2bd14d701b5423566a6d321c0da180e

                      SHA1

                      83db0cd3f2e1fde15f5d5ba95c350ee952774ea5

                      SHA256

                      5ae6d419bce19015112823888109d70c2c97efcd23e46518cc9dcb881a23f7fc

                      SHA512

                      c67d1bb7d1f62c2eaa578f580d4eb097017ba779e47d51f579fdd81fa9b041d62c31c3d6f5d3cc2a95eec261e95a4305453abf3858aa66e4962f123b50fdd4e8

                    • C:\Users\Admin\AppData\Roaming\Izavhi\pexu.deo

                      Filesize

                      421B

                      MD5

                      5521ab188e3c3b236812bdc4417d404b

                      SHA1

                      bfafe028a185b243ab610e05f20be4c7ecf5af90

                      SHA256

                      ea081ba38bda0ff7ef71cf57ccf9bd689ce9a5ed4dcc3935283035b51b1c5612

                      SHA512

                      fb27689857590b5d2905d1d37099a47dc6a7dd7b5933d86e51840670f58a28fd256264b8a7d1600b4f8cdfb81bbd326cd50c6f1bc772e35ef1c7c2db929ea9de

                    • C:\Users\Admin\AppData\Roaming\Izavhi\pexu.deo

                      Filesize

                      842B

                      MD5

                      ccca7c03aadf27000d72ca88c53a2847

                      SHA1

                      451113bea31fa440fda05e6b5d7ad3e68c7d5a35

                      SHA256

                      5d6290da21200a7db303859588664dd50e9155129006d1c5da387ae0c6eb3aad

                      SHA512

                      996d3abfeae26014be8e48473603eaa11de5d12e75af51f2d4a6a7242e36161a070ca133469c0cd6ed51419f704114ab233ca4a53ac5da8f3c0650d9e1e7e5d8

                    • C:\Users\Admin\AppData\Roaming\Weuzca\xiakb.exe

                      Filesize

                      183KB

                      MD5

                      994cbe1da3e61c8f1f0eb6b9125ced2f

                      SHA1

                      878b32279eaade5a83d21f03f2056425ef6d592a

                      SHA256

                      f362a0800cc899872bc04111e2b3a682d5280d674dbba43013f914a35fd7bee3

                      SHA512

                      36b621c5ed381e1a271f356e17f52793523a7bd7d53e825d8b7d087cc86e4f524bf3e11a63a72ff25993bd55fc927117110d00c2d85be2e3f9ae2b8ddab21687

                    • C:\Users\Admin\AppData\Roaming\Weuzca\xiakb.exe

                      Filesize

                      183KB

                      MD5

                      994cbe1da3e61c8f1f0eb6b9125ced2f

                      SHA1

                      878b32279eaade5a83d21f03f2056425ef6d592a

                      SHA256

                      f362a0800cc899872bc04111e2b3a682d5280d674dbba43013f914a35fd7bee3

                      SHA512

                      36b621c5ed381e1a271f356e17f52793523a7bd7d53e825d8b7d087cc86e4f524bf3e11a63a72ff25993bd55fc927117110d00c2d85be2e3f9ae2b8ddab21687

                    • C:\Users\Admin\AppData\Roaming\Weuzca\xiakb.exe

                      Filesize

                      183KB

                      MD5

                      994cbe1da3e61c8f1f0eb6b9125ced2f

                      SHA1

                      878b32279eaade5a83d21f03f2056425ef6d592a

                      SHA256

                      f362a0800cc899872bc04111e2b3a682d5280d674dbba43013f914a35fd7bee3

                      SHA512

                      36b621c5ed381e1a271f356e17f52793523a7bd7d53e825d8b7d087cc86e4f524bf3e11a63a72ff25993bd55fc927117110d00c2d85be2e3f9ae2b8ddab21687

                    • \Users\Admin\AppData\Roaming\Weuzca\xiakb.exe

                      Filesize

                      183KB

                      MD5

                      994cbe1da3e61c8f1f0eb6b9125ced2f

                      SHA1

                      878b32279eaade5a83d21f03f2056425ef6d592a

                      SHA256

                      f362a0800cc899872bc04111e2b3a682d5280d674dbba43013f914a35fd7bee3

                      SHA512

                      36b621c5ed381e1a271f356e17f52793523a7bd7d53e825d8b7d087cc86e4f524bf3e11a63a72ff25993bd55fc927117110d00c2d85be2e3f9ae2b8ddab21687

                    • \Users\Admin\AppData\Roaming\Weuzca\xiakb.exe

                      Filesize

                      183KB

                      MD5

                      994cbe1da3e61c8f1f0eb6b9125ced2f

                      SHA1

                      878b32279eaade5a83d21f03f2056425ef6d592a

                      SHA256

                      f362a0800cc899872bc04111e2b3a682d5280d674dbba43013f914a35fd7bee3

                      SHA512

                      36b621c5ed381e1a271f356e17f52793523a7bd7d53e825d8b7d087cc86e4f524bf3e11a63a72ff25993bd55fc927117110d00c2d85be2e3f9ae2b8ddab21687

                    • memory/680-89-0x0000000000400000-0x0000000000439000-memory.dmp

                      Filesize

                      228KB

                    • memory/680-251-0x0000000000400000-0x0000000000439000-memory.dmp

                      Filesize

                      228KB

                    • memory/940-63-0x0000000075B61000-0x0000000075B63000-memory.dmp

                      Filesize

                      8KB

                    • memory/940-57-0x0000000000400000-0x0000000000439000-memory.dmp

                      Filesize

                      228KB

                    • memory/940-64-0x0000000000400000-0x0000000000439000-memory.dmp

                      Filesize

                      228KB

                    • memory/940-103-0x0000000000290000-0x00000000002C9000-memory.dmp

                      Filesize

                      228KB

                    • memory/940-60-0x0000000000400000-0x0000000000439000-memory.dmp

                      Filesize

                      228KB

                    • memory/940-58-0x0000000000400000-0x0000000000439000-memory.dmp

                      Filesize

                      228KB

                    • memory/940-69-0x0000000000400000-0x0000000000439000-memory.dmp

                      Filesize

                      228KB

                    • memory/940-244-0x0000000000400000-0x0000000000439000-memory.dmp

                      Filesize

                      228KB

                    • memory/940-55-0x0000000000400000-0x0000000000439000-memory.dmp

                      Filesize

                      228KB

                    • memory/940-54-0x0000000000400000-0x0000000000439000-memory.dmp

                      Filesize

                      228KB

                    • memory/940-108-0x0000000000290000-0x00000000002C4000-memory.dmp

                      Filesize

                      208KB

                    • memory/940-107-0x0000000000290000-0x00000000002C9000-memory.dmp

                      Filesize

                      228KB

                    • memory/940-106-0x0000000000290000-0x00000000002C9000-memory.dmp

                      Filesize

                      228KB

                    • memory/940-105-0x0000000000290000-0x00000000002C9000-memory.dmp

                      Filesize

                      228KB

                    • memory/940-104-0x0000000000290000-0x00000000002C9000-memory.dmp

                      Filesize

                      228KB

                    • memory/972-130-0x0000000000050000-0x0000000000089000-memory.dmp

                      Filesize

                      228KB

                    • memory/972-299-0x0000000000050000-0x0000000000089000-memory.dmp

                      Filesize

                      228KB

                    • memory/972-259-0x0000000000050000-0x0000000000089000-memory.dmp

                      Filesize

                      228KB

                    • memory/972-242-0x0000000000050000-0x0000000000089000-memory.dmp

                      Filesize

                      228KB

                    • memory/972-128-0x0000000000050000-0x0000000000089000-memory.dmp

                      Filesize

                      228KB

                    • memory/972-126-0x0000000000050000-0x0000000000089000-memory.dmp

                      Filesize

                      228KB

                    • memory/972-124-0x0000000000050000-0x0000000000089000-memory.dmp

                      Filesize

                      228KB

                    • memory/972-111-0x0000000000050000-0x0000000000089000-memory.dmp

                      Filesize

                      228KB

                    • memory/972-113-0x0000000000050000-0x0000000000089000-memory.dmp

                      Filesize

                      228KB

                    • memory/972-114-0x0000000000050000-0x0000000000089000-memory.dmp

                      Filesize

                      228KB

                    • memory/972-115-0x0000000000050000-0x0000000000089000-memory.dmp

                      Filesize

                      228KB

                    • memory/972-122-0x0000000000050000-0x0000000000089000-memory.dmp

                      Filesize

                      228KB

                    • memory/972-118-0x0000000000050000-0x0000000000089000-memory.dmp

                      Filesize

                      228KB

                    • memory/972-120-0x0000000000050000-0x0000000000089000-memory.dmp

                      Filesize

                      228KB

                    • memory/1124-84-0x0000000001E00000-0x0000000001E39000-memory.dmp

                      Filesize

                      228KB

                    • memory/1124-87-0x0000000001E00000-0x0000000001E39000-memory.dmp

                      Filesize

                      228KB

                    • memory/1124-86-0x0000000001E00000-0x0000000001E39000-memory.dmp

                      Filesize

                      228KB

                    • memory/1124-85-0x0000000001E00000-0x0000000001E39000-memory.dmp

                      Filesize

                      228KB

                    • memory/1192-92-0x0000000001AD0000-0x0000000001B09000-memory.dmp

                      Filesize

                      228KB

                    • memory/1192-93-0x0000000001AD0000-0x0000000001B09000-memory.dmp

                      Filesize

                      228KB

                    • memory/1192-94-0x0000000001AD0000-0x0000000001B09000-memory.dmp

                      Filesize

                      228KB

                    • memory/1192-91-0x0000000001AD0000-0x0000000001B09000-memory.dmp

                      Filesize

                      228KB

                    • memory/1268-100-0x0000000002BB0000-0x0000000002BE9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1268-97-0x0000000002BB0000-0x0000000002BE9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1268-98-0x0000000002BB0000-0x0000000002BE9000-memory.dmp

                      Filesize

                      228KB

                    • memory/1268-99-0x0000000002BB0000-0x0000000002BE9000-memory.dmp

                      Filesize

                      228KB