Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
07/09/2023, 20:49
Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume1/FileHistory/[email protected]/LTP-566/Data/C/Users/SreejithKumaya/D.exe
Resource
win7-20230831-en
General
-
Target
Device/HarddiskVolume1/FileHistory/[email protected]/LTP-566/Data/C/Users/SreejithKumaya/D.exe
-
Size
3.8MB
-
MD5
0afb947cb776933653e23d970a3d8d14
-
SHA1
c8ab072395450ae11a6abf5323922d74c180d24a
-
SHA256
ad08c7d20f5342efc20b4460ad66b0961a423804915012ab2969efe25e1288b5
-
SHA512
ae031402db52a167e6754bf9c04b3f810ad0e2e1202349141f878dc89de6ad1fbfb586d1ef8aee3ca79efa70539dc18ec2da7ca74e3255c01e9956f57d987dc0
-
SSDEEP
98304:zdh4mx3ywXIaszDU5j5eXOUvlDYL5JZNKdSC7ZUY6NsOoWNCCy9R:zP4s3hXIan5e+UNiuF7INNoWdyn
Malware Config
Extracted
cryptbot
tuytee13.top
moriiikk07.top
Signatures
-
CryptBot payload 17 IoCs
resource yara_rule behavioral1/memory/2616-46-0x0000000000350000-0x0000000000850000-memory.dmp family_cryptbot behavioral1/memory/2616-265-0x0000000000350000-0x0000000000850000-memory.dmp family_cryptbot behavioral1/memory/2616-272-0x0000000000350000-0x0000000000850000-memory.dmp family_cryptbot behavioral1/memory/2616-273-0x0000000000350000-0x0000000000850000-memory.dmp family_cryptbot behavioral1/memory/2616-278-0x0000000000350000-0x0000000000850000-memory.dmp family_cryptbot behavioral1/memory/2616-313-0x0000000000350000-0x0000000000850000-memory.dmp family_cryptbot behavioral1/memory/2616-319-0x0000000000350000-0x0000000000850000-memory.dmp family_cryptbot behavioral1/memory/2616-321-0x0000000000350000-0x0000000000850000-memory.dmp family_cryptbot behavioral1/memory/2616-323-0x0000000000350000-0x0000000000850000-memory.dmp family_cryptbot behavioral1/memory/2616-326-0x0000000000350000-0x0000000000850000-memory.dmp family_cryptbot behavioral1/memory/2616-328-0x0000000000350000-0x0000000000850000-memory.dmp family_cryptbot behavioral1/memory/2616-330-0x0000000000350000-0x0000000000850000-memory.dmp family_cryptbot behavioral1/memory/2616-333-0x0000000000350000-0x0000000000850000-memory.dmp family_cryptbot behavioral1/memory/2616-335-0x0000000000350000-0x0000000000850000-memory.dmp family_cryptbot behavioral1/memory/2616-337-0x0000000000350000-0x0000000000850000-memory.dmp family_cryptbot behavioral1/memory/2616-340-0x0000000000350000-0x0000000000850000-memory.dmp family_cryptbot behavioral1/memory/2616-342-0x0000000000350000-0x0000000000850000-memory.dmp family_cryptbot -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup1.exe -
Blocklisted process makes network request 4 IoCs
flow pid Process 4 1928 CScript.exe 5 1928 CScript.exe 7 1928 CScript.exe 8 1928 CScript.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Setup1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Setup1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1.exe -
Executes dropped EXE 2 IoCs
pid Process 2616 1.exe 2612 Setup1.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Wine 1.exe Key opened \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Wine Setup1.exe -
Loads dropped DLL 10 IoCs
pid Process 1880 D.exe 1880 D.exe 1880 D.exe 1880 D.exe 2616 1.exe 2616 1.exe 2616 1.exe 1880 D.exe 2612 Setup1.exe 2612 Setup1.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2616 1.exe 2612 Setup1.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\NextGen\lanret\1.exe D.exe File created C:\Program Files (x86)\NextGen\lanret\Setup1.exe D.exe File created C:\Program Files (x86)\NextGen\lanret\Setup1.vbs D.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Setup1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2616 1.exe 2612 Setup1.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2616 1.exe 2616 1.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1880 wrote to memory of 1928 1880 D.exe 28 PID 1880 wrote to memory of 1928 1880 D.exe 28 PID 1880 wrote to memory of 1928 1880 D.exe 28 PID 1880 wrote to memory of 1928 1880 D.exe 28 PID 1880 wrote to memory of 1928 1880 D.exe 28 PID 1880 wrote to memory of 1928 1880 D.exe 28 PID 1880 wrote to memory of 1928 1880 D.exe 28 PID 1880 wrote to memory of 2616 1880 D.exe 30 PID 1880 wrote to memory of 2616 1880 D.exe 30 PID 1880 wrote to memory of 2616 1880 D.exe 30 PID 1880 wrote to memory of 2616 1880 D.exe 30 PID 1880 wrote to memory of 2616 1880 D.exe 30 PID 1880 wrote to memory of 2616 1880 D.exe 30 PID 1880 wrote to memory of 2616 1880 D.exe 30 PID 1880 wrote to memory of 2612 1880 D.exe 31 PID 1880 wrote to memory of 2612 1880 D.exe 31 PID 1880 wrote to memory of 2612 1880 D.exe 31 PID 1880 wrote to memory of 2612 1880 D.exe 31 PID 1880 wrote to memory of 2612 1880 D.exe 31 PID 1880 wrote to memory of 2612 1880 D.exe 31 PID 1880 wrote to memory of 2612 1880 D.exe 31 PID 2612 wrote to memory of 2204 2612 Setup1.exe 34 PID 2612 wrote to memory of 2204 2612 Setup1.exe 34 PID 2612 wrote to memory of 2204 2612 Setup1.exe 34 PID 2612 wrote to memory of 2204 2612 Setup1.exe 34 PID 2612 wrote to memory of 2204 2612 Setup1.exe 34 PID 2612 wrote to memory of 2204 2612 Setup1.exe 34 PID 2612 wrote to memory of 2204 2612 Setup1.exe 34 PID 2612 wrote to memory of 2704 2612 Setup1.exe 36 PID 2612 wrote to memory of 2704 2612 Setup1.exe 36 PID 2612 wrote to memory of 2704 2612 Setup1.exe 36 PID 2612 wrote to memory of 2704 2612 Setup1.exe 36 PID 2612 wrote to memory of 2704 2612 Setup1.exe 36 PID 2612 wrote to memory of 2704 2612 Setup1.exe 36 PID 2612 wrote to memory of 2704 2612 Setup1.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume1\FileHistory\[email protected]\LTP-566\Data\C\Users\SreejithKumaya\D.exe"C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume1\FileHistory\[email protected]\LTP-566\Data\C\Users\SreejithKumaya\D.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\CScript.exe"C:\Windows\system32\CScript.exe" "C:\Program Files (x86)\NextGen\lanret\Setup1.vbs" //e:vbscript //B //NOLOGO2⤵
- Blocklisted process makes network request
PID:1928
-
-
C:\Program Files (x86)\NextGen\lanret\1.exe"C:\Program Files (x86)\NextGen\lanret\1.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2616
-
-
C:\Program Files (x86)\NextGen\lanret\Setup1.exe"C:\Program Files (x86)\NextGen\lanret\Setup1.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\cvtssltnlvfn.exe"3⤵PID:2204
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\ohxvlklaw.exe"3⤵PID:2704
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD54632afa001ad4b9b2fa32a73deee9be2
SHA1027bc0b083ecf0694622f570fb0dac89fbb6f8a4
SHA256c4b1a76190d578a545a01940f158af937849920ab0e3eaef5688db745cb6aa58
SHA5124c025455316cc015d0b32a83d5002b804d0a384bc44dd6cc6c60f5aac100746c5d353d9bd7b5b11c27195354c77fdc170f5d9cdbd7bc75082e951afb682ac7ec
-
Filesize
2.0MB
MD54632afa001ad4b9b2fa32a73deee9be2
SHA1027bc0b083ecf0694622f570fb0dac89fbb6f8a4
SHA256c4b1a76190d578a545a01940f158af937849920ab0e3eaef5688db745cb6aa58
SHA5124c025455316cc015d0b32a83d5002b804d0a384bc44dd6cc6c60f5aac100746c5d353d9bd7b5b11c27195354c77fdc170f5d9cdbd7bc75082e951afb682ac7ec
-
Filesize
2.0MB
MD54632afa001ad4b9b2fa32a73deee9be2
SHA1027bc0b083ecf0694622f570fb0dac89fbb6f8a4
SHA256c4b1a76190d578a545a01940f158af937849920ab0e3eaef5688db745cb6aa58
SHA5124c025455316cc015d0b32a83d5002b804d0a384bc44dd6cc6c60f5aac100746c5d353d9bd7b5b11c27195354c77fdc170f5d9cdbd7bc75082e951afb682ac7ec
-
Filesize
2.1MB
MD556223d505921bba6a2eaed8efbc2586a
SHA1a52b467278904f6cc309fc56bc45adc710f47c1e
SHA256d1fb6a1beb12ae8f0fa8570c80515602c07ad9f22e22a8d92b8c9d0f26850dd8
SHA5129ef9bd969a1c3f894bacd60d13139aecfdd49b585fec4d9aa66f080a8ce1b3592f51a33043a51a7bfd9dd9f7afb9e5687a4cea2f0cdd85b38603df1954b19718
-
Filesize
2.1MB
MD556223d505921bba6a2eaed8efbc2586a
SHA1a52b467278904f6cc309fc56bc45adc710f47c1e
SHA256d1fb6a1beb12ae8f0fa8570c80515602c07ad9f22e22a8d92b8c9d0f26850dd8
SHA5129ef9bd969a1c3f894bacd60d13139aecfdd49b585fec4d9aa66f080a8ce1b3592f51a33043a51a7bfd9dd9f7afb9e5687a4cea2f0cdd85b38603df1954b19718
-
Filesize
126B
MD53ffc26d751f79fb801ecbb715885e852
SHA1f54da1552aabfbf68ef07fa98234a8a1ff789a16
SHA2568816d2a6adff6e256c6f478c46b283991feeb28dedc384914fe35f14f673d5d6
SHA51208e00923d92f9141ec09ed420738126883772e359e6fc2e703a293020d0bb42b915d2a9961ba03676ab2ad43d8f4563b46778e119f22007073b1d9f1124c0d24
-
Filesize
7KB
MD5c0f246045ab54b6c18abbff8bea2a64b
SHA12dc531d7056bae13e88f8d88e8c5d6c8acdfa5bf
SHA2568ff65dee826edad6f14057db512cdf3becb49f440d9b6994a33ee7400af7e813
SHA5126b0e8884cc2b2a9df1e8ade6004460e231f619fd0ac61db01d1727a7e0a5b3d527e7cec53aa31b8dbf10fb271b404742da54925aaefe7e6c3813dc34e9f6585b
-
Filesize
3KB
MD564324acb2b6b9422185e365852d49f0a
SHA115c28af2a601414961bb4321e075d48192bf1dd4
SHA256a9cda10fe4a79e1909cb53060d954c7c6cf37a7b1c6bc878750826e5188cb57b
SHA51206dd570eaae292b42c2f3a0d9c48f3cc2e9730c086e0d7e175f79c6807a0b55e2fe7e1aeb9fa75e2eb26b0a3ad8d77d686b49d7fef9a21b4da19798fdb6a2a10
-
Filesize
47KB
MD5db7080965fd395a51097ef4580875976
SHA1d1c14bc69b609590fa5718f168dbab560111ce74
SHA2567d9c01140e94caf7cf4503efb7b6a6ef06a2ba0e47221db455fec51cc694e41b
SHA5121492b49810313b30f041894d58108021c366d235c58b29be82ed6fe9256a91c63c5a4737a0b462934906063ba85c35f5aace37cf3807395cb1d3a278da66b5d4
-
Filesize
8KB
MD5382a4fb241d87d5a0841001defa45508
SHA100d391e7ac35634de4961e8c1cf266829de3e3d3
SHA256a83dae60b0f4483e237849addf7f7d2e2fb9b8fce51e9f21c60dc532b915f19e
SHA5121024c917f3dfb11a93733fa55771169c7d7f3db5b3a693a75ef78266a50993c26be56c4913ea6954a822a5b464a407452744c7f8649bd99395aabdc7c45bcfbb
-
Filesize
40KB
MD52d450ecfc1e702778c7d4dfdb364817e
SHA132b2d635087390bc7f4bebd7a9fd89d9d9f3f898
SHA25665d5ed0c6b53c8d417ac43d5fb35b7b30270a243bae8d75884fca200a1782e7b
SHA5122853273d8b686268143be907dd0cf062a6e4aa250c557395e9ea596f62cb9e28bdeacc0ec02fa4449cbc38d79f5a12e1cbae0b1ff93244495f2d1411fc2d4884
-
Filesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
Filesize
6KB
MD5132e6153717a7f9710dcea4536f364cd
SHA1e39bc82c7602e6dd0797115c2bd12e872a5fb2ab
SHA256d29afce2588d8dd7bb94c00ca91cac0e85b80ffa6b221f5ffcb83a2497228eb2
SHA5129aeb0b3051ce07fb9f03dfee7cea4a5e423425e48cb538173bd2a167817f867a30bd4d27d07875f27ca00031745b24547030b7f146660b049fa717590f1c77e1
-
Filesize
2.0MB
MD54632afa001ad4b9b2fa32a73deee9be2
SHA1027bc0b083ecf0694622f570fb0dac89fbb6f8a4
SHA256c4b1a76190d578a545a01940f158af937849920ab0e3eaef5688db745cb6aa58
SHA5124c025455316cc015d0b32a83d5002b804d0a384bc44dd6cc6c60f5aac100746c5d353d9bd7b5b11c27195354c77fdc170f5d9cdbd7bc75082e951afb682ac7ec
-
Filesize
2.0MB
MD54632afa001ad4b9b2fa32a73deee9be2
SHA1027bc0b083ecf0694622f570fb0dac89fbb6f8a4
SHA256c4b1a76190d578a545a01940f158af937849920ab0e3eaef5688db745cb6aa58
SHA5124c025455316cc015d0b32a83d5002b804d0a384bc44dd6cc6c60f5aac100746c5d353d9bd7b5b11c27195354c77fdc170f5d9cdbd7bc75082e951afb682ac7ec
-
Filesize
2.0MB
MD54632afa001ad4b9b2fa32a73deee9be2
SHA1027bc0b083ecf0694622f570fb0dac89fbb6f8a4
SHA256c4b1a76190d578a545a01940f158af937849920ab0e3eaef5688db745cb6aa58
SHA5124c025455316cc015d0b32a83d5002b804d0a384bc44dd6cc6c60f5aac100746c5d353d9bd7b5b11c27195354c77fdc170f5d9cdbd7bc75082e951afb682ac7ec
-
Filesize
2.0MB
MD54632afa001ad4b9b2fa32a73deee9be2
SHA1027bc0b083ecf0694622f570fb0dac89fbb6f8a4
SHA256c4b1a76190d578a545a01940f158af937849920ab0e3eaef5688db745cb6aa58
SHA5124c025455316cc015d0b32a83d5002b804d0a384bc44dd6cc6c60f5aac100746c5d353d9bd7b5b11c27195354c77fdc170f5d9cdbd7bc75082e951afb682ac7ec
-
Filesize
2.0MB
MD54632afa001ad4b9b2fa32a73deee9be2
SHA1027bc0b083ecf0694622f570fb0dac89fbb6f8a4
SHA256c4b1a76190d578a545a01940f158af937849920ab0e3eaef5688db745cb6aa58
SHA5124c025455316cc015d0b32a83d5002b804d0a384bc44dd6cc6c60f5aac100746c5d353d9bd7b5b11c27195354c77fdc170f5d9cdbd7bc75082e951afb682ac7ec
-
Filesize
2.1MB
MD556223d505921bba6a2eaed8efbc2586a
SHA1a52b467278904f6cc309fc56bc45adc710f47c1e
SHA256d1fb6a1beb12ae8f0fa8570c80515602c07ad9f22e22a8d92b8c9d0f26850dd8
SHA5129ef9bd969a1c3f894bacd60d13139aecfdd49b585fec4d9aa66f080a8ce1b3592f51a33043a51a7bfd9dd9f7afb9e5687a4cea2f0cdd85b38603df1954b19718
-
Filesize
2.1MB
MD556223d505921bba6a2eaed8efbc2586a
SHA1a52b467278904f6cc309fc56bc45adc710f47c1e
SHA256d1fb6a1beb12ae8f0fa8570c80515602c07ad9f22e22a8d92b8c9d0f26850dd8
SHA5129ef9bd969a1c3f894bacd60d13139aecfdd49b585fec4d9aa66f080a8ce1b3592f51a33043a51a7bfd9dd9f7afb9e5687a4cea2f0cdd85b38603df1954b19718
-
Filesize
2.1MB
MD556223d505921bba6a2eaed8efbc2586a
SHA1a52b467278904f6cc309fc56bc45adc710f47c1e
SHA256d1fb6a1beb12ae8f0fa8570c80515602c07ad9f22e22a8d92b8c9d0f26850dd8
SHA5129ef9bd969a1c3f894bacd60d13139aecfdd49b585fec4d9aa66f080a8ce1b3592f51a33043a51a7bfd9dd9f7afb9e5687a4cea2f0cdd85b38603df1954b19718
-
Filesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
Filesize
6KB
MD5132e6153717a7f9710dcea4536f364cd
SHA1e39bc82c7602e6dd0797115c2bd12e872a5fb2ab
SHA256d29afce2588d8dd7bb94c00ca91cac0e85b80ffa6b221f5ffcb83a2497228eb2
SHA5129aeb0b3051ce07fb9f03dfee7cea4a5e423425e48cb538173bd2a167817f867a30bd4d27d07875f27ca00031745b24547030b7f146660b049fa717590f1c77e1