Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 19:04

General

  • Target

    368b3822f5dcba598b38b220eecc8787.exe

  • Size

    221KB

  • MD5

    368b3822f5dcba598b38b220eecc8787

  • SHA1

    028bd579edfa963de3ec8c63b2199df13bed6dca

  • SHA256

    8e6e2021f24594178fae898530f54772a4d5a26fa8d30081bb90b48d92f8e5a8

  • SHA512

    696a3a78553552c49d7cb81834cdefa57862079fe187ff463ed25a7d3804cb2ba8ef346098900fd3dcc4e274a1dbd547e8441acbe8c9a333be7c45da72ab8c32

  • SSDEEP

    6144:daxbtfxcUGkAStG1mCazOyD3qK12kibCoM4Q6D:daxbtf/84G1m9Og68CCt4Q6D

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 42 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 36 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 27 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\368b3822f5dcba598b38b220eecc8787.exe
    "C:\Users\Admin\AppData\Local\Temp\368b3822f5dcba598b38b220eecc8787.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2204
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2836
  • C:\Windows\system32\dllhost.exe
    C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
    1⤵
    • Drops file in Windows directory
    PID:2696
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    PID:2864
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2560
  • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
    1⤵
    • Executes dropped EXE
    • Windows security modification
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.vir

    Filesize

    300KB

    MD5

    f228f45453fba62091ee3f542fa2967f

    SHA1

    16912867da3f40c4e25fb0d502483b16b8315016

    SHA256

    1eb396a66e411d5a520030f225f6b9ca84ecbd74c0e55072dc6fe61970ce7639

    SHA512

    19de2ae158eef6e157db28d8ba23e2d49b6ba30be39f875e6b3dba28513fb4e18bd071a1d18d218de828c32fdc2cc644614feb1e6bba3687b7e31a43562d71b1

  • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

    Filesize

    300KB

    MD5

    e1de704a05db29b7d520ca0f8bc0aeb9

    SHA1

    18c3416c0a49870063036beb3e0dcd6b8cdf001d

    SHA256

    3e9538ee96e75cc41f018e3f88c6b33f05251c4a663bdb6dfe805a9cb1dbdc11

    SHA512

    bef982c5cb401d2b3a1a62ff0b8b5951f63d33c0dab88504672725e4f928295153b9fa41f2d328beffdc18665c4aa2b7e3c2fa28dea1ce0efe742de3f05fe2a6

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

    Filesize

    219KB

    MD5

    4ea8a06ab65d8ee4f1d722c758f00be0

    SHA1

    fb41a780f0ab0714b0ac7d379a1300264db20808

    SHA256

    117c0abc9e9edf13dbb55d6e7fa0a2b8f105439e3a0bc4183efec3d9f9079995

    SHA512

    f852c5a901098c1a9a74858025a55b76f4d68ee278b259682b47660441dcd7da8a43092cf8d0054953006a46842e7fe1908cf1fd0a13bce32b281b71f3ea7b88

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

    Filesize

    384KB

    MD5

    15a46ed835e642a927c2a7ec4ae0f8bc

    SHA1

    7ec43b768828ca090a510768416202f843f1fafe

    SHA256

    3777b26a241cecf480de6831035b1249204c9eeb3c5c870b63c77b622d372a78

    SHA512

    35c787f56faf3836b4adc0c342b26c0354dbf238790f5849925fb413b15c57cd3cd0e1a5bd91d7baad9689b2d34ba29a8517843bbd1b0dd2e90e130782daa229

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    250KB

    MD5

    64f7df9282ce11f9b27ee9305b4d86b0

    SHA1

    372a72366513e69e2a4fff06cdbfb38072e90414

    SHA256

    643c5e3044608e254934681ef879532bcec3fa797cffa1c7577e549544898c76

    SHA512

    8495bc6ddf62fe463e746283ace480002d32d0972815a983241a54d1c6970b1c2ae21034aa0e3b2cc782d16f7eb28d4a1e0a646e5281bb3366fe3cb24eb11555

  • \??\c:\program files (x86)\microsoft office\office14\groove.exe

    Filesize

    459KB

    MD5

    8fd7cdf13899bba74640bf5930caa210

    SHA1

    5851de41f8c8d2f7616881f1c2d43e98f73496ee

    SHA256

    8f975842ebc1a09f7d7de198539f22180f684cbbf909d6e21c3289c1b7069586

    SHA512

    4d4dd6019facea2b349de9ac30ad88fffb07ff00890ffa677d0fd54ae27f8c9251659bc07f0812e6ad66e52e444e6efc518ac47724ab1f72db50006c0a6527a2

  • \??\c:\windows\SysWOW64\searchindexer.exe

    Filesize

    578KB

    MD5

    32827f057735b23c77957f6e0dfb3678

    SHA1

    ed09c944f081ce75345c1b36f01d0c79a0d0d9fa

    SHA256

    0406071d56e4accf58bd09bba94e4db7c2a81dbbe060af25cc09d759d5ba2665

    SHA512

    053c6e6d160330f0218b35e8abf98de0e573f5c43d3603770af6411b6d62127372c0bfe288adf8c99803ded688549b1328bca9fa340bad7bcd97329ffc787e78

  • \??\c:\windows\SysWOW64\svchost.exe

    Filesize

    180KB

    MD5

    73ef34397dd3c8c53884028b634ad82d

    SHA1

    644920fc9e6639e7f45c5ef02ef70df575ff25c5

    SHA256

    fc68dff26395c45650be1e054df4e08d89c7a1c939f76d0b50312476d9ae0fd6

    SHA512

    3d4e9a3a65955085f5d02b78471a165fbbc7033898ce8ecc4cc07f70d1410c9a6b1f05fc4724d5ad35465a11186e7bc47641b320516013fbc653ea78c08dd01e

  • memory/2204-0-0x0000000001000000-0x000000000108D000-memory.dmp

    Filesize

    564KB

  • memory/2204-1-0x0000000001000000-0x000000000108D000-memory.dmp

    Filesize

    564KB

  • memory/2204-45-0x0000000001000000-0x000000000108D000-memory.dmp

    Filesize

    564KB

  • memory/2512-46-0x000000002E000000-0x000000002E090000-memory.dmp

    Filesize

    576KB

  • memory/2512-44-0x000000002E000000-0x000000002E090000-memory.dmp

    Filesize

    576KB

  • memory/2512-83-0x000000002E000000-0x000000002E090000-memory.dmp

    Filesize

    576KB

  • memory/2836-20-0x0000000010000000-0x000000001007A000-memory.dmp

    Filesize

    488KB

  • memory/2836-13-0x0000000010000000-0x000000001007A000-memory.dmp

    Filesize

    488KB

  • memory/2836-12-0x0000000010000000-0x000000001007A000-memory.dmp

    Filesize

    488KB

  • memory/2864-26-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB