Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 11:57
Static task
static1
Behavioral task
behavioral1
Sample
9037bcdb122e1ee36abd49614bc06d563f8eeef10a8d70199454f88017aa667b.exe
Resource
win7-20220812-en
General
-
Target
9037bcdb122e1ee36abd49614bc06d563f8eeef10a8d70199454f88017aa667b.exe
-
Size
955KB
-
MD5
b5ee64488aa5beb3adf36d0d652fa850
-
SHA1
cbad725f4f100d5d69ce64c08a950b9660d8cac0
-
SHA256
9037bcdb122e1ee36abd49614bc06d563f8eeef10a8d70199454f88017aa667b
-
SHA512
660a68ed26777fad4dce546b8b3ec7f5b0b93d002a2d6bcdbb0860afb857e39a91b1cefb6767d6d0fba6d135dff07b16f8e4c6c837242fd85f2fd4fc55c8b99c
-
SSDEEP
24576:8wFBRvKloOA6wpgPOeqMlXAWdnsIqt365ONmL0lwq:8UvKlHwpgPOeFlQWiIqLNmL0l7
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1712 questbasic.exe 1996 questbasic117.exe 1340 questbasic.exe -
Loads dropped DLL 10 IoCs
pid Process 1980 9037bcdb122e1ee36abd49614bc06d563f8eeef10a8d70199454f88017aa667b.exe 1980 9037bcdb122e1ee36abd49614bc06d563f8eeef10a8d70199454f88017aa667b.exe 1712 questbasic.exe 1712 questbasic.exe 1712 questbasic.exe 1712 questbasic.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1340 questbasic.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\QuestBasic\questbasic.dll questbasic.exe File opened for modification C:\Program Files (x86)\QuestBasic\questbasic.dll questbasic.exe File created C:\Program Files (x86)\QuestBasic\questbasic.exe questbasic.exe File created C:\Program Files (x86)\QuestBasic\uninstall.exe 9037bcdb122e1ee36abd49614bc06d563f8eeef10a8d70199454f88017aa667b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\SearchScopes questbasic.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\SearchScopes\{86F14831-D88C-4BC8-B871-C8FB24D95D9B} questbasic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\SearchScopes\{86F14831-D88C-4BC8-B871-C8FB24D95D9B}\DisplayName = "QuestBasic" questbasic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\SearchScopes\{86F14831-D88C-4BC8-B871-C8FB24D95D9B}\URL = "http://www.questbasic.com/?prt=QUESTBASIC117&keywords={searchTerms}" questbasic.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} questbasic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\TopResultURLFallback.Save = "http://www.bing.com/search?q={searchTerms}&src=IE-TopResult&FORM=IETR02" questbasic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\TopResultURLFallback = "http://www.questbasic.com/?tmp=redir_bho_bing&dist=0&prt=QUESTBASIC117&keywords={searchTerms}" questbasic.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\SearchScopes\{86F14831-D88C-4BC8-B871-C8FB24D95D9B}\TopResultURLFallback = "http://www.questbasic.com/?tmp=redir_bho_bing&dist=0&prt=QUESTBASIC117&keywords={searchTerms}" questbasic.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
pid Process 1712 questbasic.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe 1996 questbasic117.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1340 questbasic.exe 1340 questbasic.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1980 wrote to memory of 1712 1980 9037bcdb122e1ee36abd49614bc06d563f8eeef10a8d70199454f88017aa667b.exe 28 PID 1980 wrote to memory of 1712 1980 9037bcdb122e1ee36abd49614bc06d563f8eeef10a8d70199454f88017aa667b.exe 28 PID 1980 wrote to memory of 1712 1980 9037bcdb122e1ee36abd49614bc06d563f8eeef10a8d70199454f88017aa667b.exe 28 PID 1980 wrote to memory of 1712 1980 9037bcdb122e1ee36abd49614bc06d563f8eeef10a8d70199454f88017aa667b.exe 28 PID 1980 wrote to memory of 1712 1980 9037bcdb122e1ee36abd49614bc06d563f8eeef10a8d70199454f88017aa667b.exe 28 PID 1980 wrote to memory of 1712 1980 9037bcdb122e1ee36abd49614bc06d563f8eeef10a8d70199454f88017aa667b.exe 28 PID 1980 wrote to memory of 1712 1980 9037bcdb122e1ee36abd49614bc06d563f8eeef10a8d70199454f88017aa667b.exe 28 PID 1996 wrote to memory of 1340 1996 questbasic117.exe 30 PID 1996 wrote to memory of 1340 1996 questbasic117.exe 30 PID 1996 wrote to memory of 1340 1996 questbasic117.exe 30 PID 1996 wrote to memory of 1340 1996 questbasic117.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9037bcdb122e1ee36abd49614bc06d563f8eeef10a8d70199454f88017aa667b.exe"C:\Users\Admin\AppData\Local\Temp\9037bcdb122e1ee36abd49614bc06d563f8eeef10a8d70199454f88017aa667b.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\nsdFD07.tmp\questbasic.exe"C:\Users\Admin\AppData\Local\Temp\nsdFD07.tmp\questbasic.exe" "C:\Users\Admin\AppData\Local\Temp\nsdFD07.tmp\questbasic.dll" utacopibul "-a " bulamucayefem2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1712
-
-
C:\ProgramData\QuestBasic\questbasic117.exe"C:\ProgramData\QuestBasic\questbasic117.exe" "C:\Program Files (x86)\QuestBasic\questbasic.dll" jizefare kepilaxun1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files (x86)\QuestBasic\questbasic.exe"C:\Program Files (x86)\QuestBasic\questbasic.exe" "C:\Program Files (x86)\QuestBasic\questbasic.dll" mewoyavab eyimewoy2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1340
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
868KB
MD53d03f7a47db29429ef67f4b5c5e8ace8
SHA12768610835fcce92815920b6feb62cc7f05330ea
SHA256e52dc7cabb0966ba65f3b8e0fcc07cc8f82d8d07f6aa5e636c9ce9dfb63a5de0
SHA5123144dbdae9438720b0f92d05de749fd17b4ca6b787bbaf839b6e33599a8860e1bf6d28dfc78ffd4d04aaf833ffea73d898d971a5aab439e53cee81fccb687101
-
Filesize
22KB
MD5d34d69b1b619132fc84320aa3f86d7d2
SHA118cb9b323cef4ec869092cef99db4e7fafc573fa
SHA256c68d5778fc8da0283deb43cad740b3d4b3df3584c09e1dab4439ce5aa9d9f98b
SHA512218191c8d3b68a53afb2f2a6615520c406fc851a1c5c709df0b7528990afddaf4b684d6e614fc4b70ac5d9c1dc89846290fbd8f4bae8377d5928e9b8b8e65f0c
-
Filesize
22KB
MD5d34d69b1b619132fc84320aa3f86d7d2
SHA118cb9b323cef4ec869092cef99db4e7fafc573fa
SHA256c68d5778fc8da0283deb43cad740b3d4b3df3584c09e1dab4439ce5aa9d9f98b
SHA512218191c8d3b68a53afb2f2a6615520c406fc851a1c5c709df0b7528990afddaf4b684d6e614fc4b70ac5d9c1dc89846290fbd8f4bae8377d5928e9b8b8e65f0c
-
Filesize
22KB
MD5d34d69b1b619132fc84320aa3f86d7d2
SHA118cb9b323cef4ec869092cef99db4e7fafc573fa
SHA256c68d5778fc8da0283deb43cad740b3d4b3df3584c09e1dab4439ce5aa9d9f98b
SHA512218191c8d3b68a53afb2f2a6615520c406fc851a1c5c709df0b7528990afddaf4b684d6e614fc4b70ac5d9c1dc89846290fbd8f4bae8377d5928e9b8b8e65f0c
-
Filesize
868KB
MD53d03f7a47db29429ef67f4b5c5e8ace8
SHA12768610835fcce92815920b6feb62cc7f05330ea
SHA256e52dc7cabb0966ba65f3b8e0fcc07cc8f82d8d07f6aa5e636c9ce9dfb63a5de0
SHA5123144dbdae9438720b0f92d05de749fd17b4ca6b787bbaf839b6e33599a8860e1bf6d28dfc78ffd4d04aaf833ffea73d898d971a5aab439e53cee81fccb687101
-
Filesize
22KB
MD5d34d69b1b619132fc84320aa3f86d7d2
SHA118cb9b323cef4ec869092cef99db4e7fafc573fa
SHA256c68d5778fc8da0283deb43cad740b3d4b3df3584c09e1dab4439ce5aa9d9f98b
SHA512218191c8d3b68a53afb2f2a6615520c406fc851a1c5c709df0b7528990afddaf4b684d6e614fc4b70ac5d9c1dc89846290fbd8f4bae8377d5928e9b8b8e65f0c
-
Filesize
22KB
MD5d34d69b1b619132fc84320aa3f86d7d2
SHA118cb9b323cef4ec869092cef99db4e7fafc573fa
SHA256c68d5778fc8da0283deb43cad740b3d4b3df3584c09e1dab4439ce5aa9d9f98b
SHA512218191c8d3b68a53afb2f2a6615520c406fc851a1c5c709df0b7528990afddaf4b684d6e614fc4b70ac5d9c1dc89846290fbd8f4bae8377d5928e9b8b8e65f0c
-
Filesize
868KB
MD53d03f7a47db29429ef67f4b5c5e8ace8
SHA12768610835fcce92815920b6feb62cc7f05330ea
SHA256e52dc7cabb0966ba65f3b8e0fcc07cc8f82d8d07f6aa5e636c9ce9dfb63a5de0
SHA5123144dbdae9438720b0f92d05de749fd17b4ca6b787bbaf839b6e33599a8860e1bf6d28dfc78ffd4d04aaf833ffea73d898d971a5aab439e53cee81fccb687101
-
Filesize
868KB
MD53d03f7a47db29429ef67f4b5c5e8ace8
SHA12768610835fcce92815920b6feb62cc7f05330ea
SHA256e52dc7cabb0966ba65f3b8e0fcc07cc8f82d8d07f6aa5e636c9ce9dfb63a5de0
SHA5123144dbdae9438720b0f92d05de749fd17b4ca6b787bbaf839b6e33599a8860e1bf6d28dfc78ffd4d04aaf833ffea73d898d971a5aab439e53cee81fccb687101
-
Filesize
22KB
MD5d34d69b1b619132fc84320aa3f86d7d2
SHA118cb9b323cef4ec869092cef99db4e7fafc573fa
SHA256c68d5778fc8da0283deb43cad740b3d4b3df3584c09e1dab4439ce5aa9d9f98b
SHA512218191c8d3b68a53afb2f2a6615520c406fc851a1c5c709df0b7528990afddaf4b684d6e614fc4b70ac5d9c1dc89846290fbd8f4bae8377d5928e9b8b8e65f0c
-
Filesize
22KB
MD5d34d69b1b619132fc84320aa3f86d7d2
SHA118cb9b323cef4ec869092cef99db4e7fafc573fa
SHA256c68d5778fc8da0283deb43cad740b3d4b3df3584c09e1dab4439ce5aa9d9f98b
SHA512218191c8d3b68a53afb2f2a6615520c406fc851a1c5c709df0b7528990afddaf4b684d6e614fc4b70ac5d9c1dc89846290fbd8f4bae8377d5928e9b8b8e65f0c
-
Filesize
868KB
MD53d03f7a47db29429ef67f4b5c5e8ace8
SHA12768610835fcce92815920b6feb62cc7f05330ea
SHA256e52dc7cabb0966ba65f3b8e0fcc07cc8f82d8d07f6aa5e636c9ce9dfb63a5de0
SHA5123144dbdae9438720b0f92d05de749fd17b4ca6b787bbaf839b6e33599a8860e1bf6d28dfc78ffd4d04aaf833ffea73d898d971a5aab439e53cee81fccb687101
-
Filesize
22KB
MD5d34d69b1b619132fc84320aa3f86d7d2
SHA118cb9b323cef4ec869092cef99db4e7fafc573fa
SHA256c68d5778fc8da0283deb43cad740b3d4b3df3584c09e1dab4439ce5aa9d9f98b
SHA512218191c8d3b68a53afb2f2a6615520c406fc851a1c5c709df0b7528990afddaf4b684d6e614fc4b70ac5d9c1dc89846290fbd8f4bae8377d5928e9b8b8e65f0c
-
Filesize
22KB
MD5d34d69b1b619132fc84320aa3f86d7d2
SHA118cb9b323cef4ec869092cef99db4e7fafc573fa
SHA256c68d5778fc8da0283deb43cad740b3d4b3df3584c09e1dab4439ce5aa9d9f98b
SHA512218191c8d3b68a53afb2f2a6615520c406fc851a1c5c709df0b7528990afddaf4b684d6e614fc4b70ac5d9c1dc89846290fbd8f4bae8377d5928e9b8b8e65f0c
-
Filesize
22KB
MD5d34d69b1b619132fc84320aa3f86d7d2
SHA118cb9b323cef4ec869092cef99db4e7fafc573fa
SHA256c68d5778fc8da0283deb43cad740b3d4b3df3584c09e1dab4439ce5aa9d9f98b
SHA512218191c8d3b68a53afb2f2a6615520c406fc851a1c5c709df0b7528990afddaf4b684d6e614fc4b70ac5d9c1dc89846290fbd8f4bae8377d5928e9b8b8e65f0c
-
Filesize
22KB
MD5d34d69b1b619132fc84320aa3f86d7d2
SHA118cb9b323cef4ec869092cef99db4e7fafc573fa
SHA256c68d5778fc8da0283deb43cad740b3d4b3df3584c09e1dab4439ce5aa9d9f98b
SHA512218191c8d3b68a53afb2f2a6615520c406fc851a1c5c709df0b7528990afddaf4b684d6e614fc4b70ac5d9c1dc89846290fbd8f4bae8377d5928e9b8b8e65f0c
-
Filesize
22KB
MD5d34d69b1b619132fc84320aa3f86d7d2
SHA118cb9b323cef4ec869092cef99db4e7fafc573fa
SHA256c68d5778fc8da0283deb43cad740b3d4b3df3584c09e1dab4439ce5aa9d9f98b
SHA512218191c8d3b68a53afb2f2a6615520c406fc851a1c5c709df0b7528990afddaf4b684d6e614fc4b70ac5d9c1dc89846290fbd8f4bae8377d5928e9b8b8e65f0c