Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

27/08/2023, 09:11

230827-k5zhrsgf47 10

27/08/2023, 09:04

230827-k1xtdage92 10

Analysis

  • max time kernel
    123s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230824-en
  • resource tags

    arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system
  • submitted
    27/08/2023, 09:11

General

  • Target

    shell-x86.exe

  • Size

    72KB

  • MD5

    731a851ba42100f006f2c6529bafbd93

  • SHA1

    68733cb8fb9692a49fc1335d17b563ede9cddc8c

  • SHA256

    7625ea528bb506a8fb7501348eaf4271070830600dca0ef4be3ea4856844c07f

  • SHA512

    30282a29901fa33dfd4c8222e7d9ed8bae186af76173bfc3cae50b81442b6fc4b99e46a28b6830b5de21f48262cd903933cecd78cd98112d84a8528c448fc93a

  • SSDEEP

    1536:IoFsvW69TtaorCtiwyQNUW+i6Zha5kfit3cMb+KR0Nc8QsJq39:BFsu679QNj+i6y6fitMe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

147.185.221.16:33811

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\shell-x86.exe
    "C:\Users\Admin\AppData\Local\Temp\shell-x86.exe"
    1⤵
      PID:2076
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1512
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6a09758,0x7fef6a09768,0x7fef6a09778
        2⤵
          PID:2188
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1188 --field-trial-handle=1224,i,2244928670715725317,577421824842768862,131072 /prefetch:2
          2⤵
            PID:2272
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1532 --field-trial-handle=1224,i,2244928670715725317,577421824842768862,131072 /prefetch:8
            2⤵
              PID:2160
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1592 --field-trial-handle=1224,i,2244928670715725317,577421824842768862,131072 /prefetch:8
              2⤵
                PID:2280
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2372 --field-trial-handle=1224,i,2244928670715725317,577421824842768862,131072 /prefetch:1
                2⤵
                  PID:2952
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2396 --field-trial-handle=1224,i,2244928670715725317,577421824842768862,131072 /prefetch:1
                  2⤵
                    PID:2296
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1476 --field-trial-handle=1224,i,2244928670715725317,577421824842768862,131072 /prefetch:2
                    2⤵
                      PID:1948
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3252 --field-trial-handle=1224,i,2244928670715725317,577421824842768862,131072 /prefetch:1
                      2⤵
                        PID:2908
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3488 --field-trial-handle=1224,i,2244928670715725317,577421824842768862,131072 /prefetch:8
                        2⤵
                          PID:2592
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3600 --field-trial-handle=1224,i,2244928670715725317,577421824842768862,131072 /prefetch:8
                          2⤵
                            PID:1108
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3596 --field-trial-handle=1224,i,2244928670715725317,577421824842768862,131072 /prefetch:8
                            2⤵
                              PID:2240
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3800 --field-trial-handle=1224,i,2244928670715725317,577421824842768862,131072 /prefetch:1
                              2⤵
                                PID:1016
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3772 --field-trial-handle=1224,i,2244928670715725317,577421824842768862,131072 /prefetch:1
                                2⤵
                                  PID:1360
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=1236 --field-trial-handle=1224,i,2244928670715725317,577421824842768862,131072 /prefetch:1
                                  2⤵
                                    PID:820
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3468 --field-trial-handle=1224,i,2244928670715725317,577421824842768862,131072 /prefetch:1
                                    2⤵
                                      PID:2616
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=2580 --field-trial-handle=1224,i,2244928670715725317,577421824842768862,131072 /prefetch:1
                                      2⤵
                                        PID:2752
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2852 --field-trial-handle=1224,i,2244928670715725317,577421824842768862,131072 /prefetch:1
                                        2⤵
                                          PID:2000
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=1376 --field-trial-handle=1224,i,2244928670715725317,577421824842768862,131072 /prefetch:1
                                          2⤵
                                            PID:2348
                                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                          1⤵
                                            PID:2836
                                          • C:\Windows\system32\cmd.exe
                                            "C:\Windows\system32\cmd.exe"
                                            1⤵
                                              PID:1572
                                              • C:\Windows\system32\ipconfig.exe
                                                ipconfig
                                                2⤵
                                                • Gathers network information
                                                PID:2672

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              61KB

                                              MD5

                                              f3441b8572aae8801c04f3060b550443

                                              SHA1

                                              4ef0a35436125d6821831ef36c28ffaf196cda15

                                              SHA256

                                              6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

                                              SHA512

                                              5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              344B

                                              MD5

                                              03e56e1c8d721906b7d82c12193ed44f

                                              SHA1

                                              2136c34494ee2db2a2a7a10d0c9eb02d3a9e206d

                                              SHA256

                                              269980b6846a309c37999f27c522ac8211f6d99e73ba68f5d81b9274f7adc53e

                                              SHA512

                                              bc721a01b34f4699094372c3c0a0f21b78ed2d0d7fa62884800f14073532ddd4227620840a2d6124bae2f9f6988fe31d12488140d7bbaad860afd442d0baf708

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                              Filesize

                                              264KB

                                              MD5

                                              f50f89a0a91564d0b8a211f8921aa7de

                                              SHA1

                                              112403a17dd69d5b9018b8cede023cb3b54eab7d

                                              SHA256

                                              b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                              SHA512

                                              bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                              Filesize

                                              527B

                                              MD5

                                              5189f24d93d191c4d6ae8aae82d1555e

                                              SHA1

                                              76ac7c5d40b7a9a7748d7f1cc0abf433ca008c48

                                              SHA256

                                              bb847524fbe66ace9754646d83c51e4693f11e08fdc3344b372ca73219a03462

                                              SHA512

                                              f66c5c209d739bafa4065c3c556fb9a6287b4ad90a43303c157d30025e9c80483472449d182350e94caea2340f901c0c0b9021eac0a41353483705119eb9075b

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                              Filesize

                                              5KB

                                              MD5

                                              132cf308707c863df9303357655213fa

                                              SHA1

                                              349a83504050da4b821aa4197d29642bf5743945

                                              SHA256

                                              9a33a8ae413734cfb7630b71404b67af963bc8334f80a980481d3f704d8e0f74

                                              SHA512

                                              7d93e065b40f12f4414829ebbb180f0409fad8d566edda83ff282730f43c88c2e9fbb10abc5aa2e1d4a29443e49329749bd011428135fc77fe880c66b6bcb064

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                              Filesize

                                              4KB

                                              MD5

                                              d9cab72a476cf5fdb4aabccc9b49a1ac

                                              SHA1

                                              e76784797100bfb9b3f4f36d03b61bb50ffe8d77

                                              SHA256

                                              99850e563a4eb02ac6efa79feffac19ec9823cd825d2d4956f8263d9a48cd4de

                                              SHA512

                                              36b4388fe4cade1027b305b7d68118aeb0615e1ecb30c893f9bf3aef7b56a73ac8ad632b1fc0203e02c4854f719a180401e9ae2a301a5d579c14c7ada42ee4b3

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                              Filesize

                                              4KB

                                              MD5

                                              a6c642ac28a884117ff382353c21f5da

                                              SHA1

                                              d2bccf2bc846883401d452adb4d378ec37821e42

                                              SHA256

                                              28f0432dfdf575086b4a0c7aff61d0439484683511eaa6e56868c474e2f7ea02

                                              SHA512

                                              c0b98fa4348e0bbcaddef07b9d5905fccfd7c7c6bd8a752662fb6dadda23339cfcce62ca3cc1dbabd1d5c4127c166c16acdcd7b9b77d53891311b70d2d393b5c

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp

                                              Filesize

                                              16B

                                              MD5

                                              18e723571b00fb1694a3bad6c78e4054

                                              SHA1

                                              afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                              SHA256

                                              8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                              SHA512

                                              43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                            • C:\Users\Admin\AppData\Local\Temp\Cab197C.tmp

                                              Filesize

                                              61KB

                                              MD5

                                              e56ec378251cd65923ad88c1e14d0b6e

                                              SHA1

                                              7f5d986e0a34dd81487f6439fb0446ffa52a712e

                                              SHA256

                                              32ccf567c07b62b6078cf03d097e21cbf7ef67a4ce312c9c34a47f865b3ad0a0

                                              SHA512

                                              2737a622ca45b532aebc202184b3e35cde8684e5296cb1f008e7831921be2895a43f952c1df88d33011a7b9586aafbd88483f6c134cb5e8e98c236f5abb5f3aa

                                            • C:\Users\Admin\AppData\Local\Temp\Tar1D1B.tmp

                                              Filesize

                                              163KB

                                              MD5

                                              9441737383d21192400eca82fda910ec

                                              SHA1

                                              725e0d606a4fc9ba44aa8ffde65bed15e65367e4

                                              SHA256

                                              bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

                                              SHA512

                                              7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

                                            • memory/2076-0-0x0000000000020000-0x0000000000021000-memory.dmp

                                              Filesize

                                              4KB