Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
165s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 23:01
Static task
static1
Behavioral task
behavioral1
Sample
c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe
Resource
win7-20230831-en
General
-
Target
c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe
-
Size
1.8MB
-
MD5
2fca3056fe70cf4b21120ee8633e29c3
-
SHA1
e1f0cf2a1e14242f855a89fe4e817d955fc4986e
-
SHA256
c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b
-
SHA512
19312c9a92dca0779fd915f87de3c37021cc9328cfa91b9f747f1ffdb84b9a5a488860f02422cb574db76385b930a1d6e830d3752aa9555edffebe45dc385f0d
-
SSDEEP
49152:MM9QPdxwfE7WlFwKAfzuTiDFUFkpAD0zO6LJnsvWyLA:M1PdVQFwKZCFgqAwzO6F
Malware Config
Signatures
-
Executes dropped EXE 8 IoCs
pid Process 2640 alg.exe 3816 DiagnosticsHub.StandardCollector.Service.exe 2236 fxssvc.exe 4644 elevation_service.exe 2348 elevation_service.exe 4600 maintenanceservice.exe 3896 msdtc.exe 60 OSE.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\AppVClient.exe c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\2b0e4117eac8ca73.bin alg.exe File opened for modification C:\Windows\system32\dllhost.exe c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe File opened for modification C:\Windows\system32\fxssvc.exe c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe File opened for modification C:\Windows\System32\msdtc.exe c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\System32\alg.exe c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jconsole.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUME753.tmp\psmachine.dll c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe File created C:\Program Files (x86)\Google\Temp\GUME753.tmp\goopdateres_ml.dll c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe File created C:\Program Files (x86)\Google\Temp\GUME753.tmp\goopdateres_ms.dll c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe File created C:\Program Files (x86)\Google\Temp\GUME753.tmp\goopdateres_de.dll c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUME753.tmp\GoogleUpdateSetup.exe c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe alg.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\servertool.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\policytool.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\pack200.exe alg.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\javaws.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jabswitch.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javafxpackager.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUME753.tmp\goopdateres_is.dll c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe File created C:\Program Files (x86)\Google\Temp\GUME753.tmp\goopdateres_ta.dll c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe File created C:\Program Files (x86)\Google\Temp\GUME753.tmp\goopdateres_hu.dll c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\nbexec.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUME753.tmp\GoogleUpdateCore.exe c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUME753.tmp\goopdateres_iw.dll c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe alg.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ktab.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jps.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\java-rmi.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUME753.tmp\goopdateres_fil.dll c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jvisualvm.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\xjc.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUME753.tmp\goopdateres_es-419.dll c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe File created C:\Program Files (x86)\Google\Temp\GUME753.tmp\goopdateres_hi.dll c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUME753.tmp\goopdateres_am.dll c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstat.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\schemagen.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUME753.tmp\goopdateres_ja.dll c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\keytool.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javadoc.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmap.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\servertool.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javaws.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe alg.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 668 Process not Found 668 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2184 c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe Token: SeAuditPrivilege 2236 fxssvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe"C:\Users\Admin\AppData\Local\Temp\c6898f6eddc05b0e71bd671f2cb68b6df3c6c4edacd464f0c927d41971ffad4b.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
PID:2640
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:3816
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:4208
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4644
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2348
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:4600
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:3896
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:60
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5f121e56166bbbed32dadc40add6373a8
SHA1202b92dd91e97cefa5ba285fe7fb267265311f64
SHA256c51d6d45e02d8d2220901555a659c1eecde34263b53fa530cfec8e8db10d12d0
SHA512a21373a25df6f05f6a66ad1f867fb131c18eb7dd57097454c6e5ff6e1bc0b233d910fd4e49619779785d9e1d2bf04fff1229542b2a2a10baec4227b4231089bc
-
Filesize
1.3MB
MD57c23dd7fedcd23b52d08906223c0138f
SHA1d514e478e47410fbea3e0d9c6ba2db78310b4781
SHA25621b9905a171dca5c80d4e96053bcb01555b944b9ecc29a5f0bf582c06d4a2c2e
SHA512e3da8a5c5fc10dfe922a3414694b83d21fab23b752b4798f3784459323b2050f3b9fd4ff268121af8efc3845cc2138a344a57c9225c8aa996a568c8cdb5b2390
-
Filesize
1.3MB
MD57c23dd7fedcd23b52d08906223c0138f
SHA1d514e478e47410fbea3e0d9c6ba2db78310b4781
SHA25621b9905a171dca5c80d4e96053bcb01555b944b9ecc29a5f0bf582c06d4a2c2e
SHA512e3da8a5c5fc10dfe922a3414694b83d21fab23b752b4798f3784459323b2050f3b9fd4ff268121af8efc3845cc2138a344a57c9225c8aa996a568c8cdb5b2390
-
Filesize
1.3MB
MD5ef1a200e8bf59b23b4648a7c89921a52
SHA1335ff2f09e068a4fa970c7ee95aa2cf4bae04658
SHA256de24c7b5df1dbdfb6783771e7a737ee04aea62f598c9ed42b5265de9d9212a7a
SHA51274c4563cf3098375fab16e20158248c7e8dd45457dce530d669b2f61696456986bccae0d27b1f1390b4565fa35da2537f0a8c798c962693d28229f07e5aaeb11
-
Filesize
2.1MB
MD57fb3e62843169619046a4358f6bdf6bf
SHA14a321b10ece3aab181c82a362250cb2eab91f0d9
SHA2565b1058f6cda6fc271e118cda2ae25ed737cf88379692af3c30cd2521556391c8
SHA512e60bc6d63577f3a1e1530afe5f475b9cac27516b9a4f7f4410ffa94d8979e016d7e61faf9742035dca5273b800ef2b7d55722bbad2df179c4216db54c4ba0e14
-
Filesize
1.2MB
MD5924eeb2d7d6b18dee49a96b6055310bb
SHA1e653b7d208f163a46ac84416f5e255c1eaf3fad5
SHA2560f30be1ce9c77f739f6cd229b9716790e81024cc4d1de569ea2941750f4a12de
SHA512e9a7be9af9cd20cedfe898b329f2d038cdd783cb73521d9e4dd4af403f95054e19317dcb04d3b06cf71661d2bc83d7777b6b83b1b834c43a9ab963101e687d2f
-
Filesize
1.2MB
MD5aa775ef690f4d02f69153c840dee882c
SHA16ddd62937a2d4e884e847d82e629e9a4fde4923c
SHA256c2704b5a9ff89473808d2455795f2d8a80b413ba5347a5da8591567f4921bc6d
SHA512eca8009562673301c38d2ec3485414e3a351edc38e3678860ed30587d3d20118849ed63569abe14c61b04388b186377cfc7459a05b39a3683b89725ea7a6b310
-
Filesize
1.2MB
MD5015aa97d61f28adcd1c7961e1b88a172
SHA1618cc8b1191c1688514dfe9ed40b75f098a0a3d6
SHA2568497cf30c0c8383dc246ef8547e61854d7879d02763ebc20c8d96dc6ac24cbb5
SHA51236e34f6028959f4e94ed56930bf26922fb02366cde8b56bff61ea3d3bbae1535c1e541f909999264528784af3801714896ad40ecc751f5cc85e7eb0b496fb174
-
Filesize
1.2MB
MD5477b542e52eb3492d4b22d4ea8792267
SHA183c4a27a2f5bad71f727247351bdc0f696e1d18b
SHA256cc7419ba8577fccf8b9adcf196f4f2e434d52d514380e7f65da6d86956791bdf
SHA512ce93cfe04ab2f295ee0afecd35a285a374abb74675e161f9bffd76b764284b13c0d3ab2ac1adfb77875666555115bf2495d1c7384b427301bf54325774295886
-
Filesize
1.3MB
MD54655052982f8bf9b1da2a4460b488a3a
SHA115757a369d4d400425d20e7022be71c5507beeab
SHA2566909d5c78f3c71bfa509e3644ca20a78885767a67adede9cc286bd7c29596654
SHA51230d856ef6d017ce77bfb3923f35c10a9619b582b7d82f2fe48fb38c78e325278f118adaec37339a5f1130cbfcd653c23e91aa3288bea132fda3b2384a4f246fd
-
Filesize
1.2MB
MD5aa775ef690f4d02f69153c840dee882c
SHA16ddd62937a2d4e884e847d82e629e9a4fde4923c
SHA256c2704b5a9ff89473808d2455795f2d8a80b413ba5347a5da8591567f4921bc6d
SHA512eca8009562673301c38d2ec3485414e3a351edc38e3678860ed30587d3d20118849ed63569abe14c61b04388b186377cfc7459a05b39a3683b89725ea7a6b310