Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    30s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    25/05/2023, 21:13

General

  • Target

    tmp.exe

  • Size

    599KB

  • MD5

    fdb8081ac26d8de3f7582b2616bcf3e8

  • SHA1

    c46856c1394a0b36f7826285db0d72ae494f15f0

  • SHA256

    2c2d57d1ea08595db9a8a6c1bf8dbe40fac57a9b784eff00c4095c72fce80e98

  • SHA512

    0fdaa8f7c6ce93026fa1ad2e18b0ad31cd0e77afc17763042e841b039a2a1130b4138f34a2d32d8e74bee347f26b40f36d224be8b7f4cd7c2f6917617ff60c98

  • SSDEEP

    6144:kH5XgP9i7Nss/t/a2zDGVPJXvnzZjDJHb571Kjn1929XDccH89bq3vcebsVDsu:8UkRatpvnzZjDv7oj19yTN3vi1

Malware Config

Extracted

Family

gurcu

C2

https://api.telegram.org/bot6237712604:AAESgAGfaQ0EUC8eWgMd7kpAW_FEGRDRfDs/sendMessage?chat_id=880824160

Signatures

  • Gurcu, WhiteSnake

    Gurcu is a malware stealer written in C#.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 14 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "tmp" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\EsetSecurity\tmp.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\tmp.exe" &&START "" "C:\Users\Admin\AppData\Local\EsetSecurity\tmp.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1732
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:804
        • C:\Windows\system32\PING.EXE
          ping 127.0.0.1
          3⤵
          • Runs ping.exe
          PID:1468
        • C:\Windows\system32\schtasks.exe
          schtasks /create /tn "tmp" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\EsetSecurity\tmp.exe" /rl HIGHEST /f
          3⤵
          • Creates scheduled task(s)
          PID:360
        • C:\Users\Admin\AppData\Local\EsetSecurity\tmp.exe
          "C:\Users\Admin\AppData\Local\EsetSecurity\tmp.exe"
          3⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1240
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 1240 -s 3192
            4⤵
            • Program crash
            PID:1148
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {2F4FB764-E3F1-4A5E-8B6A-D57155CC9146} S-1-5-21-1563773381-2037468142-1146002597-1000:YBHADZIG\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:328
      • C:\Users\Admin\AppData\Local\EsetSecurity\tmp.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\tmp.exe
        2⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • outlook_office_path
        • outlook_win_path
        PID:392
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 392 -s 2820
          3⤵
          • Program crash
          PID:1896

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

      Filesize

      1KB

      MD5

      55540a230bdab55187a841cfe1aa1545

      SHA1

      363e4734f757bdeb89868efe94907774a327695e

      SHA256

      d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

      SHA512

      c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      62KB

      MD5

      3ac860860707baaf32469fa7cc7c0192

      SHA1

      c33c2acdaba0e6fa41fd2f00f186804722477639

      SHA256

      d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

      SHA512

      d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      62KB

      MD5

      3ac860860707baaf32469fa7cc7c0192

      SHA1

      c33c2acdaba0e6fa41fd2f00f186804722477639

      SHA256

      d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

      SHA512

      d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

      Filesize

      230B

      MD5

      11ffb31be59cc869aab9cb3e80061200

      SHA1

      2d4c1d67ca098bad702a9425c6b7b9c565ddb55c

      SHA256

      e3d3a4c583be94a1d25043b882b86e3d7decd60971f70f3a6c36391ac8ebd4b0

      SHA512

      57b2a18ab5123db0a696de04c3570965de0cf622fff5d946c62a225531cae805c395bc177fcad30040fba03a59c0f0c8bd311cfbc107e9b3ede8195be26687ea

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      5c49663cb6a20df76da85f1646bcbacb

      SHA1

      b75da3f0309bff13b5be037f9381dba5b3185a1c

      SHA256

      10b51e173d3821052430da4fe8d533527901b5c5fe840948f4d69ab9e9b3c800

      SHA512

      e6ad5a739c941a90842c1287677a04ed3b67418f5d3e58b90a9b7f4529d7a87f008932dbfbc9072b0078791d8867a5cc0f6094f0bbd24bc8e0ebad132367a4ef

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6170953de865e85f3c42034360740345

      SHA1

      ab73e6206cd12bba52b9903fef8c67303272eb7f

      SHA256

      f6bc6281d0bca25176a3e22b70d3c0e077d8b90b7acc8dfa25abd81e5711dea4

      SHA512

      1086f90c58b8a3bdaa5852235e89b8d0f1ba1da1b95b89f2c812782ae13b204354668bff09da8431cb3c0378c9af62ca2330f16b236689ea3ea29f23a9cc8bf9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6d9ff2910691663f0e16eaa2e6549292

      SHA1

      248f21f96daec2c800408b343a1ffa69a43785c6

      SHA256

      d077514d5950c0fd9f7cc723bf5f93b524c59d965a643a605f01b418d4bb8cf8

      SHA512

      e10d16b92b075740781ac7cca72c750baccf5ca95309c8e9e4d9b8dcb904d409af3459dea3accf1c7e4ab676a2399b28f775fd6c49778be8a3242031af8e0b56

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      636091e5b663d71708ec79f16fd520ad

      SHA1

      55549a97827c16a66320ef1d080443496b380ef9

      SHA256

      47f3bd7e90b99733f2f1ad5d907fb7462a7135e4153889f6993d8711c41232ac

      SHA512

      5e50ecb313908984218ba05faf3d34f26ce8c163cd090c6cd721b95b1875d500df5307109d29b857a593f8b3e121fd469f512d63418f0b53c9571a50eb45b0ea

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b7b42f4e26fe6bf06a7a014fa2acf7d4

      SHA1

      7b3705c9b2c5bfb71208b36189e79d7e018cd46b

      SHA256

      c9826ae51eefc36efb623653cd1b51f3ded0cd86f46368efbcca669b2171d74d

      SHA512

      92787deabb07e409a78532b30ff9b6dcf7ec6acbf2dea6e0f3c0073fe904afae48d284c19be11bb41bc95aed0ea6387c9a17a9faa8b6725a3798c6f2a00084b5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      8a756c1914e6227adc21cd23b6b99905

      SHA1

      957b56c0dd8c7ed98e6ae23e127be196954c31a7

      SHA256

      921d0d58c3fff864e0cacdf6d1ddbfc2435da4413cce30747af3b19b7840aa7c

      SHA512

      a4104b9217a88517d90dc51a39711b7211da79c589c682d2793fe7446dfa61da332bebbcbbbe150d62a95e2c9fbafe64bb6ab4463aa527f7a8f380076964abd8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b53dcbb063a99e5752218d60e139e1d1

      SHA1

      93b2373a4d61190ca0aad98d00d0df5bd91e4c35

      SHA256

      bf36e3aec70aaa36b7639036861e159e1fe8200da3fb108146430ea050dd42a5

      SHA512

      7c5e3e50a766b513b73d1ab6581fd3281f2f2318cfb604f4ee250de3f850cd4ebe2ba68211d413de727b0a0308a0397a2fe85d7512fe7bb95ccb484b89ab0c68

    • C:\Users\Admin\AppData\Local\EsetSecurity\tmp.exe

      Filesize

      599KB

      MD5

      fdb8081ac26d8de3f7582b2616bcf3e8

      SHA1

      c46856c1394a0b36f7826285db0d72ae494f15f0

      SHA256

      2c2d57d1ea08595db9a8a6c1bf8dbe40fac57a9b784eff00c4095c72fce80e98

      SHA512

      0fdaa8f7c6ce93026fa1ad2e18b0ad31cd0e77afc17763042e841b039a2a1130b4138f34a2d32d8e74bee347f26b40f36d224be8b7f4cd7c2f6917617ff60c98

    • C:\Users\Admin\AppData\Local\EsetSecurity\tmp.exe

      Filesize

      599KB

      MD5

      fdb8081ac26d8de3f7582b2616bcf3e8

      SHA1

      c46856c1394a0b36f7826285db0d72ae494f15f0

      SHA256

      2c2d57d1ea08595db9a8a6c1bf8dbe40fac57a9b784eff00c4095c72fce80e98

      SHA512

      0fdaa8f7c6ce93026fa1ad2e18b0ad31cd0e77afc17763042e841b039a2a1130b4138f34a2d32d8e74bee347f26b40f36d224be8b7f4cd7c2f6917617ff60c98

    • C:\Users\Admin\AppData\Local\EsetSecurity\tmp.exe

      Filesize

      599KB

      MD5

      fdb8081ac26d8de3f7582b2616bcf3e8

      SHA1

      c46856c1394a0b36f7826285db0d72ae494f15f0

      SHA256

      2c2d57d1ea08595db9a8a6c1bf8dbe40fac57a9b784eff00c4095c72fce80e98

      SHA512

      0fdaa8f7c6ce93026fa1ad2e18b0ad31cd0e77afc17763042e841b039a2a1130b4138f34a2d32d8e74bee347f26b40f36d224be8b7f4cd7c2f6917617ff60c98

    • C:\Users\Admin\AppData\Local\Temp\Tar7B12.tmp

      Filesize

      164KB

      MD5

      4ff65ad929cd9a367680e0e5b1c08166

      SHA1

      c0af0d4396bd1f15c45f39d3b849ba444233b3a2

      SHA256

      c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

      SHA512

      f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

    • C:\Users\Admin\AppData\Local\x22nso3f7r\port.dat

      Filesize

      4B

      MD5

      a9c397afa342c368ba24e7620ee41a94

      SHA1

      31e0a028a9f387013af9bfb4221e6aeb61b342be

      SHA256

      07bf8720bc0c7b4e14a105f200baa47df52c688c7f295eaedba8a5dabb77ddea

      SHA512

      cc24430aa496ab47a4763751cbf8276a283549e7becd64abd091c57ec02fbe6618eea2319fec8aa5e892231c906d1e2e9f52d9a33859992bf39d4edde40defe6

    • memory/392-416-0x000000001B300000-0x000000001B380000-memory.dmp

      Filesize

      512KB

    • memory/1048-54-0x0000000001110000-0x00000000011AA000-memory.dmp

      Filesize

      616KB

    • memory/1048-55-0x000000001B080000-0x000000001B100000-memory.dmp

      Filesize

      512KB

    • memory/1240-61-0x00000000003E0000-0x000000000047A000-memory.dmp

      Filesize

      616KB

    • memory/1240-63-0x0000000002200000-0x0000000002280000-memory.dmp

      Filesize

      512KB