Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    19s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 01:24

General

  • Target

    cbfbf882287f77e19c7a6db5aff23b7000d394c5770fc7500f16c9eb418835f2.exe

  • Size

    252KB

  • MD5

    db790d970def4296bcb7d6c92ebd0be8

  • SHA1

    9897d2f61290f1f7caf827093f7ed8bc673fb679

  • SHA256

    cbfbf882287f77e19c7a6db5aff23b7000d394c5770fc7500f16c9eb418835f2

  • SHA512

    56ad83e59735360b109c69a4372a350456fb53a9d3ad9e011e34254dc410407ed7c614142f1baaa8245c821d25a86de213fe523598608f0fa751f6e232e17d63

  • SSDEEP

    6144:h1OgDPdkBAFZWjadD4s5Zwm6siz1tE9nQ0VUujYvJ9zr:h1OgLdaOZ6tz7ExQAUucvJ9n

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 8 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cbfbf882287f77e19c7a6db5aff23b7000d394c5770fc7500f16c9eb418835f2.exe
    "C:\Users\Admin\AppData\Local\Temp\cbfbf882287f77e19c7a6db5aff23b7000d394c5770fc7500f16c9eb418835f2.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Users\Admin\AppData\Local\Temp\7zS32B5.tmp\50530ba282b31.exe
      .\50530ba282b31.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:1116

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zS32B5.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    1a177676374a93168b68132f83216a79

    SHA1

    3f6ac1c14f36828600112a879867671b2acfc389

    SHA256

    5ea684651ad7915178b718aa3b6c6a79ccd571a3d088b7ca1d1787879d9b98d6

    SHA512

    4ba8c8fafe17327ee972d8034ace001e05af3a8af46f677dfa927ce62694903f8521ca3f7bf6185a0f2958f7c5e619a26819e75a566c8c4b7ce42af048e5980f

  • C:\Users\Admin\AppData\Local\Temp\7zS32B5.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    9d6d56223f84d130dc11f4213b9b1ae6

    SHA1

    5259769607ba26d57536bd5bc296cbb16c0d3650

    SHA256

    6976df75320963dd5eeb2f888378e7faff38a7b75411f3152b116746360773b9

    SHA512

    2ed421f434b66ac51efecd68df882e3cbefd068fc5f7eee84aa659021dfa8229f7c24965bca8415aa7d032f7787087619a3c005cd611915cd0fb2f24a54c1e41

  • C:\Users\Admin\AppData\Local\Temp\7zS32B5.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    01afcd57d6d81ab21ece3d39eb6d0bb8

    SHA1

    d013c18e3ae9acfc47c1dd8d9876196a3fe2aa9c

    SHA256

    9e8dece3859e6fbf4bd87ad11af0ece93f22e0cea8f34ba8ea56409cafbda338

    SHA512

    82debb80eff6a426bcfe8a18a1bdbb733f43b36e5a366b1732e46ac34ef815bb351827c66407921728ff7b1d8fad6779b5e279dfdbac98c495f1c848a257e3f4

  • C:\Users\Admin\AppData\Local\Temp\7zS32B5.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    3d8b4c8fdef47722f1a3ce6920f9bf23

    SHA1

    492d5b963f7803ffc01b9943c78362248bf1379d

    SHA256

    4fb21007a78a1e4652ca21c7a279165081da51ef6cd959471b092a61400c0e2e

    SHA512

    78ef3b42cdf328f08c52f3bfce5347360a5cdb8c0c0159906fd9ff9a60240624a2bdf8146080452efb68f69344a4020eef2adbfa2773f68c92ab8088eb06bfd6

  • C:\Users\Admin\AppData\Local\Temp\7zS32B5.tmp\[email protected]\install.rdf

    Filesize

    717B

    MD5

    af5e1032ad357543f6db9e44b226b8d1

    SHA1

    c20ac031d7a324f7419d4cf47b930c4fede7f225

    SHA256

    1b9616726e91aa8ee84bcc2e499223bcc02f5cfce64f69243871ac385f6eb72e

    SHA512

    2c7aa31810a32146928049f41b49b46cf3dc3611c12e4462483b5c223682e1934a2d7c9a6f3bb7191467e1b3f704bbd9039392d132614dee42609143cb6c4c56

  • C:\Users\Admin\AppData\Local\Temp\7zS32B5.tmp\50530ba282b31.exe

    Filesize

    65KB

    MD5

    4ccf1a317aa8539c857835e4ebe9c806

    SHA1

    223b73d09d7398f40aff3ccc569e66cae3886ee9

    SHA256

    4529889c5575cd4e28b3691f0489c806442840292a9e459ada4dab3e024cc242

    SHA512

    ecab68799b5a51c7d2a3735a9b3c17ba20a315618aa9575a5b02d5d4535716966031a26982012669f069dbfd8a6ab62f95737b7c402bf680f3a498900f627312

  • C:\Users\Admin\AppData\Local\Temp\7zS32B5.tmp\50530ba282b31.exe

    Filesize

    65KB

    MD5

    4ccf1a317aa8539c857835e4ebe9c806

    SHA1

    223b73d09d7398f40aff3ccc569e66cae3886ee9

    SHA256

    4529889c5575cd4e28b3691f0489c806442840292a9e459ada4dab3e024cc242

    SHA512

    ecab68799b5a51c7d2a3735a9b3c17ba20a315618aa9575a5b02d5d4535716966031a26982012669f069dbfd8a6ab62f95737b7c402bf680f3a498900f627312

  • C:\Users\Admin\AppData\Local\Temp\7zS32B5.tmp\50530ba282b69.dll

    Filesize

    142KB

    MD5

    633e7480df2a82ffb537684d1c4b5be1

    SHA1

    6534c6f3342819ec7ad126fcae46aa70e8a277e7

    SHA256

    de1c043cd39c887c12ab24581903cd242287afeb46c7c02e9b52a659ae2945a7

    SHA512

    f77d7a0b1bb2bbbfb8eab7fa2d50a13f4f75c7a56bcdc26d026981940bcb1c30cbf8c27e07a0f828dc214616759dc9ecddf184f672f437df8606e76693f3270c

  • C:\Users\Admin\AppData\Local\Temp\7zS32B5.tmp\50530ba282ba2.html

    Filesize

    4KB

    MD5

    6d92ae0d5a0ab6c0d760a0117e181522

    SHA1

    981f3bc66c6dc521376b357e8c7b7242d9615e9f

    SHA256

    41028dc753bf4315cac074e8d95a10b1c725057ede81900f7b94f2cd557db7be

    SHA512

    8df85c6978882f440d12c424b065a80e707bd96bf9e6a913ecb13597cc331359cb1b08490e58e2c1efff16eb2d813060fd5e48da5e35fc9238b076cfc0755e91

  • C:\Users\Admin\AppData\Local\Temp\7zS32B5.tmp\50530ba282bdb.js

    Filesize

    9B

    MD5

    99fa5d714d971a49b67de27e0d8871be

    SHA1

    d0621e846ea60fa8d0b2c8e622e495af49cd7359

    SHA256

    f560d76474380da948a0c5ab8682dc026822d9685268c592f315224b1b968bf6

    SHA512

    2fec19e4f2a974227922a7e057890141523ae73fbfa127f9e8cd00dff71b29abb93cb865c6d74ecf3df8bca440c558d4fbf2f80e82cc9636320ab5edb95ebad5

  • C:\Users\Admin\AppData\Local\Temp\7zS32B5.tmp\laoallkllklhdopinfmbghahaakbajnc.crx

    Filesize

    7KB

    MD5

    a55cd2b7c54a2d931ca66004f78c883e

    SHA1

    e3635aaca41d3f0e183155286bea4642e7f991fc

    SHA256

    bae12381a6d29a7400f5ec06d7dfc5ad34d04b10b4d15a00273dc427e90e47bb

    SHA512

    c7ea7759553262b49e4a70d2c9926b314d1b9838d5d16d2720bf4fae16ff29a05b8055d9f3ec7eb9b7298194910ee0efb25144ad936010b5342e22dddb575bb2

  • C:\Users\Admin\AppData\Local\Temp\7zS32B5.tmp\settings.ini

    Filesize

    994B

    MD5

    1dffcae6aea8cc7bf09036e933635f09

    SHA1

    1d40e0795eb8be2c86c41d1663552cb2836d7eaf

    SHA256

    760d542f53af9acd70cab57dbedf16b595a2a6c8866f6fdae2a5fbec85a47db3

    SHA512

    1afc22fcca16276009c3b17fe0caa7f710156e673c6089ca1e40f150211190333b8a0194a37eadff1d3da3ed5574a7c1aac014cef0efcf05ceb488db18736286

  • \ProgramData\wxDownload\50530ba282b69.dll

    Filesize

    142KB

    MD5

    633e7480df2a82ffb537684d1c4b5be1

    SHA1

    6534c6f3342819ec7ad126fcae46aa70e8a277e7

    SHA256

    de1c043cd39c887c12ab24581903cd242287afeb46c7c02e9b52a659ae2945a7

    SHA512

    f77d7a0b1bb2bbbfb8eab7fa2d50a13f4f75c7a56bcdc26d026981940bcb1c30cbf8c27e07a0f828dc214616759dc9ecddf184f672f437df8606e76693f3270c

  • \ProgramData\wxDownload\uninstall.exe

    Filesize

    48KB

    MD5

    a724dac649142fef71fe4b529684e969

    SHA1

    e2878e84886ec53a1332ad969a825062526b5cd4

    SHA256

    b58c58b5073034d74c5d93902bbb9d402be063e907bdf77115b55bbb99af21dc

    SHA512

    9f475ad52fa2b7f82e74df87c02e42f937b5e3b62773b7d51cb53facfcc8b4934ad3c2fc21496cfabaa4dd103a309ed5cccad1ad3d6037f6c4f3a540e3e9d5b3

  • \Users\Admin\AppData\Local\Temp\7zS32B5.tmp\50530ba282b31.exe

    Filesize

    65KB

    MD5

    4ccf1a317aa8539c857835e4ebe9c806

    SHA1

    223b73d09d7398f40aff3ccc569e66cae3886ee9

    SHA256

    4529889c5575cd4e28b3691f0489c806442840292a9e459ada4dab3e024cc242

    SHA512

    ecab68799b5a51c7d2a3735a9b3c17ba20a315618aa9575a5b02d5d4535716966031a26982012669f069dbfd8a6ab62f95737b7c402bf680f3a498900f627312

  • \Users\Admin\AppData\Local\Temp\nsj33B0.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • memory/1748-54-0x0000000076381000-0x0000000076383000-memory.dmp

    Filesize

    8KB