Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    42s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 11:31

General

  • Target

    b4a3335cae2be7af9c2d6bc44bbf67f9f9672dc0489bd86187a6ca738a84f93a.exe

  • Size

    250KB

  • MD5

    72eeae5ba1856881853246542df071f8

  • SHA1

    5d6d5e2a3624871f2a22f921a8e36f46a387c04d

  • SHA256

    b4a3335cae2be7af9c2d6bc44bbf67f9f9672dc0489bd86187a6ca738a84f93a

  • SHA512

    cfbc599c2b01e4da7c8e2b03f2f7450ae006be76ed1f3bec32fdac217d7ee105da1b65feb82c5388c166c5a9a809e66b56656f76a81005fdbd7ada2265c8a159

  • SSDEEP

    6144:h1OgDPdkBAFZWjadD4s59n3+D8tdIYkGcZccK5eggsb:h1OgLdaO93+7YPAYvpb

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 8 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4a3335cae2be7af9c2d6bc44bbf67f9f9672dc0489bd86187a6ca738a84f93a.exe
    "C:\Users\Admin\AppData\Local\Temp\b4a3335cae2be7af9c2d6bc44bbf67f9f9672dc0489bd86187a6ca738a84f93a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1092
    • C:\Users\Admin\AppData\Local\Temp\7zSF7C.tmp\5074411009c45.exe
      .\5074411009c45.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:1508

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zSF7C.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    10ca03dc9b5f6aeb64e32bb38f0ac4a9

    SHA1

    ccce57fb0984c334af6c65590ff7650af98e5498

    SHA256

    28d189bddb74a64f7bb0ecd2530fa1dbb3db978d191672533db6964b00500232

    SHA512

    f400e6e82439e7fbb99751b592d248e6ba956186b775ed89c93a21a83e20790fbdc576d2a661eb1e2e5ac2c9902e434754e28a52676e6bebf9a0bcacb4e2c474

  • C:\Users\Admin\AppData\Local\Temp\7zSF7C.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    ffb5a5569247450013790d60ccbe08b6

    SHA1

    8b85c666040914e3ddc48c1e6f2e30dd81a4d4ed

    SHA256

    d4fcacadfea28f55fc0f6fe3a8866d533989cdf9c789808c0d73eb897c788a42

    SHA512

    34fcaffb2b6afdaec4521d0cca6406cc0bdce0dc9b76ed944782053902ebd2fcad0bc4a3a85cf55944a5adb9e9e645cb0f9834016654a148a806d2ee72ed91c7

  • C:\Users\Admin\AppData\Local\Temp\7zSF7C.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    85983613a2a912060eeeb0c377097cb2

    SHA1

    a83f4a7a62e80a9db08fdf8e306ec31d0ece0c19

    SHA256

    6e94d0338d2d23938805a05e4eca4291d6da73fd5ba0593df942933285af1848

    SHA512

    5a4dfc0e59d0112492ac6189f8a00ae8882dd3ed94754f32873bf25f1bc8953b381c1a89cbcb8894db1c42d65ea1321f4f2d57a81debd14ea58d4ee998469904

  • C:\Users\Admin\AppData\Local\Temp\7zSF7C.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    1b698c18b6038cc855ac28c11ee06f52

    SHA1

    93ceb9c558ba294be5899548d4ceb770ca905d6f

    SHA256

    9784d2cc415fbf7ae1eeeaffa2ce9daeb81aa987d941fcbd12732289c36f096c

    SHA512

    f031d2d35cfe9d2dfd2fb80b46cb375df45051ede4ca81252532397847c9b23836125b87882d8c77c282a951064cb16bd830b88c33289375a515eab12f3c127f

  • C:\Users\Admin\AppData\Local\Temp\7zSF7C.tmp\[email protected]\install.rdf

    Filesize

    718B

    MD5

    af662523da94359686c1c92cbc8099cd

    SHA1

    274794ecfef1d5ecdc0b3222eb814c0e24af553e

    SHA256

    b050dccdc29fda169932bb15d0167472de41fb21982b4459a5a4091264433ff8

    SHA512

    d2d30a9d82d271d78c38ea16748985fa4c4b0abdcf6cb22a7ce2511559c417227c1669ef958ee77adda7fc4aff58b8a16678f8da3a6f696d7a961ee49cae03a7

  • C:\Users\Admin\AppData\Local\Temp\7zSF7C.tmp\5074411009c45.exe

    Filesize

    65KB

    MD5

    f65ffdc5fabb1cf7fc445dcad516b886

    SHA1

    db3efc8283a6963a837a2a44b82996f9995f4c7f

    SHA256

    e0571dcebce27429729cd4468016107e9b6296dd5086b186c15527f04bf605ac

    SHA512

    3dd702ba37d816bc2127af5f4bc751937937f4d04c273daf910ea6ea509908c63fb0eec827fa7dcbf4f89df821fa7fc24595fafccbf30b77ed36d89eb1f9a8f0

  • C:\Users\Admin\AppData\Local\Temp\7zSF7C.tmp\5074411009c45.exe

    Filesize

    65KB

    MD5

    f65ffdc5fabb1cf7fc445dcad516b886

    SHA1

    db3efc8283a6963a837a2a44b82996f9995f4c7f

    SHA256

    e0571dcebce27429729cd4468016107e9b6296dd5086b186c15527f04bf605ac

    SHA512

    3dd702ba37d816bc2127af5f4bc751937937f4d04c273daf910ea6ea509908c63fb0eec827fa7dcbf4f89df821fa7fc24595fafccbf30b77ed36d89eb1f9a8f0

  • C:\Users\Admin\AppData\Local\Temp\7zSF7C.tmp\5074411009c7d.ocx

    Filesize

    151KB

    MD5

    c78c6140cb88ef4dc94f999291bb5ab1

    SHA1

    65b47ed5ec889e0e558c79a13a81193fc59b8ce9

    SHA256

    6cfc7fb43715fb13c53ab2a29b68f3a0a0f285c85d1b1443f2c5e73526646851

    SHA512

    ac8865cb1bec889ba493cad3f4c4bac87bfb2fdb15c518626ffa5f8ac6799a6f5c84f358d3e7d35824d6aba29af46c1078acdf30c3bd93981be61312baf6bd26

  • C:\Users\Admin\AppData\Local\Temp\7zSF7C.tmp\5074411009cb6.html

    Filesize

    4KB

    MD5

    dab59afbcda80ad7cc5e788a154e7e23

    SHA1

    eea894dc9bd7eb52de544d7dcbcb70c2a3058863

    SHA256

    2424b2dead262b473e1e0437c6dfd41b31b0c4a0733388b41e26364d09080a0d

    SHA512

    5b374b2be73d98d7328dd850f1f226903b7885dc7a41ad496ac9379cb694bdf8ac482bb334bc7faa14ff9ffa27c4a82eb42472188a47f110e132c5702ac61f65

  • C:\Users\Admin\AppData\Local\Temp\7zSF7C.tmp\5074411009cee.js

    Filesize

    9B

    MD5

    99fa5d714d971a49b67de27e0d8871be

    SHA1

    d0621e846ea60fa8d0b2c8e622e495af49cd7359

    SHA256

    f560d76474380da948a0c5ab8682dc026822d9685268c592f315224b1b968bf6

    SHA512

    2fec19e4f2a974227922a7e057890141523ae73fbfa127f9e8cd00dff71b29abb93cb865c6d74ecf3df8bca440c558d4fbf2f80e82cc9636320ab5edb95ebad5

  • C:\Users\Admin\AppData\Local\Temp\7zSF7C.tmp\gdklgpldbhfdmbcpadkdehbaigblalih.crx

    Filesize

    7KB

    MD5

    e9934d2d1f44d8d836320c0bad83f495

    SHA1

    f85f66414efb58f7b9e4057902fd8af8114e66b9

    SHA256

    894f1266d7c6129d3ea2b4b4df5c78a5065061b12ab26af213d2f56d164a881d

    SHA512

    59d429fd09bc7c3c90484992fea4691ab8f7568bd2cd21e71719f99d53be4e8f9ea5e51474a436d4216519de5b7e21db9e4c5f6124270774f3a1de20c8c75413

  • C:\Users\Admin\AppData\Local\Temp\7zSF7C.tmp\settings.ini

    Filesize

    922B

    MD5

    765587212defedd92c6b198d4f12c35f

    SHA1

    56f4054efa4f51c104c7e8e93577578d0d30d902

    SHA256

    a8dd15b3ebd2ac02608916126fa56f18f73a50557ce0bf7ebddb51797a3218c6

    SHA512

    f3dd63107d0fb1568436b5432239401a59649a3da78a5182d8d67c4857cdf935babdcb2e53571acb21b5b20f85c6032c462a08204d994e722e4b159558e748fd

  • \ProgramData\Download and Sa\5074411009c7d.ocx

    Filesize

    151KB

    MD5

    c78c6140cb88ef4dc94f999291bb5ab1

    SHA1

    65b47ed5ec889e0e558c79a13a81193fc59b8ce9

    SHA256

    6cfc7fb43715fb13c53ab2a29b68f3a0a0f285c85d1b1443f2c5e73526646851

    SHA512

    ac8865cb1bec889ba493cad3f4c4bac87bfb2fdb15c518626ffa5f8ac6799a6f5c84f358d3e7d35824d6aba29af46c1078acdf30c3bd93981be61312baf6bd26

  • \ProgramData\Download and Sa\uninstall.exe

    Filesize

    48KB

    MD5

    0d17c0b8b7ee18263b1c5f6d87d8a98d

    SHA1

    541ac74626d6bfc8b0dc4f76f22061307f2f81b3

    SHA256

    daa28b0757a7ff5cba97ae26e2fe2f9ad6322c12f30aaee37180995ad2cba457

    SHA512

    708a48706b92fee7003c7eb640fedfabcebf18a9cf7a9465c5309e94b27ed1150b0e569155ff00d2e65e7beb1ee34da4c9a180d2a2180266d2711d8c41074608

  • \Users\Admin\AppData\Local\Temp\7zSF7C.tmp\5074411009c45.exe

    Filesize

    65KB

    MD5

    f65ffdc5fabb1cf7fc445dcad516b886

    SHA1

    db3efc8283a6963a837a2a44b82996f9995f4c7f

    SHA256

    e0571dcebce27429729cd4468016107e9b6296dd5086b186c15527f04bf605ac

    SHA512

    3dd702ba37d816bc2127af5f4bc751937937f4d04c273daf910ea6ea509908c63fb0eec827fa7dcbf4f89df821fa7fc24595fafccbf30b77ed36d89eb1f9a8f0

  • \Users\Admin\AppData\Local\Temp\nsi10F3.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • memory/1092-54-0x0000000074C91000-0x0000000074C93000-memory.dmp

    Filesize

    8KB