Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

27/06/2023, 13:49

230627-q4s79afb4z 10

Analysis

  • max time kernel
    68s
  • max time network
    97s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    27/06/2023, 13:49

General

  • Target

    cstealer-main.zip

  • Size

    274KB

  • MD5

    667856148348ce8f7ca144d328e97a5a

  • SHA1

    3b35be4a8d4b22528bc489c2026c5d1c1613f752

  • SHA256

    c63eeb3e872b93ebce0ff49a3524133dc099017763c73dfe3779ee031f525053

  • SHA512

    f25828f0c968f37a0c6e894fb0fbdcbf07255b94bd8c80f5c869c9a0ffbb8f328406a7214ced7f7bdaed58269259cb75aedab0eaa2ca8ba4f70477232321545d

  • SSDEEP

    6144:YK5pgyXcEWA66T423Ynx86ZAxI+1hKOVCnc66aMhX82BStisi:xjVFD423426ZA+w09mx9Bwi

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\cstealer-main.zip
    1⤵
      PID:940
    • C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE" C:\Users\Admin\Desktop\UseLock.pub
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:928
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:884
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\UpdateRevoke.vbe"
        1⤵
          PID:1956
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\SyncUnpublish.ocx
          1⤵
            PID:1108
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe"
            1⤵
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:1592
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5d79758,0x7fef5d79768,0x7fef5d79778
              2⤵
                PID:1632
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1176 --field-trial-handle=1296,i,10387867935724785529,12345435904538499420,131072 /prefetch:2
                2⤵
                  PID:1564
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1468 --field-trial-handle=1296,i,10387867935724785529,12345435904538499420,131072 /prefetch:8
                  2⤵
                    PID:952
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1612 --field-trial-handle=1296,i,10387867935724785529,12345435904538499420,131072 /prefetch:8
                    2⤵
                      PID:1216
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2128 --field-trial-handle=1296,i,10387867935724785529,12345435904538499420,131072 /prefetch:1
                      2⤵
                        PID:2076
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2136 --field-trial-handle=1296,i,10387867935724785529,12345435904538499420,131072 /prefetch:1
                        2⤵
                          PID:2084
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1204 --field-trial-handle=1296,i,10387867935724785529,12345435904538499420,131072 /prefetch:2
                          2⤵
                            PID:2496
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3696 --field-trial-handle=1296,i,10387867935724785529,12345435904538499420,131072 /prefetch:2
                            2⤵
                              PID:2640
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2572 --field-trial-handle=1296,i,10387867935724785529,12345435904538499420,131072 /prefetch:1
                              2⤵
                                PID:2720
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3900 --field-trial-handle=1296,i,10387867935724785529,12345435904538499420,131072 /prefetch:8
                                2⤵
                                  PID:2740
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4032 --field-trial-handle=1296,i,10387867935724785529,12345435904538499420,131072 /prefetch:8
                                  2⤵
                                    PID:2748
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3900 --field-trial-handle=1296,i,10387867935724785529,12345435904538499420,131072 /prefetch:8
                                    2⤵
                                      PID:2936
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4156 --field-trial-handle=1296,i,10387867935724785529,12345435904538499420,131072 /prefetch:8
                                      2⤵
                                        PID:2944
                                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                      1⤵
                                        PID:2160

                                      Network

                                      MITRE ATT&CK Enterprise v6

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\07b8aa56-8610-4efd-9582-828f742a32c3.tmp

                                        Filesize

                                        176KB

                                        MD5

                                        1b6e6c4b25d3c07cff0065618c660e1b

                                        SHA1

                                        70ba6c900297538b1cb6d04910b13a021b0c79ee

                                        SHA256

                                        15adee591280156fc3c783ad2afb5bf902aa5b8298df3a91d9d8719008dbc51b

                                        SHA512

                                        25e16240131c9249f0bbf870e914a4334077d5665219d785987021b3126377dbd190cebc530758e43106121973cdcfec9a396e989102d135f6a1193d2e87a477

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\598c638d-0dbc-4fdd-9477-e412c325f776.tmp

                                        Filesize

                                        4KB

                                        MD5

                                        88044a89394bca2353c6d655c32849d6

                                        SHA1

                                        668e2b3f33d5fccdfe30a4a5b09e7f3b2c0229a7

                                        SHA256

                                        645a1204dc72b958f237e584e53aac16412ad34e14fe7ce1c39cdd365574d0cb

                                        SHA512

                                        dee246c47fde9d706cdc043bd1cfe8a0208392ca790ef47749123618a45243708a47a2251335c8ed0a6f408e4b53ae7ab2b0d4109121c09517d23426b6839273

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                        Filesize

                                        264KB

                                        MD5

                                        f50f89a0a91564d0b8a211f8921aa7de

                                        SHA1

                                        112403a17dd69d5b9018b8cede023cb3b54eab7d

                                        SHA256

                                        b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                        SHA512

                                        bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        4KB

                                        MD5

                                        89f3547c155655c7c23e31879a8dfff1

                                        SHA1

                                        c3fafc4f7166e7299ff4018066595ce0c69e41dd

                                        SHA256

                                        0d6bdbfd49e4fd16ff49c433e916e6b2dbdbcfe647c5e03e8aed4fba0d250560

                                        SHA512

                                        06bb0cffc8a7448d101905abae5762ee930e4cebd528847b431003c524abe1a0653c7c2a27d3766c9daf8f436a694cb9f59a55d6da6ebfb0f21a1906420189d0

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000004.dbtmp

                                        Filesize

                                        16B

                                        MD5

                                        6752a1d65b201c13b62ea44016eb221f

                                        SHA1

                                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                        SHA256

                                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                        SHA512

                                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                        Filesize

                                        176KB

                                        MD5

                                        76d38b4347c2ccb3653cbffbffd1da1d

                                        SHA1

                                        94c8de750906d9e7992ea667d681f28b231712f6

                                        SHA256

                                        5a4fd457c4271408ed0360549b4b441be119828b51371bc61994a5382ca6cdeb

                                        SHA512

                                        aa0029dde3fee1d110c59ce496d13be874c0debe1d82a89ab96c36d33384857b3c2439337ddb46f80ab1b5aee3c3be7aaf4d5d33cc37a806113e631adb05fd1e

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                        Filesize

                                        89KB

                                        MD5

                                        34c663542bef68a89d82be45404bc432

                                        SHA1

                                        f912cc2063fdfbf1d290813418a57544dec7ebbe

                                        SHA256

                                        320d53f19dbdef14662924ec3fd81b202ee6562290af0bb06e2086432888d47d

                                        SHA512

                                        e232c8695e9c36ee2ae59ac575aad3ca6ae61c24f12f53ccb77a4a5b5148708764b8c9168701e7f8115a84f1d6aa5fdbb45e8ea5b25c5c66ee31dd9756687743

                                      • memory/928-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/928-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

                                        Filesize

                                        64KB