Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    96s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2023, 14:19

General

  • Target

    c65180a7d0a5faf91760b0e97e92bef2.exe

  • Size

    1.4MB

  • MD5

    c65180a7d0a5faf91760b0e97e92bef2

  • SHA1

    e9b4ab05680375e27e1edf69dbc02267251cd179

  • SHA256

    9a671cbbcd15525d27cfc295861d98d4e8cd144348e8541d78785fb60879d77f

  • SHA512

    6117ef9622301bbd7f11043c1a0ebd9a50a457ef7024b54613065e28e3dcb0c1f63f068991db288b2f702af153063446a78ada11256ac3e8c091d4bfafb185c4

  • SSDEEP

    24576:JGU0HpRGUYHKaPUM0Hqy69NgA+iVvRuPpND5TqJ6y5eXt7dR7W5h1St:MpEUIvU0N9jkpjweXt77C5H8

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Program Files directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c65180a7d0a5faf91760b0e97e92bef2.exe
    "C:\Users\Admin\AppData\Local\Temp\c65180a7d0a5faf91760b0e97e92bef2.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c taskkill /f /im chrome.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1848
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im chrome.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1492
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1252
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6cc9758,0x7fef6cc9768,0x7fef6cc9778
        3⤵
          PID:832
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1160 --field-trial-handle=1292,i,13590746770095744472,9055057688277823784,131072 /prefetch:2
          3⤵
            PID:928
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1380 --field-trial-handle=1292,i,13590746770095744472,9055057688277823784,131072 /prefetch:8
            3⤵
              PID:2004
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1644 --field-trial-handle=1292,i,13590746770095744472,9055057688277823784,131072 /prefetch:8
              3⤵
                PID:788
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2240 --field-trial-handle=1292,i,13590746770095744472,9055057688277823784,131072 /prefetch:1
                3⤵
                  PID:1300
            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
              1⤵
                PID:268

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\background.html

                Filesize

                786B

                MD5

                9ffe618d587a0685d80e9f8bb7d89d39

                SHA1

                8e9cae42c911027aafae56f9b1a16eb8dd7a739c

                SHA256

                a1064146f622fe68b94cd65a0e8f273b583449fbacfd6fd75fec1eaaf2ec8d6e

                SHA512

                a4e1f53d1e3bf0ff6893f188a510c6b3da37b99b52ddd560d4c90226cb14de6c9e311ee0a93192b1a26db2d76382eb2350dc30ab9db7cbd9ca0a80a507ea1a12

              • C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\icon.png

                Filesize

                6KB

                MD5

                362695f3dd9c02c83039898198484188

                SHA1

                85dcacc66a106feca7a94a42fc43e08c806a0322

                SHA256

                40cfea52dbc50a8a5c250c63d825dcaad3f76e9588f474b3e035b587c912f4ca

                SHA512

                a04dc31a6ffc3bb5d56ba0fb03ecf93a88adc7193a384313d2955701bd99441ddf507aa0ddfc61dfc94f10a7e571b3d6a35980e61b06f98dd9eee424dc594a6f

              • C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\content.js

                Filesize

                3KB

                MD5

                c31f14d9b1b840e4b9c851cbe843fc8f

                SHA1

                205e3a99dc6c0af0e2f4450ebaa49ebde8e76bb4

                SHA256

                03601415885fd5d8967c407f7320d53f4c9ca2ec33bbe767d73a1589c5e36c54

                SHA512

                2c3d7ed5384712a0013a2ebbc526e762f257e32199651192742282a9641946b6aea6235d848b1e8cb3b0f916f85d3708a14717a69cbcf081145bc634d11d75aa

              • C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\jquery-3.3.1.min.js

                Filesize

                84KB

                MD5

                a09e13ee94d51c524b7e2a728c7d4039

                SHA1

                0dc32db4aa9c5f03f3b38c47d883dbd4fed13aae

                SHA256

                160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef

                SHA512

                f8da8f95b6ed33542a88af19028e18ae3d9ce25350a06bfc3fbf433ed2b38fefa5e639cddfdac703fc6caa7f3313d974b92a3168276b3a016ceb28f27db0714a

              • C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\manifest.json

                Filesize

                1KB

                MD5

                05bfb082915ee2b59a7f32fa3cc79432

                SHA1

                c1acd799ae271bcdde50f30082d25af31c1208c3

                SHA256

                04392a223cc358bc79fcd306504e8e834d6febbff0f3496f2eb8451797d28aa1

                SHA512

                6feea1c8112ac33d117aef3f272b1cc42ec24731c51886ed6f8bc2257b91e4d80089e8ca7ce292cc2f39100a7f662bcc5c37e5622a786f8dc8ea46b8127152f3

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                Filesize

                61KB

                MD5

                e71c8443ae0bc2e282c73faead0a6dd3

                SHA1

                0c110c1b01e68edfacaeae64781a37b1995fa94b

                SHA256

                95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

                SHA512

                b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\CURRENT~RF6d99e0.TMP

                Filesize

                16B

                MD5

                46295cac801e5d4857d09837238a6394

                SHA1

                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                SHA256

                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                SHA512

                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                Filesize

                264KB

                MD5

                f50f89a0a91564d0b8a211f8921aa7de

                SHA1

                112403a17dd69d5b9018b8cede023cb3b54eab7d

                SHA256

                b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                SHA512

                bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                Filesize

                4KB

                MD5

                7a1fd60d1b8ea4d92fe0c9b273eb34ce

                SHA1

                d2f3f520e1d29b2f8280eec1e9edd58cd2b583d8

                SHA256

                9d94ec18a86f21cc05972b47d6e07da5a5d0be7ed8e49502e71a1c778e287da3

                SHA512

                d2afb0a6af79cedde6a9f29465514b697e1a7084e2d833f417f30f1119ecf58715af3ca3e4c1ef4b47dc84cdaef360bb09dd2b41fb0e1ed55e0026410b82df93

              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                Filesize

                4KB

                MD5

                ddcde7c9140bc24bb83c3c47ce2eb8db

                SHA1

                49f75675b91e0a45d25054705ec124317d6d56fc

                SHA256

                d0ae261dd937e1c2e0002f51624a5b8221255dd1a744694dac130911813608d0

                SHA512

                67e973f84762700f50d137641046dcb2df6f0d4bb673bd5cc693288c98ec0da8f19621ea2556a1124d8f9a3ccfc914bf5e2338320ed521c0a8efec810fb48053

              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                Filesize

                11KB

                MD5

                eb8f81cf15eb47b17d1973ed785e005a

                SHA1

                44f15ea87f5d9918e425a869a5ffc33b9a8df4fc

                SHA256

                cb0bd767f14e7187b329a7e5a1b3f13ec9d2cf97c821a8f9493ffc3891b82df8

                SHA512

                c2cbc74064e39bb8bdc908b0cc975b8af67b96f2a11e446cdd6366092f9cd8bf2da9078b3fb2090545e02882e4bd3f044e8554d4495896cfe3fd42de4632e13e

              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                Filesize

                11KB

                MD5

                19325276e6792f67f2ea7f3581233195

                SHA1

                59671bfc0d832deba81f226ebcb86d9337921c98

                SHA256

                076e74642d0516bae27e1e5b0fb74a94944d0d4f021f83a4865d9da89906b911

                SHA512

                38171c69083a75a6d056a888b2d1596a73598f59505035f0cc9b8422ad2519107241f5a1b7f1d3367c98879478154955fabaa9f5eccb0964a5733e15f12cfda8

              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000004.dbtmp

                Filesize

                16B

                MD5

                6752a1d65b201c13b62ea44016eb221f

                SHA1

                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                SHA256

                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                SHA512

                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

              • C:\Users\Admin\AppData\Local\Temp\Tar23FD.tmp

                Filesize

                161KB

                MD5

                be2bec6e8c5653136d3e72fe53c98aa3

                SHA1

                a8182d6db17c14671c3d5766c72e58d87c0810de

                SHA256

                1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

                SHA512

                0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

              • memory/928-127-0x0000000000860000-0x0000000000861000-memory.dmp

                Filesize

                4KB

              • memory/928-160-0x00000000773A0000-0x00000000773A1000-memory.dmp

                Filesize

                4KB