Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 16:35

General

  • Target

    2da7bf9746285b9afeab2254c225a9ee.exe

  • Size

    60KB

  • MD5

    2da7bf9746285b9afeab2254c225a9ee

  • SHA1

    e0fab53965e2d5df57e1139cb6b87f3391126095

  • SHA256

    e90e778e03fdd92a511f91cea11a5257d8b8536f40ab6dae9875ef1863911aa7

  • SHA512

    184f48b144b86a2aeda9edbc7492acd4c34a87c76c530ad04e44e3d83f018cd42c52c51c6fe03ec1a3fb509ebb4826db90bb5de42d99fb786f7fcade1470ab2e

  • SSDEEP

    768:/24GjjRzPyI6TfDarzerws8FJd/f0ElsL9KyeVKgKhvS7XFZBs9MvO:jGfRzn8DuOHM/f0OsAye9cS7XS98O

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    killerxknight

Signatures

  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2da7bf9746285b9afeab2254c225a9ee.exe
    "C:\Users\Admin\AppData\Local\Temp\2da7bf9746285b9afeab2254c225a9ee.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Users\Richard\AppData\Roaming\Microsoft\Local\svchost.exe
      "C:\Users\Richard\AppData\Roaming\Microsoft\Local\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Richard\AppData\Roaming\Microsoft\Local\svchost.exe

    Filesize

    11KB

    MD5

    ea09acc396ffda6f02379bf7ae52bf14

    SHA1

    c50a7c12b3f178f32e5b8ac2f2985867768df83b

    SHA256

    78cc2960c692f43b027c57f810ea46af6d2a0daee49d7ea7e6493077bba951c6

    SHA512

    4e137f8032e30c0926257d3d20be20be3f994bd7aa775e814461461f840bbaf845a037018086827a551037d5deeaeb30db8b95b49f8efadf13f9a4e514ae0b39

  • C:\Users\Richard\AppData\Roaming\Microsoft\Local\svchost.exe

    Filesize

    13KB

    MD5

    3dcc6ab23760c1db0ca7dad3b8143fee

    SHA1

    6e0774c254107e79f4dc66d9a6e3e1a2ac3e8663

    SHA256

    8297d3d1ee185c81a94ca7539bfa12fdcf30f703e1f3f2027ef8b42d27d90f87

    SHA512

    f1000e5d34d8338cf410f2fc305ba02a4cd3a38f16140922002ec23496cbde829ce7966c0046335f4f838cecb74f392e5ccc4c85f57a50edb7b13f7ca5e3068b

  • C:\Users\Richard\AppData\Roaming\Microsoft\Local\svchost.exe

    Filesize

    60KB

    MD5

    2da7bf9746285b9afeab2254c225a9ee

    SHA1

    e0fab53965e2d5df57e1139cb6b87f3391126095

    SHA256

    e90e778e03fdd92a511f91cea11a5257d8b8536f40ab6dae9875ef1863911aa7

    SHA512

    184f48b144b86a2aeda9edbc7492acd4c34a87c76c530ad04e44e3d83f018cd42c52c51c6fe03ec1a3fb509ebb4826db90bb5de42d99fb786f7fcade1470ab2e

  • memory/2648-0-0x000007FEF5660000-0x000007FEF5FFD000-memory.dmp

    Filesize

    9.6MB

  • memory/2648-3-0x00000000002E0000-0x0000000000360000-memory.dmp

    Filesize

    512KB

  • memory/2648-2-0x000007FEF5660000-0x000007FEF5FFD000-memory.dmp

    Filesize

    9.6MB

  • memory/2648-1-0x00000000002E0000-0x0000000000360000-memory.dmp

    Filesize

    512KB

  • memory/2648-18-0x000007FEF5660000-0x000007FEF5FFD000-memory.dmp

    Filesize

    9.6MB

  • memory/2716-19-0x000007FEF5660000-0x000007FEF5FFD000-memory.dmp

    Filesize

    9.6MB

  • memory/2716-20-0x0000000000A30000-0x0000000000AB0000-memory.dmp

    Filesize

    512KB

  • memory/2716-21-0x000007FEF5660000-0x000007FEF5FFD000-memory.dmp

    Filesize

    9.6MB

  • memory/2716-22-0x0000000000A30000-0x0000000000AB0000-memory.dmp

    Filesize

    512KB

  • memory/2716-23-0x000007FEF5660000-0x000007FEF5FFD000-memory.dmp

    Filesize

    9.6MB