Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

05/10/2023, 14:00

231005-raznlsdd59 4

30/09/2023, 17:52

230930-wf1kbaga24 7

30/09/2023, 17:50

230930-went5aee6t 7

30/09/2023, 17:07

230930-vmytmaeb71 3

Analysis

  • max time kernel
    253s
  • max time network
    254s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    30/09/2023, 17:52

General

  • Target

    loader.bin.exe

  • Size

    5.7MB

  • MD5

    fd2d84bee10bbccb7b590e1025752873

  • SHA1

    c0fbb34903a19dcf4591ba7f88c3995d183fefe8

  • SHA256

    1bb662d598172326e5ddd54f879bae3a6fea58742af0f44bd3934003da625384

  • SHA512

    87ed02ad109845b34f8f70237a2e3a51f607dac89e795f1c3b5fad019630c2a2756c2be51c7f25e04c2d4246b68803ef2b43c002155a3d660a2f66911c891add

  • SSDEEP

    98304:3453W8vYIC+RgZkKIXfEIeYUAlLc3A6fv4i/NTJVLpxrOw1xitse3Jk9yfPDnmY:o53W83p5XfEI5WNn4QNtVLXrOw2TSsfS

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\loader.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\loader.bin.exe"
    1⤵
      PID:508
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4464
      • C:\Users\Admin\Desktop\loader.bin.exe
        "C:\Users\Admin\Desktop\loader.bin.exe"
        1⤵
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:220
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c cls
          2⤵
            PID:3020
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c cls
            2⤵
              PID:4280
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c wmic baseboard get product
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2748
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic baseboard get product
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:4372
          • C:\Windows\system32\taskmgr.exe
            "C:\Windows\system32\taskmgr.exe" /4
            1⤵
            • Drops file in Windows directory
            • Checks SCSI registry key(s)
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:3444
          • C:\Users\Admin\Desktop\loader.bin.exe
            "C:\Users\Admin\Desktop\loader.bin.exe"
            1⤵
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4848
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c cls
              2⤵
                PID:2828
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c cls
                2⤵
                  PID:4172
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c cls
                  2⤵
                    PID:792
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c cls
                    2⤵
                      PID:1104
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c cls
                      2⤵
                        PID:5048
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c cls
                        2⤵
                          PID:4480
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c cls
                          2⤵
                            PID:5096
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c cls
                            2⤵
                              PID:1272
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c cls
                              2⤵
                                PID:3440
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c cls
                                2⤵
                                  PID:868
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c cls
                                  2⤵
                                    PID:1716
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c wmic baseboard get product
                                    2⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:5116
                                    • C:\Windows\System32\Wbem\WMIC.exe
                                      wmic baseboard get product
                                      3⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4132
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c cls
                                    2⤵
                                      PID:4244
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c cls
                                      2⤵
                                        PID:1392
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c cls
                                        2⤵
                                          PID:5104
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c cls
                                          2⤵
                                            PID:2116
                                        • C:\Users\Admin\Desktop\loader.bin.exe
                                          "C:\Users\Admin\Desktop\loader.bin.exe"
                                          1⤵
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1692
                                        • C:\Users\Admin\Desktop\loader.bin.exe
                                          "C:\Users\Admin\Desktop\loader.bin.exe"
                                          1⤵
                                          • Suspicious use of SetWindowsHookEx
                                          • Suspicious use of WriteProcessMemory
                                          PID:1948
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c cls
                                            2⤵
                                              PID:2496
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c cls
                                              2⤵
                                                PID:1488
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c cls
                                                2⤵
                                                  PID:3844
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c cls
                                                  2⤵
                                                    PID:3756
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c cls
                                                    2⤵
                                                      PID:3032
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c cls
                                                      2⤵
                                                        PID:2996
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c cls
                                                        2⤵
                                                          PID:3028
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c cls
                                                          2⤵
                                                            PID:3576
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c wmic baseboard get product
                                                            2⤵
                                                            • Suspicious use of WriteProcessMemory
                                                            PID:4460
                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                              wmic baseboard get product
                                                              3⤵
                                                                PID:2692
                                                          • C:\Windows\system32\taskmgr.exe
                                                            "C:\Windows\system32\taskmgr.exe" /4
                                                            1⤵
                                                            • Drops file in Windows directory
                                                            • Checks SCSI registry key(s)
                                                            • Modifies registry class
                                                            PID:4008

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PRICache\1601268389\3877292338.pri

                                                            Filesize

                                                            162KB

                                                            MD5

                                                            0d02b03a068d671348931cc20c048422

                                                            SHA1

                                                            67b6deacf1303acfcbab0b158157fdc03a02c8d5

                                                            SHA256

                                                            44f4263d65889ea8f0db3c6e31a956a4664e9200aba2612c9be7016feeb323c0

                                                            SHA512

                                                            805e7b4fafed39dec5ecc2ede0c65b6e103e6757e0bd43ecdce7c00932f59e3e7a68d2ea0818244dfeb691b022c1ccca590a3f4239f99e1cd8a29ba66daed358

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PRICache\4183903823\810424605.pri

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            a2942665b12ed000cd2ac95adef8e0cc

                                                            SHA1

                                                            ac194f8d30f659131d1c73af8d44e81eccab7fde

                                                            SHA256

                                                            bdc5de6c42c523a333c26160d212c62385b03f5ebdae5aa8c5d025ff3f8aa374

                                                            SHA512

                                                            4e5ba962ba97656974c390b45302d60f4c82d604feb6199d44e80497a40d0b0a9fd119ca17ac184809ca0821ab6813292892c433ed7277f65c275f37a96070b9

                                                          • memory/220-0-0x0000000001FF0000-0x00000000020F0000-memory.dmp

                                                            Filesize

                                                            1024KB