Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    132s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2023, 00:37

General

  • Target

    285fb0c788cf0d8b16f4eb5947e6a6e2b27805ae14d7a5ee8aa7ee41f0b4dcbd.exe

  • Size

    1.3MB

  • MD5

    8688d56310943a91c9285e0161518b1e

  • SHA1

    92e8f3067c92f188b7eb4b4889c20fae045f3047

  • SHA256

    285fb0c788cf0d8b16f4eb5947e6a6e2b27805ae14d7a5ee8aa7ee41f0b4dcbd

  • SHA512

    b411ce74b9ffdaa2514222e990a35062ae3a892aed95ae5031556c0d8fcd7fb4424a51d67b74fb0957b5972f11c1ad436720597852007066b1f2816fdba01a3f

  • SSDEEP

    24576:Qak/7Nk4RZt1xKZu0zoFmDcpii9iGn+66rLfJIgtEqPILWz8oDqE:Qak/1AZu+k0WdEacJRIo+E

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\285fb0c788cf0d8b16f4eb5947e6a6e2b27805ae14d7a5ee8aa7ee41f0b4dcbd.exe
    "C:\Users\Admin\AppData\Local\Temp\285fb0c788cf0d8b16f4eb5947e6a6e2b27805ae14d7a5ee8aa7ee41f0b4dcbd.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Users\Admin\AppData\Local\Temp\285fb0c788cf0d8b16f4eb5947e6a6e2b27805ae14d7a5ee8aa7ee41f0b4dcbd.exe
      "C:\Users\Admin\AppData\Local\Temp\285fb0c788cf0d8b16f4eb5947e6a6e2b27805ae14d7a5ee8aa7ee41f0b4dcbd.exe" Master
      2⤵
      • Drops file in Drivers directory
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2072
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.178stu.com/my.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2668
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    62b240e7e86d7fe45223336e0bd54058

    SHA1

    f003f1af320a462ecbc78e5a6f87c982db1c7c9e

    SHA256

    65f2005e510224ab76d7a35b4b496521a3c2272c1090afe9547efa6f08fcbb58

    SHA512

    6cc59c73555bb3c2c34ec17cea0dcabddbe7695ae4a5cec2c0338fc356b207d7e8b813f75b7152c1960d9e8e8bfab0df2d565478b6ad45bc97f109692e9d6d5f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6425188a16c54ad67375a8ec58e82e2e

    SHA1

    aa527288dbe820241daacb2c48dcc300f411e0bb

    SHA256

    9e8402ea1e2bf83e460756f9a91863466e3aec06e0b84424c4b26407dd80741e

    SHA512

    b1b66e6aa7a72ee36efa31de0e455eebc71c84aa93402fbfe8c63db17503ae5253ed4752307a6b44815cb9d171b832b4172defc8ec11f4257ab9fb57fd383b3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    387ee1588c7ccf58ca289548d2f3b43b

    SHA1

    383996c0455997d957d6ccb4e40a977556e421d9

    SHA256

    457e3ffe5f061f20cc96626fa719442a99f93fed9852e4ab2b70b574eae3a3d7

    SHA512

    c89a8da8b901a1f774b03bfdc401be7ee3acf7dcc7014e75f904bcd75651bd4214d692067e119410cd2c0ab0ff5b2eb0fa9f092725a2987fbe75befd333eb29e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    01c46e65a13d5220330da614b80fa054

    SHA1

    552126793a118988ab220675e08ed57bdab8c5c4

    SHA256

    5f4bc792db52d34bcd71d9d7aad98620f8cc7418158d4c8e7c7b7713e83ef1ce

    SHA512

    abb235e7dc87d856a0d67c1279666013fdad49d023f7687d7d4919353b7ae0259755b84816909f91d612b4b08ca37d504901263b252a8fae479ef36ef34ac21c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    013c9271d80b88e6e313b08baf56978d

    SHA1

    3d597eb3e9c86349ea307556cace5b7f25237855

    SHA256

    19535274a3fe937c011505434689ab4f3a10cdde317c82dd8d0ac761414234a4

    SHA512

    f1b28afd441dfa02e0693fbb36a394ffdf86958389e15f30229b5a9d66ee211bca756b48b1f27834260e0fd4d2b55f60149d07d5ba2de793592f72024a18b56b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    252d577e0a3676ae9eea341725f9b683

    SHA1

    1fc27b0b9e1b8309fa3843c8148f31394980d61a

    SHA256

    a67ea4c9ec5b85ca56d38b5a09743045e1257f96b00b0c2e685081522b413f20

    SHA512

    1389310e36bd2cfed581d7664646e365120791b2cec41fd670098b3137aae54762f0715d64083e8cf35f28f77e8dc453527676fc63a965890ec3d3033206306c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a701f7b673f7e842f3da420baf54f1e1

    SHA1

    afbf1d85a86f4547f37bc7016621a4db992b196f

    SHA256

    e019e6cfdd9522322a5fe8c6189b9d84653d821e52cc10f6170e9839620e3a3f

    SHA512

    31bad7fa67bb2591017543dcf49115d96e1e2ac3247609b5371f65eda4e8875ef6e4819b62bbb6a5030e66b962e64661e945cb28086a46f50954267271111048

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8a45e509bc9af7c55f20d0ae38bf3612

    SHA1

    0f2372ec58d64d068b549ab617977358691296f8

    SHA256

    eda81db3ce85fe0de2cd077d4eb8ac0fb0a16a858cb5406f6e997275834ecd10

    SHA512

    35663d59594566443d8ae50e9930cdc31748f3d33d5828f86feb2cecf028d000f52f006fb844059fb4ff548d951b7cd245ac0300282dfcfd01b972657cda7108

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5980ceee974d0a4cdf92f04df14ee5aa

    SHA1

    f1327633ec74a0a671854d7c117b5fd8b4034e9b

    SHA256

    1a3f4345783421ac02b5bb91254cef8c6f361df304755cc4d25fe3cd678ac6a2

    SHA512

    1ace1f6550bd8679c978353f1d1d022556f42acbcc5b422e6272efe67d8cfe0f2adb11a01a0c747118e04edd9c67940813904bab3779b6b846b3224ba251f958

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    689ecfc6b70c7b932a5956562a663ca3

    SHA1

    af52fa785ec00b33dfe3a28644bb60fe9c6978be

    SHA256

    eeffb4aab0d4ccd736215e69b080c421f1913a9976fc1e6f0cbfa33a780380f8

    SHA512

    9748f32277a424e12fbd5ce16710b24cc2acfbd76b7a4eb0b3c8c19db8d7c7fe5e34082b8fd912556b6b1a8396260f0209d8eaffabfb45599a29c6451d589fc3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    169790ea26569f5e64b83b7270c438da

    SHA1

    b30de08d94e9ac7bfe7441e3e1eb7ce40432b7ed

    SHA256

    0e5cd1d60b233d83be97ea43b164da7f56f594c4a919d6e721d3257ff39cfe5f

    SHA512

    ddebf63060455593b54ad696a2eba4f4a5538eead2e401d676a8a6b30e74d061f45309a74062ec1972acd7e180ecfb7197b163434cb444903cecbc65a65b379d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7398e1c67168e99e88b67d8ba7132dbe

    SHA1

    abb088215af9202957458bfc09253cbd0339fd8c

    SHA256

    d8f256012cdd92b2c1b680451b9049718b16f629672b149f66f4fcd84fff9625

    SHA512

    bdd6bbfbbf9cfb7c22e4bbc4c0791f552a5960b548b2e5dd052b0fcaa1d139fc58d4508b774f7dbcde4d13260365706d4491b44bda6b9ba79631d6fbb6fbe3e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    52877e2a8e6bdb3da5332b411acd0a1b

    SHA1

    16e83dee76bcfe4f38b5a1d57393e0fb56db3c2f

    SHA256

    538728a62d4d8c49ebec62711fab790f6d6c52eb458b795754a7d69272458f52

    SHA512

    851bb2915f5937eae4383f87971ecd59800ded6868c68ac59f31c46040a9ce45a0c908d7fafaba22b03942d61996fe69be4607d1393ab8eb340999b5fcd810c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6221de0e273f077081387ae25a3e83eb

    SHA1

    c3704883e593a945ee2a9d2a0ba6464a72aeccbb

    SHA256

    3b860ecb7dc4802aebcae904791c81be8ef11bfd2865ce4903e78ebcc85576ca

    SHA512

    49c7c54a8ea518bacc6d4b7b6d02994a1da7a2983316c1244643cd2962319e7fe3837e6c47b68882102201da7995852bb351befb71f6ee5913bbf79c0c386209

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0f8e3a89443600e80e56665573972044

    SHA1

    a312c2c154dc3faa3379098f424faced49cd9a91

    SHA256

    f6a3b34aefe7ac8a50f46306009d46d4b0b42f02eb2bf8b310eb5c690d75f502

    SHA512

    bddda219c734ed907725886071fed9037b07bd08c5de807a04954fd8fbee787af5725ffe42272b179d67784a2d62d884f2a95d42f2cf50378b5354167aa1339e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0b1b044db3d94206778e7cdb42f6e0d5

    SHA1

    7cc926eee9092e61972528003892a8fa9e945f32

    SHA256

    0e745c34efaec6ab6fbbf0d2e1f2172ae53517aa07e992bfcad944784c3dd2dc

    SHA512

    b938c2ae0ccda992f899c2659e49503d23c506385861f960951b9fff207d0ccbed7fc228fa6897fd3dd6739ef974e80fb7c3b533c168e93b622f2d509baa1d25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3d368e2c6c214b30849e7b4e2c465387

    SHA1

    db51eacbdee65748d832ccb3007b277fec30129f

    SHA256

    4c4bb890b1141a9cbf38089bce5a340662e389828bb4ad4ca56c6f2447e822e2

    SHA512

    f5bad09cc03c0363bcf63cc307d1a881975d272a39db28c21f1367e56160d10f0b4870b1272abfe25a0baf288e11bc57729b36b3e8551609038ad97cf23b010d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    01d276f5b172693bb29c9e3db01e24c5

    SHA1

    1c0f1a396d693b01697748a7b4c6c3c36e6adb4f

    SHA256

    ccb5c1a7b4444928613815e247571ebe335cc8eabb07b32440754b8d0d9480ea

    SHA512

    b6fa128bf41285512d62105e932e843b7a5652af99a6da83a38dd3bcb743ecff32e94eb5e0ea3ddb8e1752ecc48a322ada8a9b3ee3f8c1218f29ae34c7d63553

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    035303a14c379d6eec00f0fcc8416d80

    SHA1

    ff568637dbfefbc9beb2e97b11971c5b2080ad71

    SHA256

    c4c7634b30cd761fea2ed3ab7cb46c1266b7db4e91ecc8a5a1e1d863863a4867

    SHA512

    d49c6151fc7aba669e4fd0e52a2b3da9a499170a1ba3e86294a14f115170cdf1cf30544be7858ded9d781b0fce0990573a9dfc2d6e124db09ecf5f543dc89a94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8a2b5c4c2b8701fa5e1fa46b401b0639

    SHA1

    d2f95055261670f8a1e2915b8c61ce4f1edd41ec

    SHA256

    c639ea86baf0041edd3f3ecc98f70a40b5d5f79af76b22cb949eee96282b18eb

    SHA512

    70fdeaf17d23944d512448d1697dc077247c1747f8565a4d74498168a73f58b58b20329af7def098c5ae49ce02bc05c8f51c36fc3df6d66f7d9e9073285d464f

  • C:\Users\Admin\AppData\Local\Temp\Cab85F5.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar8665.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • memory/2072-10-0x0000000000400000-0x00000000006A6000-memory.dmp

    Filesize

    2.6MB

  • memory/2072-6-0x0000000000400000-0x00000000006A6000-memory.dmp

    Filesize

    2.6MB

  • memory/2072-11-0x0000000000400000-0x00000000006A6000-memory.dmp

    Filesize

    2.6MB

  • memory/2072-7-0x0000000000400000-0x00000000006A6000-memory.dmp

    Filesize

    2.6MB

  • memory/2072-9-0x0000000000400000-0x00000000006A6000-memory.dmp

    Filesize

    2.6MB

  • memory/2072-19-0x0000000000400000-0x00000000006A6000-memory.dmp

    Filesize

    2.6MB

  • memory/2072-16-0x0000000000400000-0x00000000006A6000-memory.dmp

    Filesize

    2.6MB

  • memory/2072-15-0x0000000000400000-0x00000000006A6000-memory.dmp

    Filesize

    2.6MB

  • memory/2072-12-0x00000000003C0000-0x00000000003C1000-memory.dmp

    Filesize

    4KB

  • memory/2400-8-0x0000000000400000-0x00000000006A6000-memory.dmp

    Filesize

    2.6MB

  • memory/2400-1-0x0000000000400000-0x00000000006A6000-memory.dmp

    Filesize

    2.6MB

  • memory/2400-4-0x0000000000400000-0x00000000006A6000-memory.dmp

    Filesize

    2.6MB

  • memory/2400-3-0x0000000000400000-0x00000000006A6000-memory.dmp

    Filesize

    2.6MB

  • memory/2400-2-0x0000000000400000-0x00000000006A6000-memory.dmp

    Filesize

    2.6MB

  • memory/2400-5-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/2400-0-0x0000000000400000-0x00000000006A6000-memory.dmp

    Filesize

    2.6MB