Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 10:37

General

  • Target

    921da7c05742f22eae4dbe1141e35ac2ba7006da5702c6fb4969f13709205db8.exe

  • Size

    12KB

  • MD5

    95ba731fe5b6b6ccae02eb89bfeeb5db

  • SHA1

    a200dd2068f6dc734a9937d573d602622f8d00a8

  • SHA256

    921da7c05742f22eae4dbe1141e35ac2ba7006da5702c6fb4969f13709205db8

  • SHA512

    662645ecacc2fc62becb5c7529634dd65c31d5e55381248ca69c7c019689fa4d1aa418d3efed1653c3198d92404afa6c957c8918a4383b520214f87ae6c7c6c9

  • SSDEEP

    192:FmS1Xdn5wLpYXQEuS7wyEPQO0llY3Dvz0EoNH6TnF57OU:JvnuVYgvYOr3boEiH0ZOU

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\921da7c05742f22eae4dbe1141e35ac2ba7006da5702c6fb4969f13709205db8.exe
    "C:\Users\Admin\AppData\Local\Temp\921da7c05742f22eae4dbe1141e35ac2ba7006da5702c6fb4969f13709205db8.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Windows\spoolsv.exe
      "C:\Windows\spoolsv.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://onsapay.com/loader
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2684
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    e41a72acb9307a020b7645fbc5973ffd

    SHA1

    2e369926f080ce0b4b09619dd867e00a3e2d668e

    SHA256

    7dc87d8fdeb34f4b40572b9e6659b39aeebc5c94cf6b9b4861d63ba2fe574504

    SHA512

    9c8099d6e090317a13caac98447b5644e6961cabb2d18933f2db02d1867dc39f59a5646052ae51fafbb2c3511c0908071092b99c55b72f62712542b933b767e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    f49d9c8ce6537222017818787e23d362

    SHA1

    49e9fa94345ce598172d80eab4f4bd743cb3d0ba

    SHA256

    7990563194f0b6e55a2fb7faa3c8688ca623d69d3a4636e7fbb7564ad0c2179f

    SHA512

    5b973760e9ab3b5560038783785c773fec7f331eceeaf0e3a4e841b2ef29081f67467eeadcf81601b27a7d7bbe811bd8fbec65fb72280bdb8053c926dddeff0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    01d30bb2629d118b22a56c8240042d77

    SHA1

    fd094f8d9e83ac072859c0a839587c1594608a0a

    SHA256

    32a77879adc7ab75569a83e10013605435e60cdb1d86826443a61f50398333d8

    SHA512

    1be4fb98ad483de1a517ab38b8c7d9d1b70209aebf8204bad8517b11e2ae641afdb3c1eb627ab675dee89985ddd8a579a1598b228148212036041af4ee0004f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    27101506f54de996e74829bfe0c94ce5

    SHA1

    250e509ce6524f8b23e78ae5beb5357e50e83571

    SHA256

    c6a220d0ad2f2d0301cd6a9930348f5ab96ea349b77931c0f3102f74c8d829e6

    SHA512

    7623c42e179f62660d22052889174a27aa6a8fab34fc4a84e1e6367bc1d0e66e94f02e2b44b0a75f346e6316b7f7d37dc7f7bfcca79ab167286a51232d75f3d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    6912d7c0053feea00109d5c6af862f02

    SHA1

    67f2188cbed70910c81929a709ca3961344375c0

    SHA256

    ef24f765cc68047422da3daa525a8b8b27de286d733eb9a2ce15cb5599eff977

    SHA512

    58ecc54544951e634cafe37f704d3150f45c4a9e248887255d6023b5c3b639553d3124d9588d222df85dcff0c14b5f01193790e6f01577f65830488132fa4a8a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    06e1d430440a767fd012e13c3138d4db

    SHA1

    1b15927410e2319d44a6fe00c97c19de2549425e

    SHA256

    c23feb81360699354cb11e48a1256ec4f8b53fa6792bfc36f6bd23beef62b10b

    SHA512

    57fb188c372722afd3de7c47b1714894d49d32a1a8e08a9c400c8674c853c122c6f5ea686ceeadc6310fdb84e8619ddbf3d7e39e12aaaa7b23aff339aceab113

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    1a3a6f62569c747a5403036a0e4165c2

    SHA1

    304f345a6325c8f0d98cee467b399cdeebb523a9

    SHA256

    71d5325cf9ef2f302f4706489b18ac4a3daa8f71c33a3eb037f0543fad8f46bb

    SHA512

    f6583ce6cf6881298b91f2e4e95ee0286327f4d758762c1e596423ffbdb205b868de6508608fd633b8f64fb93fb4ae3599c292c633d888229a29b38f578af484

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    5a7d24de632a6445e2be32eda1a32567

    SHA1

    338d9ce45e31c67b765c2b297653fac9cf4174cc

    SHA256

    820f922a52a6a522605f34075024be3fe4cbe6be15586dfa264d500eeb5ac7da

    SHA512

    3046c58775dd43b2d97c1fe8976f80dec452fb196730374905b2c6c618fc5121a0cc753dc827806f33eff0923d46079b177a0689b557a7aa8a22fff2939c1794

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    6e435a55ba44be3bc692bbd61540cfba

    SHA1

    f7016bd91dcb172b55066b34fc40b0e083940f0e

    SHA256

    1bdbb8d83adc6d2f6c73b74c5e17df4d38c2887bd64f44f3fec42602eac6cb33

    SHA512

    02fb73f28498a472c5ba8bef5889d3ece57bfb8117f2e4c10b65f21c76c4a442439eea50e6d7cbb13f76c5308c1a0d1bcc5c9b7072de2ca2bd6a463e6a723a35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    08626f508aa517bac3127e58abe988ce

    SHA1

    763193214ec0134dd44aac19282000ad0a64cd34

    SHA256

    9063564c08c710798c4d63ca4ffc2d94d0bf297fdd9ef5b9550a27a442510e44

    SHA512

    4a0c8eaddb84482b2186c6246e94839efc99be54a71c5d7aa26036f11cbb1d7033b06dbf3c60d6b9287d5c766dcef4065dcd93992946322dcddfb30ee6af9c8a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    cedf6a84b6670227346211801cf34b5d

    SHA1

    2f2986af7773ece0381996657af802a90966f751

    SHA256

    f475be4f988a54e9ee1c6a3aecee8da92df26b239ae0b220a27b57aedf9ddb94

    SHA512

    ebd03c51dc94f737135a4bae4133bd254a7d2a2f2023ae19b1760142f61ea1d6b58a3c38bbd1a509014f4ffe5c10c687c5eaa6c0c02301bce793aef612bb13a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    cd9c1c217cb42d4e13db46df55d5b32f

    SHA1

    bc83b7b520422664d02eeabdcd3a08050915647f

    SHA256

    1b4e9d39ad95d8e9207ff2f86a0374e1e4cc74ed172cc2397cab5790131c8f45

    SHA512

    995e5f7ea057337ed59a9a2134ed3267245b258d9c9cd3d7b6251bba6506e7bb14640564f19c0704210ed3e54bbc28026ede55e422189ff95d5fbfeffc995e6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    9ddd64295014df342433b873d0452739

    SHA1

    d0e9d864c0076de70810641e37384d390b75f643

    SHA256

    d174edef78431f11a529f74eba69414729a961c927a771a75f32b0fbb4c09d68

    SHA512

    1a19acee6cef8e085c38d5302d27888eec939d4dceadf81308d54fd650095de9e836a2818ac039db2b78aa797b631153fa7c37ab4b465adb9de0ecae85b68bc3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    b5aabefa21c9535e19410c9f82085851

    SHA1

    6a3fa3f85f7c2db7d6ec0483be3da9d9c9d50a9b

    SHA256

    3c5c8967304a189dc455e77ceb07ef79739ca92af7488c372a3cb0c12f866bf7

    SHA512

    7c98047277fbdf0af781fdc3c6e8c9fbc31502ae51ffcfc6fee990fa9f30bb4772a812743e32fae099fc94058ae3038ebef0adae36a29268e677c23278793c53

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    4f40eb5a8470f2ccf0a4716e7c92cf85

    SHA1

    09f5858ecc262dbbf7b3b9784670ffe567fdf522

    SHA256

    414ac90e41012ffe5a07e99114e42bd9226aadbb393ea0ad198e4e9dca0704cb

    SHA512

    5b549b97b7c7e5a6d2a42f5e47bed5a1d36360d1d6dcde0e5c8d95822530b398ce4d912f6980681e03b7bf019ddf41ee6649bc93e8ddd60ad35f45fff8403e74

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    7d1d09882cb4185e4d4303554429fec8

    SHA1

    b7a6aa29464b97b9fe8b125cee612b638036f544

    SHA256

    ee9e7c32ac4a3b5402985b7db4627706f2915f83a865838a0dff7320f459011c

    SHA512

    d65dfef13501f1cadbde369732089dea6e93cff9e59bed031e3240419c9d5c878de7c7dcb4e9b2eb1aec486032ae58cf6936684b5a705fe721da22ddabc52fbd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ec2794f2dd412ce3e133fe114f22c630

    SHA1

    1e61337d7cdd2061461b60d99e0e414a8e800802

    SHA256

    ebee06d94473a8f406f77ac26ee11809c9aebbd85df50a427212df063b13cf08

    SHA512

    58fe69d8519bfe2ee84ec33c71f2e14c04d526bc501579f36c15937d9e54cb849a67aeb530fbb9de53850ddeb46b5eaf697d2e5079b19fc902cd88d4cc4121fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    796335a22f206c75eb73240a8cea43c6

    SHA1

    494884cbaab3c84022a92f1db981564ac85fcb30

    SHA256

    d0e8dc68446520a23e7a0a0a253ced8aea1e8c71c54acf166eda8edb0e71248d

    SHA512

    d851be699c62913e0aececbf47930c38b816af680eff51fee8441a0ae2cd9e682a7dfa5e52d670b5b409e212880b5d290be846575682c7b4977866ada9fa29eb

  • C:\Users\Admin\AppData\Local\Temp\33921864\zmstage.exe.orig

    Filesize

    3.7MB

    MD5

    301179e1742c4e8605ddae5077fea706

    SHA1

    76b2a337cebf2ed10d8759e41933f7d8b2b5abee

    SHA256

    3ab8b6343a5305b7145381d79bb35640cfcebd1536ef7659ae2f94cc3eaec22b

    SHA512

    69c887b51665c5e1d351cc0ee82ffd659839456257e2cdcf9d23da5aa84f72a2d78bdf13bde65a036ba7ac2bc4ea61976a701de9dd9300dab9192c325dbb651b

  • C:\Users\Admin\AppData\Local\Temp\CabE716.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\HXx1NcxLxtH0OJe.exe

    Filesize

    12KB

    MD5

    c38b9b8e0b41eb418161ec701b8b5ddb

    SHA1

    48e05bef507543e585d4236f03b483c0245bae5e

    SHA256

    b86019f77033ff9a3a960ffe4a5295272260ef00ff030d203c4e29ac78f18990

    SHA512

    715cb159993d00cc61943ad8677ed7926098cc6d5c0a781b4f431cf9456d9708ec1a7c371dafeabf7ab36ad959c8c1d53c24ebde18496f0de04f9767f96ee677

  • C:\Users\Admin\AppData\Local\Temp\TarE778.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Windows\spoolsv.exe

    Filesize

    12KB

    MD5

    3d75b4de2c3edf60e7b79956d9afe7bb

    SHA1

    e200151ab4f14fca54117393486a11af2a1e2e0d

    SHA256

    e8b980ce74edd835672f209d6e78afa40d2ed9b1fef606e02b17e55095d4c5e0

    SHA512

    3fd6ee7b99a568feb634cb18df71a692ecf13b73a986388cf655d2e50f4a6e0a0bb890b46b84eaa39276799bbdcf50874a5769cb1a5a99fb72390f3caba23d27

  • C:\Windows\spoolsv.exe

    Filesize

    12KB

    MD5

    3d75b4de2c3edf60e7b79956d9afe7bb

    SHA1

    e200151ab4f14fca54117393486a11af2a1e2e0d

    SHA256

    e8b980ce74edd835672f209d6e78afa40d2ed9b1fef606e02b17e55095d4c5e0

    SHA512

    3fd6ee7b99a568feb634cb18df71a692ecf13b73a986388cf655d2e50f4a6e0a0bb890b46b84eaa39276799bbdcf50874a5769cb1a5a99fb72390f3caba23d27