Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
301s -
max time network
323s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 04:06
Static task
static1
Behavioral task
behavioral1
Sample
007cf7cd35590b537a42ec752e75d64bf6f37315018023c6fbc63ab77560bc45.exe
Resource
win7-20230831-en
General
-
Target
007cf7cd35590b537a42ec752e75d64bf6f37315018023c6fbc63ab77560bc45.exe
-
Size
2.5MB
-
MD5
63ccd2218ba9abe0d8fb48d03343854b
-
SHA1
094179e09568ee5b5316d7c70c4073bc99bd1127
-
SHA256
007cf7cd35590b537a42ec752e75d64bf6f37315018023c6fbc63ab77560bc45
-
SHA512
56d4973ba358df996fa17adc2c6eca8c8b04bab3c45ee3f5df77fd4f7e11a88941bd759dea6126b85e85362a08d5f4ff8a904512618ffacf5314727424eb11c5
-
SSDEEP
49152:CL2s5FXQ4EmojLjCRELVf7Avil+dHIsLp1thIikN+6u2hs7:CpzX71oDCRAZUviAHImDqia7hs7
Malware Config
Extracted
stealc
http://aidandylan.top
-
url_path
/3886d2276f6914c4.php
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 2772 VPN.exe 2512 Broom.exe -
Loads dropped DLL 6 IoCs
pid Process 2132 007cf7cd35590b537a42ec752e75d64bf6f37315018023c6fbc63ab77560bc45.exe 2132 007cf7cd35590b537a42ec752e75d64bf6f37315018023c6fbc63ab77560bc45.exe 2132 007cf7cd35590b537a42ec752e75d64bf6f37315018023c6fbc63ab77560bc45.exe 2132 007cf7cd35590b537a42ec752e75d64bf6f37315018023c6fbc63ab77560bc45.exe 2772 VPN.exe 2772 VPN.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 VPN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString VPN.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2772 VPN.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2512 Broom.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2772 2132 007cf7cd35590b537a42ec752e75d64bf6f37315018023c6fbc63ab77560bc45.exe 28 PID 2132 wrote to memory of 2772 2132 007cf7cd35590b537a42ec752e75d64bf6f37315018023c6fbc63ab77560bc45.exe 28 PID 2132 wrote to memory of 2772 2132 007cf7cd35590b537a42ec752e75d64bf6f37315018023c6fbc63ab77560bc45.exe 28 PID 2132 wrote to memory of 2772 2132 007cf7cd35590b537a42ec752e75d64bf6f37315018023c6fbc63ab77560bc45.exe 28 PID 2132 wrote to memory of 2512 2132 007cf7cd35590b537a42ec752e75d64bf6f37315018023c6fbc63ab77560bc45.exe 32 PID 2132 wrote to memory of 2512 2132 007cf7cd35590b537a42ec752e75d64bf6f37315018023c6fbc63ab77560bc45.exe 32 PID 2132 wrote to memory of 2512 2132 007cf7cd35590b537a42ec752e75d64bf6f37315018023c6fbc63ab77560bc45.exe 32 PID 2132 wrote to memory of 2512 2132 007cf7cd35590b537a42ec752e75d64bf6f37315018023c6fbc63ab77560bc45.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\007cf7cd35590b537a42ec752e75d64bf6f37315018023c6fbc63ab77560bc45.exe"C:\Users\Admin\AppData\Local\Temp\007cf7cd35590b537a42ec752e75d64bf6f37315018023c6fbc63ab77560bc45.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\VPN.exeC:\Users\Admin\AppData\Local\Temp\VPN.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\Broom.exeC:\Users\Admin\AppData\Local\Temp\Broom.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.3MB
MD500e93456aa5bcf9f60f84b0c0760a212
SHA16096890893116e75bd46fea0b8c3921ceb33f57d
SHA256ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504
SHA512abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca
-
Filesize
259KB
MD5ad3023dae750eff5bc8fd86d62aab706
SHA1d11d2e835fe74abbe6c4ade3729ab8f649075b5a
SHA256eb654cd99405711166fa7fce4505be2370aa98e55cc5b351fc03c0c81b9c57aa
SHA5123f09d00d6ce70935c0dbcee8c4c2fbe4f6893689382e774577c78fa52b569e2fbae9cce6e36b521aca2fd16ebb41b74d3f53c8453cdc39fcb872a67988e3054b
-
Filesize
259KB
MD5ad3023dae750eff5bc8fd86d62aab706
SHA1d11d2e835fe74abbe6c4ade3729ab8f649075b5a
SHA256eb654cd99405711166fa7fce4505be2370aa98e55cc5b351fc03c0c81b9c57aa
SHA5123f09d00d6ce70935c0dbcee8c4c2fbe4f6893689382e774577c78fa52b569e2fbae9cce6e36b521aca2fd16ebb41b74d3f53c8453cdc39fcb872a67988e3054b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
5.3MB
MD500e93456aa5bcf9f60f84b0c0760a212
SHA16096890893116e75bd46fea0b8c3921ceb33f57d
SHA256ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504
SHA512abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca
-
Filesize
259KB
MD5ad3023dae750eff5bc8fd86d62aab706
SHA1d11d2e835fe74abbe6c4ade3729ab8f649075b5a
SHA256eb654cd99405711166fa7fce4505be2370aa98e55cc5b351fc03c0c81b9c57aa
SHA5123f09d00d6ce70935c0dbcee8c4c2fbe4f6893689382e774577c78fa52b569e2fbae9cce6e36b521aca2fd16ebb41b74d3f53c8453cdc39fcb872a67988e3054b
-
Filesize
259KB
MD5ad3023dae750eff5bc8fd86d62aab706
SHA1d11d2e835fe74abbe6c4ade3729ab8f649075b5a
SHA256eb654cd99405711166fa7fce4505be2370aa98e55cc5b351fc03c0c81b9c57aa
SHA5123f09d00d6ce70935c0dbcee8c4c2fbe4f6893689382e774577c78fa52b569e2fbae9cce6e36b521aca2fd16ebb41b74d3f53c8453cdc39fcb872a67988e3054b
-
Filesize
15KB
MD505f72d6a944e701217ef2eb2cc13e0ee
SHA1fac99c39150ae484e4b3e0af2f4be86bb1835dde
SHA256aab28914794a1cdda4561e9f2af3e006dbed220d9d6bfe049b56d0cb9b783648
SHA512c87e783fc169ef01ac0d3ce29fbfbf349a2e22329df9203a1443cc2caebbe7f8282c0754740289ecca534951cb7e574bafef9ccbaa0da7c287109920ec9573eb