Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2023, 20:39

General

  • Target

    0bfe6aeb1c0b5ae25c0e499021bb5eb7659fb2209dcdb6a9dc5269e3da934f20.exe

  • Size

    2.6MB

  • MD5

    2b492ae3cd690ae4ca6bdd4a3640967c

  • SHA1

    aabf45b7e168a259deda293c29de3459d3fd470c

  • SHA256

    0bfe6aeb1c0b5ae25c0e499021bb5eb7659fb2209dcdb6a9dc5269e3da934f20

  • SHA512

    ba7cf8def5517933612f337d632d9e582e19a837c791646114a26a5246a854dcab27ae440cd8e2f42cfbba90f41cac954d43cac9b7a31c36717ad8a08228ceef

  • SSDEEP

    24576:+A8vyrepIND/0bfSPdaYpRFoFpR+h+8fEvdDrGnrdEROGHOhdYiWdCMJ5QxlpYCi:+A81IJPVgKEvdDqnroHOwiW0MbQxJHO

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0bfe6aeb1c0b5ae25c0e499021bb5eb7659fb2209dcdb6a9dc5269e3da934f20.exe
    "C:\Users\Admin\AppData\Local\Temp\0bfe6aeb1c0b5ae25c0e499021bb5eb7659fb2209dcdb6a9dc5269e3da934f20.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\Users\Admin\AppData\Local\Temp\0bfe6aeb1c0b5ae25c0e499021bb5eb7659fb2209dcdb6a9dc5269e3da934f20.exe
      "C:\Users\Admin\AppData\Local\Temp\0bfe6aeb1c0b5ae25c0e499021bb5eb7659fb2209dcdb6a9dc5269e3da934f20.exe" Master
      2⤵
      • Enumerates connected drives
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2540
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.173stu.com/my.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2916
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d009fc09ca760a26c16d1b612b6cdc37

    SHA1

    80bacc31979ebea63f03b9793c77569f102bb27f

    SHA256

    8ecb0126b004a594c1cace5534dc31342c133e44126262bb6d5d1639e07bbd54

    SHA512

    6ec2cbc95ecac049393c2d92390009e4d1c02b89411aecfbee9e2052cca337f19f5cf8e167647045e7b053433d30b6f6ef63b9c8f4fe1d5ac728c65f511b5717

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a6bfa02b05a7c77f71d63e3d614630fd

    SHA1

    252797d2c8c57954738f24cf579a8b335e73df5e

    SHA256

    694ee406d18416177326a6a759ffcc34f6da088aeded6e45ddc365fa7d13bea7

    SHA512

    c5b732a526f5dd80ce5a7aa3cbf683d81e5ccfdb78ceadd86436c763c0026c77f23536b52e87afc66dc6f53263deb03c30ee735e85ec4b26bc16042c8dda61a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3be42358956a1fc8093c94bb7700d623

    SHA1

    eeaead5780e4255a07abb4492687f0dcc1b0ba0f

    SHA256

    4106b65bd26d1a1f1fd899deef6195125cdc548bbfaa57d2895241a1246f4881

    SHA512

    c6abadc9b45dddc82aa4b3517bc96bf1eeea0617f6f64b63f52f0013a50049f9262f6c0bc47e23432a9fa27e22aca6bc33b85c8a70a70f791f45383eaf5af704

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1b8ee96719d969719eb6ea9fe4074b0f

    SHA1

    5bfd8ec9c526288723062d3be5a8b94a0c37d87a

    SHA256

    c51ba14a075bfd92c8c805eb09eb7881a37b481836e157480411142c51c248fa

    SHA512

    bd1c092773ad0827a790f411de779190dc578fb4a953259d05560966eb4f1458e84d6cd32748af3e09423bc79406664f626c82dd86f14904e84e5ae879d60a82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    afa9e660b77ec52db481243e68e34cdc

    SHA1

    2e090acbb4e8e3c1eda7d0a9107a2d8876f80ba6

    SHA256

    1c88108c854cb4c0498642588fa50f278a27359ddc61a9143b2798be96e9181f

    SHA512

    13101b0605891d51b18b14abf38f6f69f229870425d308c5ed9db2e45992f918399fc61a14a48c321ed3958bc1756bc7a5b33a66e650f0ffa592b471937750dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aef07bf900d410db7147bfce6353f6b0

    SHA1

    fc61692e2e1ff561dbce8aa674f71cd1ea103787

    SHA256

    d6c688d4fc8324ad9d79aa54d9c193079abff1d6745050944288ef2e1687caab

    SHA512

    cbdd5902844edd56ba2d6034c964e8ecd7ca63e0b2214a9bfc1a8492996d1cd4faefaf7ac7be4a610d448b34953dac01e9f21aa7102c4aa866028facfe1c185f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    64df761d54e9c5a1b6d9030f226a48db

    SHA1

    cf7b8cd718e4ebb68ede9b15dcbed3d96cfb8401

    SHA256

    0043467d1af5542d04b4ea04850fd6906316fa2b1a1ec066c30de8a495be4928

    SHA512

    d24464fb6ecc8893c5bc1985fbe1cff95ebe9a0e1a6212828c27f56b4063ca4d40ebf1cd0b54e7d64938d5d095036bb0ad0c910f2321048de7befdbd55ff3db6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1d41014f12bb7e223dae7c7da8eaa3de

    SHA1

    8bab95de3972e737368784faf297173a4e945d21

    SHA256

    272215c1698247fb0cad2acd4f27e8073f1b46d1eb06bdd6132f015f9e9dbda5

    SHA512

    e4d3c94245428c21162ee4dabd7e0819c199b9d796f5290b9a6b67ef95db8b72cb632821da642907cfadbf11babf5f76889f673b634c5c79c2a0ee7e6ec7e3f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aeb30e7869b7a9d875ad742aeab362cd

    SHA1

    0fa03d90a871dd1635332bf154b1e5aaedf87655

    SHA256

    95ac6de536b88c6f2762b302f5075dab8fe713e1086db2d0d9e0aa8882eb6f34

    SHA512

    7237b2325987d626a545db18c128addbeeb078ac3dff7f5a5d7ca84c4d1c625cb277083fc908b09e692c249e885abd81b00533f1c93adfe50d1043bcfd8e769c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    79c24ee56ac5d85852d0372a570df509

    SHA1

    ae7a4d27bae8fd0434e86a8e470eefa856716515

    SHA256

    9ed0a0b575348d413e9db18281f7ca6fddeb934e8ba08e26aae9552eb4f30c49

    SHA512

    6aaf60717439a117e5b495d53bc695d4439386bbaabfbfe6c79cfa905ba08c176980b08704c4bdd48726d84fde83cdfae5839cebd34e12211f32ce9faac7e25b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f54e5262d4500bfac815ae539d6bd1b7

    SHA1

    726a0e93c32aa449d94a55ff6698fd084b3fd109

    SHA256

    441cac5dad0e3e8b548993a4940f60e0b775f7d06082885f22d448d25c4f0cf2

    SHA512

    ee7e03c1f6475cd3efa1565bb783f95da9e87cc62cbe4353e2f257a261a797eff45b10f8f5bc5f572af1df68b8c2b57b311fb44f3f8a1ae115584802aa18e07d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1d343da6efc2ddc2a6663ed763b0ee5f

    SHA1

    9da5c6dcffe3be2a0ca768169a236bcf2b12cb6b

    SHA256

    94946d796e9d6cd69767ce702e762938fef7ba8c325fa263d3f5cc3d78692b18

    SHA512

    a61ac0cd269cea38bf7f72278b8ac3384be597a9175a0c64582981d767014992b31cdcc6521409e278ed6cf7d4d7bb5abcb13a07346d59f9cf81ce0ba413821b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    04999f023f622d0daee9ebf52aec74bc

    SHA1

    c9607fb0b63016f2bc003c034f1833e10eca0b19

    SHA256

    34eef9d73f23cba0c2a1a0a27b65ed1741c54b40c2500f258280728c5a510725

    SHA512

    655834719d663e8ee66e639e170b981e300f12c33785a77626c7f42035f03e4f4965f2fc3a9207ba9921d51805882dbeb81bf0500576f5a33e668ef6f5b8bb63

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5e596f780e5f5ab3a97dd2c0da8f0703

    SHA1

    28c6f6b33de9dda1c459f9fab54c3c3935e5fca5

    SHA256

    dbbc985dc789893ead8a3e037ccf1f4a8aef93a91876c9bd6fc77b8e10fa3c5b

    SHA512

    1c605315c79478c026f03b50c842b6ff2ad01fad48ca9bcf6316c162fbab922fad502a266663aef09c4c2f8cfea1e0854257b6371582b21a3cb7214bb3075e21

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    48e007481ba6e3f5e0ed9234afad9030

    SHA1

    b75fb5dc5b03a70c99f4b11a124380fc3390ab81

    SHA256

    2de6ace902499fa0d18e20e7d7f91bd88dff981605fb36432aadc640b0a1b095

    SHA512

    d31a42867e403ef69e1fc42dbcc2affcdf4126794c9641eefc89dca74c9498e1c1920da18a050633ae6ef144216d663e39cf43b4cfda3632f6cf59e26ed59f11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fe7be0fff9abbaadb73182a0244da38a

    SHA1

    889f23f0ab26c4cbb2a9de6380972f928396faaa

    SHA256

    02c556d5787ae12691579dba1606c1d742de9f325ac6f724abf888619039f58f

    SHA512

    78389ac00bc404f491c502626faa99b7d54b07bbdbeba7b1d4e2cc6ffe8730ca3aecab0678ecefbb9d2a4a4aa1356b558f81b7a421e63b8c227d220da04e008b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    55352ca51d32da5c8fc3c11a0bb3775d

    SHA1

    126dad58748dd876f21199b1c44d4ddb86ad75c7

    SHA256

    d16663dbf5d224bdbfc8b6c8eba5fd0262585a5c91ed43b5f3f3c9fbcae0a027

    SHA512

    7abc7b6ffd6b2681532dc2565dfc17b33605aa421bbea17fd882e9725344db267bf751c7a84c0bfe409f7d3e558787f35b50e9cbba103b054542723cecd1416f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e341bdd056cd3cd74ac98b199f74ff1f

    SHA1

    b716d4362e639d96de78192af20cdb3694eecc98

    SHA256

    6d948eda4d96a59b29f70722ab5b73689e65c4680e3445e72e61fb28b9c85d1f

    SHA512

    20b277c27f7b3bf131ad69f8fba18b82f4832cb931ffe3c3270ea46477df68d7bddf7a3f404dc79ae163b905e73f4fb39ea053a7db9bfab30948b25f872b2d49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    95cced8cc6c176f8c479693a3080fe60

    SHA1

    ac0e727672ce4a9c75c19645708d120a1bf49c4e

    SHA256

    78c039e31eb2a08a4f1b660c87a048b42ca334d5a394921f6874c293109e319f

    SHA512

    9aec86596dcc75bcd123d997ad32ae1f81cf82897950dde32e4534164d6d9a5a39af4517d0c78e73ad89e0a961b0ea38cf666ea7915e216573330111f85a378e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3cce9887a47346123b6ed11618797d3c

    SHA1

    52d0fa6c1229c33ee074cb15631dc7b21e3bbbd1

    SHA256

    cc21da9ef6c2fd2fe06638864c9507e6c0c967a9e4de2c43785dde8194437eab

    SHA512

    cf061e89875e1552d5640f762ff46271457caf3e2f6334c3ea33e7ec89a1531164e65d9c9948184555c822a7c0e91e6b35b980a3c5f177b6f5c8af1db5045990

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b6ee35b4e8da0afe3bf7c385d46f409e

    SHA1

    4c8acda9069a34759a03b01540181a4209e4e90e

    SHA256

    80e41830b31d52b48bcf3966495a29e1096ff7e2b52411069d1c60e1f8f0c978

    SHA512

    09d0650896006d0a4f6402625cad5fbadbe9e5fc13279f9babd1e9f13c39d88975d5d52e83863c6a51b26b0b1c4172ea8bd6d5ceeccb8e052cc67b8af3bef9f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b46f6534b5224e7fcd163e5c5df6f147

    SHA1

    6a272e3e544ee88f5e64da7c4b84799acd58cfd1

    SHA256

    5cf02d09a67416412c6dc9b86f307d50994fbd4846640d52ca6105f6d2e039ec

    SHA512

    691385965d22c0d38933ecab9a3f1e48b3f9ee8de2e4a508a24d2d352c63d2b7480d16a4b5fa68019670558a25c6c23a63ca1d7ef65a4a71b435c4403a3f4310

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    63562da2ad6d8962957cbae2096d4e36

    SHA1

    4790bd3b7539eb56f95ff2013b16c6e596dc8c92

    SHA256

    ac37e2cbdbac12cdfb9da9925c4bf183053bc1d286002160abc776b352c3adeb

    SHA512

    eeca2463c454e51cad87184f4bfbd2a4d30c65f6707908a310c620d78ddd60655eb4a0085bc67eaf69084f452f1ced0ed2e36aa8c10bcc561fcac6c361f2ed7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fea8957ade4fbc504d7bfb0b474253d8

    SHA1

    e7e7356e0f031c29468192d7a1c0e7c108c3347c

    SHA256

    48e657f51584efc8e9bb9eff4db8feeaf69964096adf8d0b11eda45617bf8aab

    SHA512

    5c6396153806c800f545b170f756d4dd368d6dd3414449e0151fded963a6a870bdac5f09f07509fd6372e62d66bd409efdf83a4f88629e9b0843c9b569ecca87

  • C:\Users\Admin\AppData\Local\Temp\Cab792.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar831.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • memory/1184-54-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/1184-55-0x0000000000400000-0x000000000069F000-memory.dmp

    Filesize

    2.6MB

  • memory/2540-59-0x0000000000400000-0x000000000069F000-memory.dmp

    Filesize

    2.6MB

  • memory/2540-58-0x0000000000400000-0x000000000069F000-memory.dmp

    Filesize

    2.6MB

  • memory/2540-57-0x0000000000400000-0x000000000069F000-memory.dmp

    Filesize

    2.6MB

  • memory/2540-56-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB