Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 08:45

General

  • Target

    12de67671478b5e64f2f453eb861238e.exe

  • Size

    250KB

  • MD5

    12de67671478b5e64f2f453eb861238e

  • SHA1

    ae772610e68b1a5ac05fc9eec1bebc93ae82ea9b

  • SHA256

    5ca4396c17bed61237f10391412184039062e7e7f51e2f334a22eeaccb667f4d

  • SHA512

    35fe593e56c8e7c55ed54707083315d81caf4dac214c5e61c3d5eb959950ef223d61b7c13e71ef34aaac03b4639bff18e6ceb46290a2e157928fc499140cb9c6

  • SSDEEP

    6144:h1OgDPdkBAFZWjadD4s5kY1tvYTlERQDcisW:h1OgLdaOnQpWScVW

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 4 IoCs
  • Modifies registry class 45 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12de67671478b5e64f2f453eb861238e.exe
    "C:\Users\Admin\AppData\Local\Temp\12de67671478b5e64f2f453eb861238e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Users\Admin\AppData\Local\Temp\7zS4AC4.tmp\50f90a5d3f513.exe
      .\50f90a5d3f513.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops Chrome extension
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • System policy modification
      PID:1928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\SaveSale\uninstall.exe

    Filesize

    48KB

    MD5

    f3c79bda3fdf7c5dd24d60400a57cadb

    SHA1

    1adb606aaeedb246a371c8877c737f0f8c798625

    SHA256

    a76272ed3bbf23308782a308d428ee805ec77fbb622a830af26cb0ddbbf7377b

    SHA512

    c43cb957bdea357bd016fe03a8004a48d8117a12106f62876394feba05ad01a321ff6017ffb7b926cc77712f5ab63ea2e4b169a419c444c8f62aa4933f289935

  • C:\Users\Admin\AppData\Local\Temp\7zS4AC4.tmp\[email protected]\bootstrap.js

    Filesize

    2KB

    MD5

    ed46256a5361876e0d280595648e882a

    SHA1

    3240029781cc76cb3966dabb2d231660c19ce323

    SHA256

    b75adb5a455ca0cb7c85ad0599ae04ced59567f7588637c07ab8eb8df92daf9d

    SHA512

    a0006aad1dcc7eae858566923547fe771f7a94c4ca5e98c70c466310a75e58d222ccdb70abfc3bb8b7c1af7ec99ddcace3b54caa7b3831cd582bb16599b6719c

  • C:\Users\Admin\AppData\Local\Temp\7zS4AC4.tmp\[email protected]\chrome.manifest

    Filesize

    116B

    MD5

    0fab66cc4a3b9798a8ad84f3e61e2b52

    SHA1

    77ef91253683417fce1b645b0c3ddde920128744

    SHA256

    0ee0157c210d0972376e3dd4d25781791a858e0bc73bee9daa31d773fbdc8dcc

    SHA512

    71b85926bd02fb6422cefd60fb41f6208fd469b955824c897eba96ff1218f78f5d6ca900f14ae5a3a36956608faee369975073fc3171aaf58d7fe1ca5f9fc680

  • C:\Users\Admin\AppData\Local\Temp\7zS4AC4.tmp\[email protected]\content\bg.js

    Filesize

    8KB

    MD5

    9995481be0d81b04d17454c448defd4e

    SHA1

    d50be6cfc753a596ee31da1f05d58f578782d25f

    SHA256

    85f1e8df848d227796b969b26b43337a240b1e2ff1251cd84264eda012e8569c

    SHA512

    0bf3fbe1ab6518a839d3536f20355c8148abc30a92c7a2c8225016d58cd5842646f4ee669436c6e12b169a4daecd6917a998c79254c5c4e40350bf993ac0217a

  • C:\Users\Admin\AppData\Local\Temp\7zS4AC4.tmp\[email protected]\content\zy.xul

    Filesize

    225B

    MD5

    f3af6b314f99c5a656aaf58df3c56fe2

    SHA1

    2cbb3c5957654bca518fef68aab6933c3e5ac96c

    SHA256

    406389e17df080d45ccf3f3fae40071388ac4b4a9d48db3c66882b142c56b2d2

    SHA512

    8ad0231d5ddfd33cf41ef18cc525c03b934e31b72a1ab87b3779c9fbeee90b582775d9e93ee586b9f219fd9e132af9dcab044cc330a29bd28aec301848bd7085

  • C:\Users\Admin\AppData\Local\Temp\7zS4AC4.tmp\[email protected]\install.rdf

    Filesize

    705B

    MD5

    ac0d35539991a5ca613cec1ff3bfee7a

    SHA1

    dea69a327750b9bb23d5da09e987991ed39f4c1b

    SHA256

    8c54c8aa6cc617df09214ecbfc15ef2567fa6aad1dfd693e2ae8eb043ca9f889

    SHA512

    ccf4ca6085b8c25834281609ac3c9af48bee3f381933e8ceef8c47f37b1ddeab5fd0698d25829dda46bba2834e5be49e09fbd5a9e37a4ac8cda24a9c36ad13d4

  • C:\Users\Admin\AppData\Local\Temp\7zS4AC4.tmp\50f90a5d3f513.exe

    Filesize

    71KB

    MD5

    b78633fae8aaf5f7e99e9c736f44f9c5

    SHA1

    26fc60e29c459891ac0909470ac6c61a1eca1544

    SHA256

    d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22

    SHA512

    3885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43

  • C:\Users\Admin\AppData\Local\Temp\7zS4AC4.tmp\50f90a5d3f54c.dll

    Filesize

    116KB

    MD5

    da161da8bcb9b8032908cc303602f2ee

    SHA1

    8a2d5e5b32376a40f33d6c9881001425ec025205

    SHA256

    0648d564b30e13a0819f28e00a9af39a6686a4d29ccd265c7d81548e4fe0f67e

    SHA512

    39e882a371dbce2484324811bffdd7ae7655b57401d07bf264aced6b5dac0ae326bd1945c536f05d8ab3b92ca03ff056c5a7baf54f7eb477b45fc405ec54052c

  • C:\Users\Admin\AppData\Local\Temp\7zS4AC4.tmp\50f90a5d3f54c.tlb

    Filesize

    2KB

    MD5

    1f14de44d0d63a79f91d3fe90badb5fc

    SHA1

    7fcc921608d2cf40e81cdd9a98e1a15a6ba1f57e

    SHA256

    bd3d85c0136a66b2af79d4d91c1c5700c8931937b7e554d5ece946760ef4a99c

    SHA512

    86eb6ebf9eccf1dcb601db827797ac603c0ebe01b6d73318986275c29bd034c8df5f7c79ddf0b19536faf24bdb11e09ac95ea43e8fe75b0ed3dde76dd139883c

  • C:\Users\Admin\AppData\Local\Temp\7zS4AC4.tmp\jegkjiamlnoppkbbchfagpfchjblclad\50f90a5d3f3317.05536124.js

    Filesize

    4KB

    MD5

    5b0f3d320ab8d066e065872699163512

    SHA1

    f9c392010ef78a47bfacc700b9d78622810c4f7c

    SHA256

    8bb2ebb516eba8319fdd743f3fb4da3ff7e45cadab1e12573b8185bcbc63fec8

    SHA512

    42923e343b8c6b0397b349cb239f0f45ef7f8d5a87aa4f414e566f3dfec862c87db4d16b12f91ff74ab642ce3ca915ce7a5897d6d09fe23bb970798e1536c282

  • C:\Users\Admin\AppData\Local\Temp\7zS4AC4.tmp\jegkjiamlnoppkbbchfagpfchjblclad\background.html

    Filesize

    161B

    MD5

    83cad062aaedf3d673a6b334db594799

    SHA1

    d197ccb0ed3154f11c18cdeaacddfb82882100df

    SHA256

    431e0fc9d3f6265758d4e6c081ec7fe002c4e05514d9c70a6f9827719ddd9476

    SHA512

    39b7333ff790aefa028a3e1bf18c572686da7411e0da884dbe2444a29f893b73cd73eabfe25c9b9b85f5ea0011965ff85910c2956f2ece7040b3fe2e926dcb01

  • C:\Users\Admin\AppData\Local\Temp\7zS4AC4.tmp\jegkjiamlnoppkbbchfagpfchjblclad\content.js

    Filesize

    197B

    MD5

    5f9891607f65f433b0690bae7088b2c1

    SHA1

    b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de

    SHA256

    fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b

    SHA512

    76018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c

  • C:\Users\Admin\AppData\Local\Temp\7zS4AC4.tmp\jegkjiamlnoppkbbchfagpfchjblclad\lsdb.js

    Filesize

    559B

    MD5

    209b7ae0b6d8c3f9687c979d03b08089

    SHA1

    6449f8bff917115eef4e7488fae61942a869200f

    SHA256

    e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704

    SHA512

    1b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25

  • C:\Users\Admin\AppData\Local\Temp\7zS4AC4.tmp\jegkjiamlnoppkbbchfagpfchjblclad\manifest.json

    Filesize

    475B

    MD5

    f91cd42bdfe41bcc97d2eb37eafd8bd2

    SHA1

    c0dd02c8f7959b84bf6583d62ecd308651c37b6d

    SHA256

    6805fc1de5ccc99d653689693aeb3a390116b024eedc26b0ca00a7296ec422a5

    SHA512

    8a043a54c40787174c0f167c0083899757803b06100189a9a485d86ebadfa791b83af0e8a502fd34c2b8b20ad9b4c82cf1c302234db69006cf089e0b7179ab2f

  • C:\Users\Admin\AppData\Local\Temp\7zS4AC4.tmp\jegkjiamlnoppkbbchfagpfchjblclad\sqlite.js

    Filesize

    1KB

    MD5

    107eabc9e045f10000466df786a3bdab

    SHA1

    9f862bfa1f62499890eb5029f65e50aaeae6d7ed

    SHA256

    54ec8bdfbb9887b786962effba4ec1117d79f50189ce65bedaaf39c2abe22fc6

    SHA512

    efce7272a161d4761154def5268e8517e5955093bcd7a037f014d0f2c1a965e26c10419f4e320347b37ac227725316b2f004450f71dc133aa3afa53e28bb1c29

  • C:\Users\Admin\AppData\Local\Temp\7zS4AC4.tmp\settings.ini

    Filesize

    6KB

    MD5

    70027ae6d51835592aa552c46f23962f

    SHA1

    f0ad8d7a82ab63f748a10b82810202e8241f3f1a

    SHA256

    d8bd7636805e9f67e8eb0358b26729308694d6157292f352036ed11807a75b82

    SHA512

    7a67a7b56c340b93f8af7dee6c646e3f879f76d2b90ade5f8341bfe934ea01b43cd91fd52d9a8c3fef604e18d8f1d9c6098d6af8f1e4870fd5472426b45aeffb

  • C:\Users\Admin\AppData\Local\Temp\nsh4BB0.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • C:\Users\Admin\AppData\Local\Temp\nsh4BB0.tmp\nsJSON.dll

    Filesize

    7KB

    MD5

    b9cd1b0fd3af89892348e5cc3108dce7

    SHA1

    f7bc59bf631303facfc970c0da67a73568e1dca6

    SHA256

    49b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384

    SHA512

    fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90

  • memory/1928-78-0x0000000074280000-0x000000007428A000-memory.dmp

    Filesize

    40KB