Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 12:02

General

  • Target

    6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe

  • Size

    253KB

  • MD5

    6ce5afac5ba2fe2015d5bf0e3d8c9f93

  • SHA1

    885c8b2a08cc32ed2943928f9cbbe481d71b0d82

  • SHA256

    44ee1342f0017083995ffaff831d09e459932a0a3c911c06e62a68ffe84db884

  • SHA512

    7657d60299f2e6d71dd9040df8422f3aa854b3abe090129bea7d8040e9ae3683342b06e679c90815591fafcfca943f0df223cc8b50064a07721eadefd1d59abc

  • SSDEEP

    6144:SY94Narf098CKA+PwBy6cSz0fg/mOqKqhrIMu/3:R9OaT0981Jl1fgOdKQg3

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 46 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe
    "C:\Users\Admin\AppData\Local\Temp\6ce5afac5ba2fe2015d5bf0e3d8c9f93.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2932
  • C:\Windows\SysWOW64\key.exe
    C:\Windows\system32\key.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Adds Run key to start application
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2588
    • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
      "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} about:blank
      2⤵
        PID:1724
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\MSN Password Stealer.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\MSN Password Stealer.exe"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:2652

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\inst.dat

      Filesize

      996B

      MD5

      75293f36b29713ddf9e491575cd9ba3c

      SHA1

      d44ecf7167e4680979afd372181d5ef948d07214

      SHA256

      7d0bc3f71c5b3e1ccf0d7ad31c6f47c09c77ff909b32ca414f5ab155f11a89fd

      SHA512

      d494fba249f9f9715c314188f346427c8fa93b5807b4076a1bb7602e759e5161ec9ba5bea69175b0a6688cf3f9905deff6455ba007e53917ac7f4efefc3f6e4f

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\key.exe

      Filesize

      388KB

      MD5

      6f2ea067f9861eb3dcbc1a997ee365e0

      SHA1

      7984ce64ee493a87024fb26cc2150b7cafc23b1f

      SHA256

      7777081a4414739790bf06c7a642c35b14394415dbb9572cb06e1d79e8dc918a

      SHA512

      2beb68b268bfd517254447b393e0cb448b08a69427a12a95d32b09304dfccdb70a1ba67922479dc3f5161ab8600e5144273bed1d89c93d05c4c37610b5673a2a

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keyhk.dll

      Filesize

      24KB

      MD5

      01e4b6bbc6407336756588818c6f57e0

      SHA1

      3ef1fdd3e2a9e7dc492d73b0005f72ceffa9c101

      SHA256

      dae5493e60f8c8f1bf33276084d3b4207ab1d24ff66453de59e786249c4f0d00

      SHA512

      d715c0b4abe812fec73e78d3db985ed24515365d1d217a4df37f193120373f142afb3979dab66caa147285eaeddd6e15d569617274004b4e4932027f10f76762

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keywb.dll

      Filesize

      40KB

      MD5

      c8f8519eda854af35f03e56ef14aee6e

      SHA1

      dd5bd23b60b2c9f3e8d96ca1616d5d36ffaecb48

      SHA256

      254660543a306e520ebc2c3fd4bbbfda6775154417db8f5fc3a4cd45cb85faef

      SHA512

      ee77fb75a5a2f0f7bec34237466f63a81e8e4b972540fd6c49bf8a89e5cf6da92c23f605cebfd761f8d7a758c826e199f65fd4a9992122bf66936f08e31ee242

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\pk.bin

      Filesize

      4KB

      MD5

      b570d4fdfcd44eea5ff8564b6099286d

      SHA1

      9560ef5d473ed86653f969c37745865d28af2caf

      SHA256

      7165a1c89e0468756e2e37cf1539767e80bc2d26cf8a0d498aa56d32ac78d122

      SHA512

      e8fbd7ede0e5468f622f58b5ae47760a1138c991a2202da6b835169cb08550d9275b1f666b273a6f8cf95b6aee9f15405dc2e4e7fa579762a7c13554fe0605c5

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe

      Filesize

      7KB

      MD5

      fbe4bab53f74d3049ef4b306d4cd8742

      SHA1

      6504b63908997a71a65997fa31eda4ae4de013e7

      SHA256

      446658dd5af649857fff445c600f26cdc1d0c19c86a080f312b89b1890182092

      SHA512

      d458ab806a3ed3d1494a13ad8a75df874a0b227cb4f337996cb82df3c4a26dc9c4fe48a664b53b052a4af123ea8d89911d9d9493870e6b5992d5621a32260c2f

    • C:\Windows\SysWOW64\key.exe

      Filesize

      93KB

      MD5

      8fad8bcd45ca0dfc8d0d895eb4ce76ce

      SHA1

      5d0d4457fad064c96bd56c3b90d9634ed86f68bd

      SHA256

      58027cabffadfd5434af0d894ed139c908bccf6cfeb72b9b7c2938833bb04d5e

      SHA512

      e12d2d29d0a6b929d4ea2eef3cd47596bb8c465eb84b21cf219ff4bafd5b03dce90c8886649d7c101efdc417462e09ccf86aa99c23e0cdeb32e4695afc1f4bea

    • C:\Windows\SysWOW64\key.exe

      Filesize

      92KB

      MD5

      6eac27001764be8027b24fa419fe1713

      SHA1

      df8d25dde5481eda7530bfaa2af9db3992e25082

      SHA256

      6871983aabd896266879f3e5b22a24f83cc336941b9bfc83b2909e207723722e

      SHA512

      4882d8b44265c3484a59ac37a1e8d76a60505ad3829d7df1b3e4c83381b6ae4787bf95033b22921a74c5e84191befe47ef9808144b9f7ac4bf70af4e3e1fc023

    • \Users\Admin\AppData\Local\Temp\RarSFX0\MSN Password Stealer.exe

      Filesize

      28KB

      MD5

      08ca19d445eecb4a4f2e01ef3dbbf936

      SHA1

      1660d70693ab06ab9cf10d193300f3a8daa2e05e

      SHA256

      95223cc4c108fc7dd3289c8bb420219403cdb2c37a13397f9badde4163aa42ad

      SHA512

      db7c1a4c8317df071a9e1f3507a1a349fc97298e2dc56e020059466f52e56ddc057e352e21ae2336a1519d3eeb4b73524061770b3e968d33ea2092f850becffa

    • \Windows\SysWOW64\key.exe

      Filesize

      382KB

      MD5

      12027a98d8184144a7f453231d0671dc

      SHA1

      491d50c97930c9ccfbc366cbd62d6d61b2ec3538

      SHA256

      2aa80075201d1da0128107853d02d47c72a51c1d4b3dae5504564b3572787566

      SHA512

      b6f0d68dd7a86b53be1bf59b45fb6a724f29291b96198645451e54c1e2e0f43e8d60d574d3669cebe8d0664f08835241de362f9137953498e8ba3bcf8c304e11

    • \Windows\SysWOW64\keyhk.dll

      Filesize

      24KB

      MD5

      7719e3244553dce7b70a9d1083e291dc

      SHA1

      d7147a052b19bb08356ba6dea5cc0e6486a0121d

      SHA256

      6c48b4fe62614ad35aab89b534310024770fbcaa669d50a462f4973feeee926f

      SHA512

      5ea1aad723e1043028136c943899e5a33e4b58b119c927fb001891facae656277969ec31cd7035680eb5d97e401c22577a082c2cf728e9142a3f0c62d1d99beb

    • memory/2416-64-0x0000000000400000-0x0000000000413000-memory.dmp

      Filesize

      76KB