Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28/12/2022, 05:53

General

  • Target

    174b5203c86120a117a0686c1ed754f0919c04c1e61b776abe5d3486cbc27b82.exe

  • Size

    1021KB

  • MD5

    e073b490d67a1788b4ec971c6482a988

  • SHA1

    a4f08f6b0a953ce04b9dda6d53e69a50e662284d

  • SHA256

    174b5203c86120a117a0686c1ed754f0919c04c1e61b776abe5d3486cbc27b82

  • SHA512

    94874e7e59686bad5fe7480c302645714288a283db9e8702c70fbc3ff2b02ada9bad2bce8eb9280b0646a6fff82ff1ea73af9446f68cf91705b3e96b3c41e405

  • SSDEEP

    12288:zwY0LpXQR7lMHinDAtfSlnYczC45gQeM8mnicPjMjY1eORJsCVYp9IvqU7aJFZ14:SLKRpFDISRN5beyJ3qp94qOsFZ09

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 64 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 24 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\174b5203c86120a117a0686c1ed754f0919c04c1e61b776abe5d3486cbc27b82.exe
    "C:\Users\Admin\AppData\Local\Temp\174b5203c86120a117a0686c1ed754f0919c04c1e61b776abe5d3486cbc27b82.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2712
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Qfyshwqueqdpai.tmp",Dioeeedresq
      2⤵
      • Blocklisted process makes network request
      • Sets DLL path for service in the registry
      • Sets service image path in registry
      • Loads dropped DLL
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:4696
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 14002
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:4872
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
        3⤵
          PID:4480
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
          3⤵
            PID:4556
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
            3⤵
              PID:3292
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
              3⤵
                PID:1724
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
                3⤵
                  PID:4900
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
                  3⤵
                    PID:3616
              • C:\Windows\System32\rundll32.exe
                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                1⤵
                  PID:4468
                • C:\Windows\SysWOW64\svchost.exe
                  C:\Windows\SysWOW64\svchost.exe -k LocalService
                  1⤵
                  • Loads dropped DLL
                  • Checks processor information in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:4852
                  • C:\Windows\SysWOW64\rundll32.exe
                    "C:\Windows\system32\rundll32.exe" "c:\program files (x86)\google\temp\cryptocme.dll",Z0odTTFFNw==
                    2⤵
                    • Loads dropped DLL
                    • Checks processor information in registry
                    PID:4472

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\ProgramData\{0222BCDE-1250-CD5F-F334-C7FEF4A3D675}\120__Connections_Cellular_Kidanet (Fiji)_i0$(__MVID)@WAP.provxml

                  Filesize

                  704B

                  MD5

                  4a0b3d1da2f40dac62ca663af5509136

                  SHA1

                  bc6c403efae8d56f56cdc670f207f7de1c58fa57

                  SHA256

                  c55473046557eb904780d27044462c0c31b1d189aafa15bc2fc90e3f3afc2ed4

                  SHA512

                  bd5becb34953d49b29c3076f4a9a05f66a65200d31a7068e092569349aa35d76bb27207ed0e2fb0806622b4b69d1fb0f8cffeb4eb4fa0a130444fbd6ff40e7cc

                • C:\ProgramData\{0222BCDE-1250-CD5F-F334-C7FEF4A3D675}\128__Connections_Cellular_Elisa (Finland)_i0$(__MVID)@WAP.provxml

                  Filesize

                  701B

                  MD5

                  acc1cdd85db5e94b98bdbf55e2df877a

                  SHA1

                  cbd2b8777c65dbc039f5048024bac42e29e8202c

                  SHA256

                  3388bb0959f8f8c1c9d1ce2a9a4a8f7a762c6546c7141cc24e558dafd9205f33

                  SHA512

                  cb304a8bec037e9061ec6623af02e4ba701fa035c54a75bde608c3b9f0e61b5cde1931d26cf4ce8a4e88593c4d67c9259e713dff1b74bacde49045fcc4bf5ae0

                • C:\ProgramData\{0222BCDE-1250-CD5F-F334-C7FEF4A3D675}\132__Connections_Cellular_TDC Song Finland (Finland)_i0$(__MVID)@WAP.provxml

                  Filesize

                  660B

                  MD5

                  31c75abebce693d705e2ab0eece289ef

                  SHA1

                  3f34ad274c9fa5572b2d8081899ff0d2bfe732e4

                  SHA256

                  7fe830f36b49ca4d26a6253e08d2fc53c477fad0c396b7f179df4beacce1f243

                  SHA512

                  d830ec13c8b0a32538fb94587a6ee6ed8aeb78f3d2b3e1dc09f6fbdda029080ff896478e531f51c627fa2df0f3ffc006f97e4e524603f01dc697fa63286f230e

                • C:\ProgramData\{0222BCDE-1250-CD5F-F334-C7FEF4A3D675}\Ieohspdwyru.tmp

                  Filesize

                  3.5MB

                  MD5

                  0b3edd8152fa94651ff17f3f2918e70f

                  SHA1

                  88245e5200570d142ed0de676610a6d191f9f302

                  SHA256

                  1890628536ecc9596f136b68c55ee1b2063420ccc4f518986cb66ed2293a44eb

                  SHA512

                  f0215f87b635e1090ba3f1dcff0b27c645e5d44b8c042cc2ba1b24e4a01ba212c9590c46a0faed54bbcc82cc3929f3b009ed8978704d8415868846f05c0e7c3c

                • C:\ProgramData\{0222BCDE-1250-CD5F-F334-C7FEF4A3D675}\MasterDatastore.xml

                  Filesize

                  271B

                  MD5

                  d6650e3886f3c95fb42d4f0762b04173

                  SHA1

                  1da4b8bb6bb45d576616ad843cf6e4c2e9d4784b

                  SHA256

                  9101f028c2288850be393281297500902b297c8b6ecf793292678b04a72709c9

                  SHA512

                  1f82db4bd6ea401bb5610c21ed48848b9b61c55aabb4efada31dc677835b8e4451045006c4067e9cc51267a1c861765b49c3b3ab4c568be1dca0c0109fd8ceaa

                • C:\ProgramData\{0222BCDE-1250-CD5F-F334-C7FEF4A3D675}\folder.ico

                  Filesize

                  52KB

                  MD5

                  bbf9dbdc079c0cd95f78d728aa3912d4

                  SHA1

                  051f76cc8c6520768bac9559bb329abeebd70d7c

                  SHA256

                  bef53904908769ceeb60f8e0976c3194e73534f00f4afb65497c2091121b98b2

                  SHA512

                  af110c52c983f1cf55b3db7d375e03c8c9308e3cf9ee1c154c2b25cb3f8299f0c0ba87b47445f09f98659eb536184c245887a341733c11af713e9ecc15288b5d

                • C:\Users\Admin\AppData\Local\Temp\Qfyshwqueqdpai.tmp

                  Filesize

                  792KB

                  MD5

                  822d3ead416a1a85cb96e65f65cd5ae2

                  SHA1

                  af32b69e2835d1cacdadb97ae6dfafccc32d1837

                  SHA256

                  72bdb3a06dca8458ac9aedf06785b2d7b95a19f8b9f3f8f5be2eb4744e9c5d1d

                  SHA512

                  48d0d61efd51fd2d8eb04d990b4a5b3ca34c916199d3b0a3b135d2089e028ee37f5145e4705fb75da77eaabbe12f8c4ea55775a41e1b1c68a90ce68b8c2a7260

                • \??\c:\program files (x86)\google\temp\cryptocme.dll

                  Filesize

                  792KB

                  MD5

                  9367d0f706f53570b69c4dbb3a42a430

                  SHA1

                  53d15b8d8c8b5807e254805b466ae220ff2c8406

                  SHA256

                  f56a8a446d067687d01a84ecfc5d142c9596cbf424c75a914c9bde10f053cd61

                  SHA512

                  dac804b40ae5120df27575cab4751b43dfc38e165313bb5e8fd618846243946323c121e675b0019609ea00d7086652796c731602733450f24b91f74d4dd30397

                • \Program Files (x86)\Google\Temp\cryptocme.dll

                  Filesize

                  792KB

                  MD5

                  9367d0f706f53570b69c4dbb3a42a430

                  SHA1

                  53d15b8d8c8b5807e254805b466ae220ff2c8406

                  SHA256

                  f56a8a446d067687d01a84ecfc5d142c9596cbf424c75a914c9bde10f053cd61

                  SHA512

                  dac804b40ae5120df27575cab4751b43dfc38e165313bb5e8fd618846243946323c121e675b0019609ea00d7086652796c731602733450f24b91f74d4dd30397

                • \Program Files (x86)\Google\Temp\cryptocme.dll

                  Filesize

                  792KB

                  MD5

                  9367d0f706f53570b69c4dbb3a42a430

                  SHA1

                  53d15b8d8c8b5807e254805b466ae220ff2c8406

                  SHA256

                  f56a8a446d067687d01a84ecfc5d142c9596cbf424c75a914c9bde10f053cd61

                  SHA512

                  dac804b40ae5120df27575cab4751b43dfc38e165313bb5e8fd618846243946323c121e675b0019609ea00d7086652796c731602733450f24b91f74d4dd30397

                • \Users\Admin\AppData\Local\Temp\Qfyshwqueqdpai.tmp

                  Filesize

                  792KB

                  MD5

                  822d3ead416a1a85cb96e65f65cd5ae2

                  SHA1

                  af32b69e2835d1cacdadb97ae6dfafccc32d1837

                  SHA256

                  72bdb3a06dca8458ac9aedf06785b2d7b95a19f8b9f3f8f5be2eb4744e9c5d1d

                  SHA512

                  48d0d61efd51fd2d8eb04d990b4a5b3ca34c916199d3b0a3b135d2089e028ee37f5145e4705fb75da77eaabbe12f8c4ea55775a41e1b1c68a90ce68b8c2a7260

                • memory/2712-152-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-157-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-133-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-134-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-135-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-137-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-136-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-138-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-140-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-139-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-142-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-143-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-144-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-145-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-146-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-147-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-148-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-149-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-150-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-151-0x0000000002330000-0x0000000002411000-memory.dmp

                  Filesize

                  900KB

                • memory/2712-131-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-153-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-154-0x0000000002430000-0x0000000002541000-memory.dmp

                  Filesize

                  1.1MB

                • memory/2712-155-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-156-0x0000000000400000-0x0000000000524000-memory.dmp

                  Filesize

                  1.1MB

                • memory/2712-132-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-158-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-159-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-160-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-161-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-162-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-163-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-120-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-121-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-122-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-119-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-130-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-167-0x0000000000400000-0x0000000000524000-memory.dmp

                  Filesize

                  1.1MB

                • memory/2712-123-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-129-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-128-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-127-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-126-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-125-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2712-124-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4472-536-0x0000000006DF0000-0x000000000794D000-memory.dmp

                  Filesize

                  11.4MB

                • memory/4472-553-0x0000000006DF0000-0x000000000794D000-memory.dmp

                  Filesize

                  11.4MB

                • memory/4696-168-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4696-172-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4696-186-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4696-187-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4696-188-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4696-185-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4696-183-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4696-265-0x0000000006620000-0x000000000717D000-memory.dmp

                  Filesize

                  11.4MB

                • memory/4696-166-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4696-165-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4696-182-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4696-181-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4696-344-0x0000000006620000-0x000000000717D000-memory.dmp

                  Filesize

                  11.4MB

                • memory/4696-180-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4696-179-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4696-178-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4696-177-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4696-176-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4696-175-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4696-174-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4696-173-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4696-184-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4696-171-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4696-170-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4696-169-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4852-478-0x00000000064F0000-0x000000000704D000-memory.dmp

                  Filesize

                  11.4MB

                • memory/4852-572-0x00000000064F0000-0x000000000704D000-memory.dmp

                  Filesize

                  11.4MB

                • memory/4872-287-0x0000021B56300000-0x0000021B565AE000-memory.dmp

                  Filesize

                  2.7MB

                • memory/4872-286-0x0000000000E70000-0x000000000110C000-memory.dmp

                  Filesize

                  2.6MB