Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    13/07/2023, 14:38

General

  • Target

    qDu.u.exe

  • Size

    889KB

  • MD5

    03c469798bf1827d989f09f346ce95f7

  • SHA1

    05e491bc1b8fbfbfdca24b565f2464137f30691e

  • SHA256

    de87c8713fac002b0b0a0f9b02c4e3ebcccf65282a22f5ab5912a9da00f35c2a

  • SHA512

    d95aed75dd7b2470d4e5052b4b494ad9efbb9eee42c63cf0b38f1d0275ff7b1bb8ee4cbc69d1bb219dbbf33ad3b01cea97f87fa8fe69be7f943aa4417a603238

  • SSDEEP

    24576:mjSsPIqS9jL0rJ3n770E9d8qTtE4n4CucuH:GzyH0ZOqTGQ4CDu

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 13 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 14 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\qDu.u.exe
    "C:\Users\Admin\AppData\Local\Temp\qDu.u.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2372
  • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2296

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    230KB

    MD5

    6926fdd4661a63a2e2302f9a76ff6e43

    SHA1

    8386de26814d2ad3ecc8542e502e0ac49dbce3d4

    SHA256

    528e4fe9712608d98dbabffe0ea8d87ec0eb096db8f3fc14e64179efece0932d

    SHA512

    05a0ce7478d3bdb95b2f27ad1d2c450c14ad023840f60d18c5aee65280b9ebcecb8c1674298666b9be00f5fd9ed8d5890b63e797dbadc77f220cfbd24fef9cd7

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    240KB

    MD5

    f150cf05d6e48accbd5cb55deb9ae357

    SHA1

    ce86a885c8e41eee6dbdcde1603d68cac1dcc837

    SHA256

    d2e24213f575f041217c0b644434df0d82e0af936c803457570a73b5198056b1

    SHA512

    288590ab1182d1a9809d552b89573555cb07a45fb8f73e615dc23dba118995e5ed54e723718f6f6cf263b5392c42430e198b56ce5a3d4bc757689cedaa2a0ca6

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

    Filesize

    1KB

    MD5

    48dd6cae43ce26b992c35799fcd76898

    SHA1

    8e600544df0250da7d634599ce6ee50da11c0355

    SHA256

    7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

    SHA512

    c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

  • \Users\Admin\AppData\Local\Temp\41f820bc.dll

    Filesize

    8KB

    MD5

    d8f4ab8284f0fda871d6834e24bc6f37

    SHA1

    641948e44a1dcfd0ef68910768eb4b1ea6b49d10

    SHA256

    c09d0790e550694350b94ca6b077c54f983c135fab8990df5a75462804150912

    SHA512

    f65a916041846718306567d33273c3d0f41e0b26589cf6db46ec6c788ba0d87a708c94979d3bd0609142badca9e7129690b92169a07dcf7cd8c66698827d2fa0

  • memory/2296-230-0x0000000073D3D000-0x0000000073D48000-memory.dmp

    Filesize

    44KB

  • memory/2296-187-0x000000006CB21000-0x000000006CB22000-memory.dmp

    Filesize

    4KB

  • memory/2296-103-0x0000000073D3D000-0x0000000073D48000-memory.dmp

    Filesize

    44KB

  • memory/2296-102-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2372-68-0x0000000003020000-0x0000000004D63000-memory.dmp

    Filesize

    29.3MB

  • memory/2372-94-0x0000000003020000-0x0000000004D63000-memory.dmp

    Filesize

    29.3MB

  • memory/2372-64-0x0000000003020000-0x0000000004D63000-memory.dmp

    Filesize

    29.3MB

  • memory/2372-65-0x0000000003020000-0x0000000004D63000-memory.dmp

    Filesize

    29.3MB

  • memory/2372-66-0x0000000003020000-0x0000000004D63000-memory.dmp

    Filesize

    29.3MB

  • memory/2372-67-0x0000000003020000-0x0000000004D63000-memory.dmp

    Filesize

    29.3MB

  • memory/2372-54-0x0000000075910000-0x0000000075A20000-memory.dmp

    Filesize

    1.1MB

  • memory/2372-69-0x0000000003020000-0x0000000004D63000-memory.dmp

    Filesize

    29.3MB

  • memory/2372-71-0x0000000061E00000-0x0000000061EC1000-memory.dmp

    Filesize

    772KB

  • memory/2372-90-0x0000000075AB0000-0x0000000075AF7000-memory.dmp

    Filesize

    284KB

  • memory/2372-62-0x0000000003020000-0x0000000004D63000-memory.dmp

    Filesize

    29.3MB

  • memory/2372-63-0x0000000003020000-0x0000000004D63000-memory.dmp

    Filesize

    29.3MB

  • memory/2372-95-0x0000000003020000-0x0000000004D63000-memory.dmp

    Filesize

    29.3MB

  • memory/2372-97-0x0000000003020000-0x0000000004D63000-memory.dmp

    Filesize

    29.3MB

  • memory/2372-61-0x0000000077B30000-0x0000000077B32000-memory.dmp

    Filesize

    8KB

  • memory/2372-59-0x0000000075AB0000-0x0000000075AF7000-memory.dmp

    Filesize

    284KB

  • memory/2372-60-0x0000000075910000-0x0000000075A20000-memory.dmp

    Filesize

    1.1MB

  • memory/2372-58-0x0000000075910000-0x0000000075A20000-memory.dmp

    Filesize

    1.1MB

  • memory/2372-57-0x0000000075AB0000-0x0000000075AF7000-memory.dmp

    Filesize

    284KB

  • memory/2372-56-0x0000000075910000-0x0000000075A20000-memory.dmp

    Filesize

    1.1MB

  • memory/2372-229-0x0000000003020000-0x0000000004D63000-memory.dmp

    Filesize

    29.3MB

  • memory/2372-55-0x0000000075910000-0x0000000075A20000-memory.dmp

    Filesize

    1.1MB

  • memory/2372-238-0x0000000003020000-0x0000000004D63000-memory.dmp

    Filesize

    29.3MB