Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
41s -
max time network
105s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
20/03/2023, 18:51
Static task
static1
Behavioral task
behavioral1
Sample
cd0fffdcaeff7a2c075e4104c4a48a0a07185b2822f1b534aef61986076caa7e.bat
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cd0fffdcaeff7a2c075e4104c4a48a0a07185b2822f1b534aef61986076caa7e.bat
Resource
win10v2004-20230220-en
General
-
Target
cd0fffdcaeff7a2c075e4104c4a48a0a07185b2822f1b534aef61986076caa7e.bat
-
Size
1.6MB
-
MD5
72e83b133a9e4cecd21fdb47334672f6
-
SHA1
bf0d9f8f7cb3e1e2d8665e5cf190d5f8e0b167ea
-
SHA256
cd0fffdcaeff7a2c075e4104c4a48a0a07185b2822f1b534aef61986076caa7e
-
SHA512
0e0347c780a0db3fb8f7077ad165fb5456a50e40bf4d3b43f7b63f3537bdc97ddbe4d7c25bbde0d49bbf2debd400ffe3c692727a71fd0d9e8a5de2453baf3f86
-
SSDEEP
24576:H31wpEXwOxgnFa3bhIW2OIAVkSnz3R/sOfRQEZZjEg6GEaeJu47fnpdRgaCQIAY1:mpzouBABDBsA5Z4lLD0H9z
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 956 RINDI%xxxxx%.exe -
Loads dropped DLL 1 IoCs
pid Process 956 RINDI%xxxxx%.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RINDI%xxxxx%.exe Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RINDI%xxxxx%.exe Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RINDI%xxxxx%.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1436 timeout.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:{impersonationLevel=impersonate}!\root\cimv2 RINDI%xxxxx%.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 2 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 9 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1412 WMIC.exe Token: SeSecurityPrivilege 1412 WMIC.exe Token: SeTakeOwnershipPrivilege 1412 WMIC.exe Token: SeLoadDriverPrivilege 1412 WMIC.exe Token: SeSystemProfilePrivilege 1412 WMIC.exe Token: SeSystemtimePrivilege 1412 WMIC.exe Token: SeProfSingleProcessPrivilege 1412 WMIC.exe Token: SeIncBasePriorityPrivilege 1412 WMIC.exe Token: SeCreatePagefilePrivilege 1412 WMIC.exe Token: SeBackupPrivilege 1412 WMIC.exe Token: SeRestorePrivilege 1412 WMIC.exe Token: SeShutdownPrivilege 1412 WMIC.exe Token: SeDebugPrivilege 1412 WMIC.exe Token: SeSystemEnvironmentPrivilege 1412 WMIC.exe Token: SeRemoteShutdownPrivilege 1412 WMIC.exe Token: SeUndockPrivilege 1412 WMIC.exe Token: SeManageVolumePrivilege 1412 WMIC.exe Token: 33 1412 WMIC.exe Token: 34 1412 WMIC.exe Token: 35 1412 WMIC.exe Token: SeIncreaseQuotaPrivilege 1412 WMIC.exe Token: SeSecurityPrivilege 1412 WMIC.exe Token: SeTakeOwnershipPrivilege 1412 WMIC.exe Token: SeLoadDriverPrivilege 1412 WMIC.exe Token: SeSystemProfilePrivilege 1412 WMIC.exe Token: SeSystemtimePrivilege 1412 WMIC.exe Token: SeProfSingleProcessPrivilege 1412 WMIC.exe Token: SeIncBasePriorityPrivilege 1412 WMIC.exe Token: SeCreatePagefilePrivilege 1412 WMIC.exe Token: SeBackupPrivilege 1412 WMIC.exe Token: SeRestorePrivilege 1412 WMIC.exe Token: SeShutdownPrivilege 1412 WMIC.exe Token: SeDebugPrivilege 1412 WMIC.exe Token: SeSystemEnvironmentPrivilege 1412 WMIC.exe Token: SeRemoteShutdownPrivilege 1412 WMIC.exe Token: SeUndockPrivilege 1412 WMIC.exe Token: SeManageVolumePrivilege 1412 WMIC.exe Token: 33 1412 WMIC.exe Token: 34 1412 WMIC.exe Token: 35 1412 WMIC.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 956 RINDI%xxxxx%.exe 956 RINDI%xxxxx%.exe 956 RINDI%xxxxx%.exe 956 RINDI%xxxxx%.exe 956 RINDI%xxxxx%.exe 956 RINDI%xxxxx%.exe 956 RINDI%xxxxx%.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 956 RINDI%xxxxx%.exe 956 RINDI%xxxxx%.exe 956 RINDI%xxxxx%.exe 956 RINDI%xxxxx%.exe 956 RINDI%xxxxx%.exe 956 RINDI%xxxxx%.exe 956 RINDI%xxxxx%.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1948 2040 cmd.exe 30 PID 2040 wrote to memory of 1948 2040 cmd.exe 30 PID 2040 wrote to memory of 1948 2040 cmd.exe 30 PID 1948 wrote to memory of 1104 1948 cmd.exe 31 PID 1948 wrote to memory of 1104 1948 cmd.exe 31 PID 1948 wrote to memory of 1104 1948 cmd.exe 31 PID 1948 wrote to memory of 332 1948 cmd.exe 32 PID 1948 wrote to memory of 332 1948 cmd.exe 32 PID 1948 wrote to memory of 332 1948 cmd.exe 32 PID 1948 wrote to memory of 1420 1948 cmd.exe 33 PID 1948 wrote to memory of 1420 1948 cmd.exe 33 PID 1948 wrote to memory of 1420 1948 cmd.exe 33 PID 1948 wrote to memory of 1412 1948 cmd.exe 34 PID 1948 wrote to memory of 1412 1948 cmd.exe 34 PID 1948 wrote to memory of 1412 1948 cmd.exe 34 PID 1948 wrote to memory of 1436 1948 cmd.exe 37 PID 1948 wrote to memory of 1436 1948 cmd.exe 37 PID 1948 wrote to memory of 1436 1948 cmd.exe 37 PID 956 wrote to memory of 2024 956 RINDI%xxxxx%.exe 40 PID 956 wrote to memory of 2024 956 RINDI%xxxxx%.exe 40 PID 956 wrote to memory of 2024 956 RINDI%xxxxx%.exe 40 PID 956 wrote to memory of 2024 956 RINDI%xxxxx%.exe 40 PID 956 wrote to memory of 1364 956 RINDI%xxxxx%.exe 42 PID 956 wrote to memory of 1364 956 RINDI%xxxxx%.exe 42 PID 956 wrote to memory of 1364 956 RINDI%xxxxx%.exe 42 PID 956 wrote to memory of 1364 956 RINDI%xxxxx%.exe 42 PID 956 wrote to memory of 2000 956 RINDI%xxxxx%.exe 43 PID 956 wrote to memory of 2000 956 RINDI%xxxxx%.exe 43 PID 956 wrote to memory of 2000 956 RINDI%xxxxx%.exe 43 PID 956 wrote to memory of 2000 956 RINDI%xxxxx%.exe 43 PID 1364 wrote to memory of 1104 1364 cmd.exe 46 PID 1364 wrote to memory of 1104 1364 cmd.exe 46 PID 1364 wrote to memory of 1104 1364 cmd.exe 46 PID 1364 wrote to memory of 1104 1364 cmd.exe 46 PID 2000 wrote to memory of 364 2000 cmd.exe 47 PID 2000 wrote to memory of 364 2000 cmd.exe 47 PID 2000 wrote to memory of 364 2000 cmd.exe 47 PID 2000 wrote to memory of 364 2000 cmd.exe 47 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RINDI%xxxxx%.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RINDI%xxxxx%.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\cd0fffdcaeff7a2c075e4104c4a48a0a07185b2822f1b534aef61986076caa7e.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\cd0fffdcaeff7a2c075e4104c4a48a0a07185b2822f1b534aef61986076caa7e.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\system32\more.commore +5 C:\Users\Admin\AppData\Local\Temp\cd0fffdcaeff7a2c075e4104c4a48a0a07185b2822f1b534aef61986076caa7e.bat3⤵PID:1104
-
-
C:\Windows\system32\certutil.execertutil -decode -f ~~ "C:\Users\Admin\AppData\Roaming\jkjlhkj\exe\v3.3.14.5_20180315\RINDI%xxxxx%.exe"3⤵PID:332
-
-
C:\Windows\system32\certutil.execertutil -decode -f C:\Users\Admin\AppData\Local\Temp\cd0fffdcaeff7a2c075e4104c4a48a0a07185b2822f1b534aef61986076caa7e.bat "C:\Users\Admin\AppData\Roaming\jkjlhkj\a3x\X2NI\cd0fffdcaeff7a2c075e4104c4a48a0a07185b2822f1b534aef61986076caa7e.a3x"3⤵PID:1420
-
-
C:\Windows\System32\Wbem\WMIC.exewmic process call create '"C:\Users\Admin\AppData\Roaming\jkjlhkj\exe\v3.3.14.5_20180315\RINDI%xxxxx%.exe" "C:\Users\Admin\AppData\Roaming\jkjlhkj\a3x\X2NI\cd0fffdcaeff7a2c075e4104c4a48a0a07185b2822f1b534aef61986076caa7e.a3x" ""' ,C:\Users\Admin\AppData\Local\Temp\3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
C:\Windows\system32\timeout.exetimeout /T 53⤵
- Delays execution with timeout.exe
PID:1436
-
-
-
C:\Users\Admin\AppData\Roaming\jkjlhkj\exe\v3.3.14.5_20180315\RINDI%xxxxx%.exe"C:\Users\Admin\AppData\Roaming\jkjlhkj\exe\v3.3.14.5_20180315\RINDI%xxxxx%.exe" "C:\Users\Admin\AppData\Roaming\jkjlhkj\a3x\X2NI\cd0fffdcaeff7a2c075e4104c4a48a0a07185b2822f1b534aef61986076caa7e.a3x" ""1⤵
- Executes dropped EXE
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:956 -
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Users\Admin\AppData\Local\Temp\df6uiv.vbs"2⤵PID:2024
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C choice /C Y /N /D Y /T 3 & RMDIR "C:\Users\Admin\AppData\Roaming\pekulev" /S /Q2⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 33⤵PID:1104
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C choice /C Y /N /D Y /T 3 & DEL "C:\Users\Admin\AppData\Roaming\jkjlhkj\a3x\X2NI\cd0fffdcaeff7a2c075e4104c4a48a0a07185b2822f1b534aef61986076caa7e.a3x2⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 33⤵PID:364
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD59b7d4f83ddb5577bd1e803816881e83e
SHA156311d101ccb2fb282d337d4e1977c3940961eb3
SHA256614e90a3c99a3c97c809979efe8f7c73f00f90b71923816e87bc81ba1782afae
SHA512da90de57554aad51c52acd1378755fcf80f47b64d76974f8c8b7cb01a2220bd36d82828109759bc2ea8b9adb393d76b1e75b6cecaa15652861d5be8482e45105
-
Filesize
398B
MD5257cab9fa336e73a56bda3074354d2f6
SHA11e652752c9f6c9bdfe83786404d813d46e331ccd
SHA25657b978bf839587ffe83b7b75c62df45f43d2f1c980dfef8ad9485388e9bcfbd8
SHA512ddf162844a7a84ac2440ef5fafb540640af3bf0418e24edc86193d428456c3284e1597c5db2457b6e2def71644c8baafda465967ea4551e280e5a4a776851a4a
-
C:\Users\Admin\AppData\Roaming\jkjlhkj\a3x\X2NI\cd0fffdcaeff7a2c075e4104c4a48a0a07185b2822f1b534aef61986076caa7e.a3x
Filesize307KB
MD5892bcb6a89741e62504b31eaf1437869
SHA183c8477e16080a3c1510496f82e8a94f98effd19
SHA256ad5d498fbc201fc2754a32b3d9668959ccb7ce795ed53fcb6bbca3affd60f4be
SHA5120307f008cb00cb4841feb10b124b5c012c74cd48f2040a261702ecfdd6b9dfaec49aa9dbec05f0939a93e2c39e5c90873c0142241981a4cb6ed982d313c66d29
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
858KB
MD5c7719f774bb859240eb6dfa91a1f10be
SHA1be1461e770333eb13e0fe66d378e3fac4f1112b5
SHA256b3ce811fb696b94f9117ee7fe725ae6b907d695636beceeb1672d5d5eeb81df4
SHA5128a561e927a7a65f5211c76b488bed2a3cc0525ecd9775d25e1863b52ff532349c125b76a51eb63ea2e4479a567e8fac6b8ae38b7fd1970bad2556befe9e3b529