Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2023, 17:17

General

  • Target

    Purchase List Xls.exe

  • Size

    1.1MB

  • MD5

    cd8fc2c274368e1343bf8d74c32fa24e

  • SHA1

    535ec18e4fbc9895e3941c396ede59e5d2b8925e

  • SHA256

    f2090573cb87041990365a6fec8532cdc4f1cd9928a1aae37e06d0f1f8a5e9d5

  • SHA512

    0a5c0a46ed84a160e670d0f1decfbde20db2f05c644fdbc0a57e229af57f10be2e4cd5f691ad2dab0dfeed0723424d4ad120e13b25043ea9a9716f712196cb9a

  • SSDEEP

    24576:JCUdkXSFsDBEPaZ03lqSlwvtvl3yd2OluON4fA9uC:sUGJD6PaO1qSlstvl3yd2OluON4fA9u

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.lucd.shop
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    @lucd.shop

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • NirSoft MailPassView 10 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 10 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 15 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Purchase List Xls.exe
    "C:\Users\Admin\AppData\Local\Temp\Purchase List Xls.exe"
    1⤵
    • Looks for VirtualBox Guest Additions in registry
    • Looks for VMWare Tools registry key
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2500
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QAgHtvI" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDEAC.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2540
    • C:\Users\Admin\AppData\Local\Temp\Purchase List Xls.exe
      "{path}"
      2⤵
        PID:2224
      • C:\Users\Admin\AppData\Local\Temp\Purchase List Xls.exe
        "{path}"
        2⤵
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2144
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
          3⤵
          • Accesses Microsoft Outlook accounts
          PID:2740
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"
          3⤵
            PID:1668

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        f716071e52fdf2139ce40b7ba76ae27b

        SHA1

        31634281a2cef5428e3e3fb67dedd106f2de1681

        SHA256

        7c65a621de86b06582055d2e304a35ede86ec7d5238753ffb1835bc3b3fd227b

        SHA512

        3235aeb7c4c03e0393756eed48b3599c552f02699458b3f5a17cd5ea5c7b22ceeae743802fb37a7803ec62698aa8f15617621b641599fd8da62ff2e813bf636e

      • C:\Users\Admin\AppData\Local\Temp\Cab41C3.tmp

        Filesize

        61KB

        MD5

        f3441b8572aae8801c04f3060b550443

        SHA1

        4ef0a35436125d6821831ef36c28ffaf196cda15

        SHA256

        6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

        SHA512

        5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

      • C:\Users\Admin\AppData\Local\Temp\Tar4214.tmp

        Filesize

        163KB

        MD5

        9441737383d21192400eca82fda910ec

        SHA1

        725e0d606a4fc9ba44aa8ffde65bed15e65367e4

        SHA256

        bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

        SHA512

        7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

      • C:\Users\Admin\AppData\Local\Temp\holderwb.txt

        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • C:\Users\Admin\AppData\Local\Temp\tmpDEAC.tmp

        Filesize

        1KB

        MD5

        59babbb853cd3b20c4f30280b447b9fa

        SHA1

        d3be04da8870c96bdc5562c19b494cd1ec1fd4f4

        SHA256

        6b3caceb2b502c16353e08eee2a45deb9cbc3818bec64086f4bbb2d9e7eda691

        SHA512

        c8cd995dc954461c1fe7a12f31e76fceef727ee2698707bf674285457d184ce63d1c70769d6641b91205ef20ddfeb851e2e3a57e8c31fdc305dc2a896295d005

      • memory/1668-38-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/1668-42-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/1668-46-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/1668-40-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/2144-37-0x0000000004D90000-0x0000000004DD0000-memory.dmp

        Filesize

        256KB

      • memory/2144-21-0x0000000000400000-0x0000000000488000-memory.dmp

        Filesize

        544KB

      • memory/2144-13-0x0000000000400000-0x0000000000488000-memory.dmp

        Filesize

        544KB

      • memory/2144-14-0x0000000000400000-0x0000000000488000-memory.dmp

        Filesize

        544KB

      • memory/2144-15-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2144-17-0x0000000000400000-0x0000000000488000-memory.dmp

        Filesize

        544KB

      • memory/2144-19-0x0000000000400000-0x0000000000488000-memory.dmp

        Filesize

        544KB

      • memory/2144-35-0x0000000074130000-0x000000007481E000-memory.dmp

        Filesize

        6.9MB

      • memory/2144-23-0x0000000004D90000-0x0000000004DD0000-memory.dmp

        Filesize

        256KB

      • memory/2144-12-0x0000000000400000-0x0000000000488000-memory.dmp

        Filesize

        544KB

      • memory/2144-22-0x0000000074130000-0x000000007481E000-memory.dmp

        Filesize

        6.9MB

      • memory/2144-29-0x0000000002030000-0x0000000002038000-memory.dmp

        Filesize

        32KB

      • memory/2144-11-0x0000000000400000-0x0000000000488000-memory.dmp

        Filesize

        544KB

      • memory/2144-36-0x0000000004D90000-0x0000000004DD0000-memory.dmp

        Filesize

        256KB

      • memory/2144-32-0x0000000004D90000-0x0000000004DD0000-memory.dmp

        Filesize

        256KB

      • memory/2500-6-0x0000000005D70000-0x0000000005E26000-memory.dmp

        Filesize

        728KB

      • memory/2500-4-0x0000000074130000-0x000000007481E000-memory.dmp

        Filesize

        6.9MB

      • memory/2500-1-0x0000000000040000-0x0000000000164000-memory.dmp

        Filesize

        1.1MB

      • memory/2500-0-0x0000000074130000-0x000000007481E000-memory.dmp

        Filesize

        6.9MB

      • memory/2500-2-0x0000000004D80000-0x0000000004DC0000-memory.dmp

        Filesize

        256KB

      • memory/2500-7-0x0000000005E20000-0x0000000005EA8000-memory.dmp

        Filesize

        544KB

      • memory/2500-3-0x0000000000630000-0x000000000063C000-memory.dmp

        Filesize

        48KB

      • memory/2500-24-0x0000000074130000-0x000000007481E000-memory.dmp

        Filesize

        6.9MB

      • memory/2500-5-0x0000000004D80000-0x0000000004DC0000-memory.dmp

        Filesize

        256KB

      • memory/2740-30-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/2740-48-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/2740-41-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/2740-34-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/2740-33-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB