Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 01:24 UTC

General

  • Target

    cbfbf882287f77e19c7a6db5aff23b7000d394c5770fc7500f16c9eb418835f2.exe

  • Size

    252KB

  • MD5

    db790d970def4296bcb7d6c92ebd0be8

  • SHA1

    9897d2f61290f1f7caf827093f7ed8bc673fb679

  • SHA256

    cbfbf882287f77e19c7a6db5aff23b7000d394c5770fc7500f16c9eb418835f2

  • SHA512

    56ad83e59735360b109c69a4372a350456fb53a9d3ad9e011e34254dc410407ed7c614142f1baaa8245c821d25a86de213fe523598608f0fa751f6e232e17d63

  • SSDEEP

    6144:h1OgDPdkBAFZWjadD4s5Zwm6siz1tE9nQ0VUujYvJ9zr:h1OgLdaOZ6tz7ExQAUucvJ9n

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cbfbf882287f77e19c7a6db5aff23b7000d394c5770fc7500f16c9eb418835f2.exe
    "C:\Users\Admin\AppData\Local\Temp\cbfbf882287f77e19c7a6db5aff23b7000d394c5770fc7500f16c9eb418835f2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:448
    • C:\Users\Admin\AppData\Local\Temp\7zS901F.tmp\50530ba282b31.exe
      .\50530ba282b31.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:4056

Network

  • flag-unknown
    DNS
    176.122.125.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    176.122.125.40.in-addr.arpa
    IN PTR
    Response
  • 93.184.221.240:80
    260 B
    5
  • 93.184.220.29:80
    322 B
    7
  • 13.107.21.200:443
    156 B
    3
  • 52.109.77.2:443
    40 B
    1
  • 93.184.221.240:80
    322 B
    7
  • 93.184.221.240:80
    322 B
    7
  • 93.184.221.240:80
    322 B
    7
  • 104.80.225.205:443
    322 B
    7
  • 93.184.221.240:80
    46 B
    40 B
    1
    1
  • 93.184.221.240:80
    322 B
    7
  • 20.189.173.2:443
    184 B
    4
  • 8.8.8.8:53
    176.122.125.40.in-addr.arpa
    dns
    73 B
    159 B
    1
    1

    DNS Request

    176.122.125.40.in-addr.arpa

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\wxDownload\50530ba282b69.dll

    Filesize

    142KB

    MD5

    633e7480df2a82ffb537684d1c4b5be1

    SHA1

    6534c6f3342819ec7ad126fcae46aa70e8a277e7

    SHA256

    de1c043cd39c887c12ab24581903cd242287afeb46c7c02e9b52a659ae2945a7

    SHA512

    f77d7a0b1bb2bbbfb8eab7fa2d50a13f4f75c7a56bcdc26d026981940bcb1c30cbf8c27e07a0f828dc214616759dc9ecddf184f672f437df8606e76693f3270c

  • C:\Users\Admin\AppData\Local\Temp\7zS901F.tmp\50530ba2829f7@50530ba282a30.com\bootstrap.js

    Filesize

    2KB

    MD5

    1a177676374a93168b68132f83216a79

    SHA1

    3f6ac1c14f36828600112a879867671b2acfc389

    SHA256

    5ea684651ad7915178b718aa3b6c6a79ccd571a3d088b7ca1d1787879d9b98d6

    SHA512

    4ba8c8fafe17327ee972d8034ace001e05af3a8af46f677dfa927ce62694903f8521ca3f7bf6185a0f2958f7c5e619a26819e75a566c8c4b7ce42af048e5980f

  • C:\Users\Admin\AppData\Local\Temp\7zS901F.tmp\50530ba2829f7@50530ba282a30.com\chrome.manifest

    Filesize

    116B

    MD5

    9d6d56223f84d130dc11f4213b9b1ae6

    SHA1

    5259769607ba26d57536bd5bc296cbb16c0d3650

    SHA256

    6976df75320963dd5eeb2f888378e7faff38a7b75411f3152b116746360773b9

    SHA512

    2ed421f434b66ac51efecd68df882e3cbefd068fc5f7eee84aa659021dfa8229f7c24965bca8415aa7d032f7787087619a3c005cd611915cd0fb2f24a54c1e41

  • C:\Users\Admin\AppData\Local\Temp\7zS901F.tmp\50530ba2829f7@50530ba282a30.com\content\bg.js

    Filesize

    8KB

    MD5

    01afcd57d6d81ab21ece3d39eb6d0bb8

    SHA1

    d013c18e3ae9acfc47c1dd8d9876196a3fe2aa9c

    SHA256

    9e8dece3859e6fbf4bd87ad11af0ece93f22e0cea8f34ba8ea56409cafbda338

    SHA512

    82debb80eff6a426bcfe8a18a1bdbb733f43b36e5a366b1732e46ac34ef815bb351827c66407921728ff7b1d8fad6779b5e279dfdbac98c495f1c848a257e3f4

  • C:\Users\Admin\AppData\Local\Temp\7zS901F.tmp\50530ba2829f7@50530ba282a30.com\content\zy.xul

    Filesize

    225B

    MD5

    3d8b4c8fdef47722f1a3ce6920f9bf23

    SHA1

    492d5b963f7803ffc01b9943c78362248bf1379d

    SHA256

    4fb21007a78a1e4652ca21c7a279165081da51ef6cd959471b092a61400c0e2e

    SHA512

    78ef3b42cdf328f08c52f3bfce5347360a5cdb8c0c0159906fd9ff9a60240624a2bdf8146080452efb68f69344a4020eef2adbfa2773f68c92ab8088eb06bfd6

  • C:\Users\Admin\AppData\Local\Temp\7zS901F.tmp\50530ba2829f7@50530ba282a30.com\install.rdf

    Filesize

    717B

    MD5

    af5e1032ad357543f6db9e44b226b8d1

    SHA1

    c20ac031d7a324f7419d4cf47b930c4fede7f225

    SHA256

    1b9616726e91aa8ee84bcc2e499223bcc02f5cfce64f69243871ac385f6eb72e

    SHA512

    2c7aa31810a32146928049f41b49b46cf3dc3611c12e4462483b5c223682e1934a2d7c9a6f3bb7191467e1b3f704bbd9039392d132614dee42609143cb6c4c56

  • C:\Users\Admin\AppData\Local\Temp\7zS901F.tmp\50530ba282b31.exe

    Filesize

    65KB

    MD5

    4ccf1a317aa8539c857835e4ebe9c806

    SHA1

    223b73d09d7398f40aff3ccc569e66cae3886ee9

    SHA256

    4529889c5575cd4e28b3691f0489c806442840292a9e459ada4dab3e024cc242

    SHA512

    ecab68799b5a51c7d2a3735a9b3c17ba20a315618aa9575a5b02d5d4535716966031a26982012669f069dbfd8a6ab62f95737b7c402bf680f3a498900f627312

  • C:\Users\Admin\AppData\Local\Temp\7zS901F.tmp\50530ba282b31.exe

    Filesize

    65KB

    MD5

    4ccf1a317aa8539c857835e4ebe9c806

    SHA1

    223b73d09d7398f40aff3ccc569e66cae3886ee9

    SHA256

    4529889c5575cd4e28b3691f0489c806442840292a9e459ada4dab3e024cc242

    SHA512

    ecab68799b5a51c7d2a3735a9b3c17ba20a315618aa9575a5b02d5d4535716966031a26982012669f069dbfd8a6ab62f95737b7c402bf680f3a498900f627312

  • C:\Users\Admin\AppData\Local\Temp\7zS901F.tmp\50530ba282b69.dll

    Filesize

    142KB

    MD5

    633e7480df2a82ffb537684d1c4b5be1

    SHA1

    6534c6f3342819ec7ad126fcae46aa70e8a277e7

    SHA256

    de1c043cd39c887c12ab24581903cd242287afeb46c7c02e9b52a659ae2945a7

    SHA512

    f77d7a0b1bb2bbbfb8eab7fa2d50a13f4f75c7a56bcdc26d026981940bcb1c30cbf8c27e07a0f828dc214616759dc9ecddf184f672f437df8606e76693f3270c

  • C:\Users\Admin\AppData\Local\Temp\7zS901F.tmp\50530ba282ba2.html

    Filesize

    4KB

    MD5

    6d92ae0d5a0ab6c0d760a0117e181522

    SHA1

    981f3bc66c6dc521376b357e8c7b7242d9615e9f

    SHA256

    41028dc753bf4315cac074e8d95a10b1c725057ede81900f7b94f2cd557db7be

    SHA512

    8df85c6978882f440d12c424b065a80e707bd96bf9e6a913ecb13597cc331359cb1b08490e58e2c1efff16eb2d813060fd5e48da5e35fc9238b076cfc0755e91

  • C:\Users\Admin\AppData\Local\Temp\7zS901F.tmp\50530ba282bdb.js

    Filesize

    9B

    MD5

    99fa5d714d971a49b67de27e0d8871be

    SHA1

    d0621e846ea60fa8d0b2c8e622e495af49cd7359

    SHA256

    f560d76474380da948a0c5ab8682dc026822d9685268c592f315224b1b968bf6

    SHA512

    2fec19e4f2a974227922a7e057890141523ae73fbfa127f9e8cd00dff71b29abb93cb865c6d74ecf3df8bca440c558d4fbf2f80e82cc9636320ab5edb95ebad5

  • C:\Users\Admin\AppData\Local\Temp\7zS901F.tmp\laoallkllklhdopinfmbghahaakbajnc.crx

    Filesize

    7KB

    MD5

    a55cd2b7c54a2d931ca66004f78c883e

    SHA1

    e3635aaca41d3f0e183155286bea4642e7f991fc

    SHA256

    bae12381a6d29a7400f5ec06d7dfc5ad34d04b10b4d15a00273dc427e90e47bb

    SHA512

    c7ea7759553262b49e4a70d2c9926b314d1b9838d5d16d2720bf4fae16ff29a05b8055d9f3ec7eb9b7298194910ee0efb25144ad936010b5342e22dddb575bb2

  • C:\Users\Admin\AppData\Local\Temp\7zS901F.tmp\settings.ini

    Filesize

    994B

    MD5

    1dffcae6aea8cc7bf09036e933635f09

    SHA1

    1d40e0795eb8be2c86c41d1663552cb2836d7eaf

    SHA256

    760d542f53af9acd70cab57dbedf16b595a2a6c8866f6fdae2a5fbec85a47db3

    SHA512

    1afc22fcca16276009c3b17fe0caa7f710156e673c6089ca1e40f150211190333b8a0194a37eadff1d3da3ed5574a7c1aac014cef0efcf05ceb488db18736286

  • C:\Users\Admin\AppData\Local\Temp\nsy91E5.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.