Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 11:57

General

  • Target

    9037bcdb122e1ee36abd49614bc06d563f8eeef10a8d70199454f88017aa667b.exe

  • Size

    955KB

  • MD5

    b5ee64488aa5beb3adf36d0d652fa850

  • SHA1

    cbad725f4f100d5d69ce64c08a950b9660d8cac0

  • SHA256

    9037bcdb122e1ee36abd49614bc06d563f8eeef10a8d70199454f88017aa667b

  • SHA512

    660a68ed26777fad4dce546b8b3ec7f5b0b93d002a2d6bcdbb0860afb857e39a91b1cefb6767d6d0fba6d135dff07b16f8e4c6c837242fd85f2fd4fc55c8b99c

  • SSDEEP

    24576:8wFBRvKloOA6wpgPOeqMlXAWdnsIqt365ONmL0lwq:8UvKlHwpgPOeFlQWiIqLNmL0l7

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 61 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9037bcdb122e1ee36abd49614bc06d563f8eeef10a8d70199454f88017aa667b.exe
    "C:\Users\Admin\AppData\Local\Temp\9037bcdb122e1ee36abd49614bc06d563f8eeef10a8d70199454f88017aa667b.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Users\Admin\AppData\Local\Temp\nsdFD07.tmp\questbasic.exe
      "C:\Users\Admin\AppData\Local\Temp\nsdFD07.tmp\questbasic.exe" "C:\Users\Admin\AppData\Local\Temp\nsdFD07.tmp\questbasic.dll" utacopibul "-a " bulamucayefem
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      PID:1712
  • C:\ProgramData\QuestBasic\questbasic117.exe
    "C:\ProgramData\QuestBasic\questbasic117.exe" "C:\Program Files (x86)\QuestBasic\questbasic.dll" jizefare kepilaxun
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Program Files (x86)\QuestBasic\questbasic.exe
      "C:\Program Files (x86)\QuestBasic\questbasic.exe" "C:\Program Files (x86)\QuestBasic\questbasic.dll" mewoyavab eyimewoy
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:1340

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\QuestBasic\questbasic.dll

    Filesize

    868KB

    MD5

    3d03f7a47db29429ef67f4b5c5e8ace8

    SHA1

    2768610835fcce92815920b6feb62cc7f05330ea

    SHA256

    e52dc7cabb0966ba65f3b8e0fcc07cc8f82d8d07f6aa5e636c9ce9dfb63a5de0

    SHA512

    3144dbdae9438720b0f92d05de749fd17b4ca6b787bbaf839b6e33599a8860e1bf6d28dfc78ffd4d04aaf833ffea73d898d971a5aab439e53cee81fccb687101

  • C:\Program Files (x86)\QuestBasic\questbasic.exe

    Filesize

    22KB

    MD5

    d34d69b1b619132fc84320aa3f86d7d2

    SHA1

    18cb9b323cef4ec869092cef99db4e7fafc573fa

    SHA256

    c68d5778fc8da0283deb43cad740b3d4b3df3584c09e1dab4439ce5aa9d9f98b

    SHA512

    218191c8d3b68a53afb2f2a6615520c406fc851a1c5c709df0b7528990afddaf4b684d6e614fc4b70ac5d9c1dc89846290fbd8f4bae8377d5928e9b8b8e65f0c

  • C:\Program Files (x86)\QuestBasic\questbasic.exe

    Filesize

    22KB

    MD5

    d34d69b1b619132fc84320aa3f86d7d2

    SHA1

    18cb9b323cef4ec869092cef99db4e7fafc573fa

    SHA256

    c68d5778fc8da0283deb43cad740b3d4b3df3584c09e1dab4439ce5aa9d9f98b

    SHA512

    218191c8d3b68a53afb2f2a6615520c406fc851a1c5c709df0b7528990afddaf4b684d6e614fc4b70ac5d9c1dc89846290fbd8f4bae8377d5928e9b8b8e65f0c

  • C:\ProgramData\QuestBasic\questbasic117.exe

    Filesize

    22KB

    MD5

    d34d69b1b619132fc84320aa3f86d7d2

    SHA1

    18cb9b323cef4ec869092cef99db4e7fafc573fa

    SHA256

    c68d5778fc8da0283deb43cad740b3d4b3df3584c09e1dab4439ce5aa9d9f98b

    SHA512

    218191c8d3b68a53afb2f2a6615520c406fc851a1c5c709df0b7528990afddaf4b684d6e614fc4b70ac5d9c1dc89846290fbd8f4bae8377d5928e9b8b8e65f0c

  • C:\Users\Admin\AppData\Local\Temp\nsdFD07.tmp\questbasic.dll

    Filesize

    868KB

    MD5

    3d03f7a47db29429ef67f4b5c5e8ace8

    SHA1

    2768610835fcce92815920b6feb62cc7f05330ea

    SHA256

    e52dc7cabb0966ba65f3b8e0fcc07cc8f82d8d07f6aa5e636c9ce9dfb63a5de0

    SHA512

    3144dbdae9438720b0f92d05de749fd17b4ca6b787bbaf839b6e33599a8860e1bf6d28dfc78ffd4d04aaf833ffea73d898d971a5aab439e53cee81fccb687101

  • C:\Users\Admin\AppData\Local\Temp\nsdFD07.tmp\questbasic.exe

    Filesize

    22KB

    MD5

    d34d69b1b619132fc84320aa3f86d7d2

    SHA1

    18cb9b323cef4ec869092cef99db4e7fafc573fa

    SHA256

    c68d5778fc8da0283deb43cad740b3d4b3df3584c09e1dab4439ce5aa9d9f98b

    SHA512

    218191c8d3b68a53afb2f2a6615520c406fc851a1c5c709df0b7528990afddaf4b684d6e614fc4b70ac5d9c1dc89846290fbd8f4bae8377d5928e9b8b8e65f0c

  • C:\Users\Admin\AppData\Local\Temp\nsdFD07.tmp\questbasic.exe

    Filesize

    22KB

    MD5

    d34d69b1b619132fc84320aa3f86d7d2

    SHA1

    18cb9b323cef4ec869092cef99db4e7fafc573fa

    SHA256

    c68d5778fc8da0283deb43cad740b3d4b3df3584c09e1dab4439ce5aa9d9f98b

    SHA512

    218191c8d3b68a53afb2f2a6615520c406fc851a1c5c709df0b7528990afddaf4b684d6e614fc4b70ac5d9c1dc89846290fbd8f4bae8377d5928e9b8b8e65f0c

  • \Program Files (x86)\QuestBasic\questbasic.dll

    Filesize

    868KB

    MD5

    3d03f7a47db29429ef67f4b5c5e8ace8

    SHA1

    2768610835fcce92815920b6feb62cc7f05330ea

    SHA256

    e52dc7cabb0966ba65f3b8e0fcc07cc8f82d8d07f6aa5e636c9ce9dfb63a5de0

    SHA512

    3144dbdae9438720b0f92d05de749fd17b4ca6b787bbaf839b6e33599a8860e1bf6d28dfc78ffd4d04aaf833ffea73d898d971a5aab439e53cee81fccb687101

  • \Program Files (x86)\QuestBasic\questbasic.dll

    Filesize

    868KB

    MD5

    3d03f7a47db29429ef67f4b5c5e8ace8

    SHA1

    2768610835fcce92815920b6feb62cc7f05330ea

    SHA256

    e52dc7cabb0966ba65f3b8e0fcc07cc8f82d8d07f6aa5e636c9ce9dfb63a5de0

    SHA512

    3144dbdae9438720b0f92d05de749fd17b4ca6b787bbaf839b6e33599a8860e1bf6d28dfc78ffd4d04aaf833ffea73d898d971a5aab439e53cee81fccb687101

  • \Program Files (x86)\QuestBasic\questbasic.exe

    Filesize

    22KB

    MD5

    d34d69b1b619132fc84320aa3f86d7d2

    SHA1

    18cb9b323cef4ec869092cef99db4e7fafc573fa

    SHA256

    c68d5778fc8da0283deb43cad740b3d4b3df3584c09e1dab4439ce5aa9d9f98b

    SHA512

    218191c8d3b68a53afb2f2a6615520c406fc851a1c5c709df0b7528990afddaf4b684d6e614fc4b70ac5d9c1dc89846290fbd8f4bae8377d5928e9b8b8e65f0c

  • \Program Files (x86)\QuestBasic\questbasic.exe

    Filesize

    22KB

    MD5

    d34d69b1b619132fc84320aa3f86d7d2

    SHA1

    18cb9b323cef4ec869092cef99db4e7fafc573fa

    SHA256

    c68d5778fc8da0283deb43cad740b3d4b3df3584c09e1dab4439ce5aa9d9f98b

    SHA512

    218191c8d3b68a53afb2f2a6615520c406fc851a1c5c709df0b7528990afddaf4b684d6e614fc4b70ac5d9c1dc89846290fbd8f4bae8377d5928e9b8b8e65f0c

  • \Users\Admin\AppData\Local\Temp\nsdFD07.tmp\questbasic.dll

    Filesize

    868KB

    MD5

    3d03f7a47db29429ef67f4b5c5e8ace8

    SHA1

    2768610835fcce92815920b6feb62cc7f05330ea

    SHA256

    e52dc7cabb0966ba65f3b8e0fcc07cc8f82d8d07f6aa5e636c9ce9dfb63a5de0

    SHA512

    3144dbdae9438720b0f92d05de749fd17b4ca6b787bbaf839b6e33599a8860e1bf6d28dfc78ffd4d04aaf833ffea73d898d971a5aab439e53cee81fccb687101

  • \Users\Admin\AppData\Local\Temp\nsdFD07.tmp\questbasic.exe

    Filesize

    22KB

    MD5

    d34d69b1b619132fc84320aa3f86d7d2

    SHA1

    18cb9b323cef4ec869092cef99db4e7fafc573fa

    SHA256

    c68d5778fc8da0283deb43cad740b3d4b3df3584c09e1dab4439ce5aa9d9f98b

    SHA512

    218191c8d3b68a53afb2f2a6615520c406fc851a1c5c709df0b7528990afddaf4b684d6e614fc4b70ac5d9c1dc89846290fbd8f4bae8377d5928e9b8b8e65f0c

  • \Users\Admin\AppData\Local\Temp\nsdFD07.tmp\questbasic.exe

    Filesize

    22KB

    MD5

    d34d69b1b619132fc84320aa3f86d7d2

    SHA1

    18cb9b323cef4ec869092cef99db4e7fafc573fa

    SHA256

    c68d5778fc8da0283deb43cad740b3d4b3df3584c09e1dab4439ce5aa9d9f98b

    SHA512

    218191c8d3b68a53afb2f2a6615520c406fc851a1c5c709df0b7528990afddaf4b684d6e614fc4b70ac5d9c1dc89846290fbd8f4bae8377d5928e9b8b8e65f0c

  • \Users\Admin\AppData\Local\Temp\nsdFD07.tmp\questbasic.exe

    Filesize

    22KB

    MD5

    d34d69b1b619132fc84320aa3f86d7d2

    SHA1

    18cb9b323cef4ec869092cef99db4e7fafc573fa

    SHA256

    c68d5778fc8da0283deb43cad740b3d4b3df3584c09e1dab4439ce5aa9d9f98b

    SHA512

    218191c8d3b68a53afb2f2a6615520c406fc851a1c5c709df0b7528990afddaf4b684d6e614fc4b70ac5d9c1dc89846290fbd8f4bae8377d5928e9b8b8e65f0c

  • \Users\Admin\AppData\Local\Temp\nsdFD07.tmp\questbasic.exe

    Filesize

    22KB

    MD5

    d34d69b1b619132fc84320aa3f86d7d2

    SHA1

    18cb9b323cef4ec869092cef99db4e7fafc573fa

    SHA256

    c68d5778fc8da0283deb43cad740b3d4b3df3584c09e1dab4439ce5aa9d9f98b

    SHA512

    218191c8d3b68a53afb2f2a6615520c406fc851a1c5c709df0b7528990afddaf4b684d6e614fc4b70ac5d9c1dc89846290fbd8f4bae8377d5928e9b8b8e65f0c

  • \Users\Admin\AppData\Local\Temp\nsdFD07.tmp\questbasic.exe

    Filesize

    22KB

    MD5

    d34d69b1b619132fc84320aa3f86d7d2

    SHA1

    18cb9b323cef4ec869092cef99db4e7fafc573fa

    SHA256

    c68d5778fc8da0283deb43cad740b3d4b3df3584c09e1dab4439ce5aa9d9f98b

    SHA512

    218191c8d3b68a53afb2f2a6615520c406fc851a1c5c709df0b7528990afddaf4b684d6e614fc4b70ac5d9c1dc89846290fbd8f4bae8377d5928e9b8b8e65f0c

  • memory/1340-87-0x0000000001CE0000-0x0000000001DB1000-memory.dmp

    Filesize

    836KB

  • memory/1712-66-0x0000000001E40000-0x0000000001F11000-memory.dmp

    Filesize

    836KB

  • memory/1980-54-0x0000000075981000-0x0000000075983000-memory.dmp

    Filesize

    8KB

  • memory/1996-75-0x00000000009A0000-0x0000000000A71000-memory.dmp

    Filesize

    836KB