Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
163s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2024, 12:40
Static task
static1
Behavioral task
behavioral1
Sample
9c2ca285142fce8678940edc2f2a60cbdb58ec93c4a23958e5757ce2ade5d06c.exe
Resource
win7-20231215-en
General
-
Target
9c2ca285142fce8678940edc2f2a60cbdb58ec93c4a23958e5757ce2ade5d06c.exe
-
Size
705KB
-
MD5
d35606fe81be2584111c9279cd73c2e0
-
SHA1
e4bfbc4d23e337d4dce9e05929623c8323b67f29
-
SHA256
9c2ca285142fce8678940edc2f2a60cbdb58ec93c4a23958e5757ce2ade5d06c
-
SHA512
8e1c2cc28aea0d1044cb5edc542796f23b51e810401d76280469b4118d82d91d1e14365592dfbb406629cd4159fab3865143a4ca601e4f85f75228cd47fc83e5
-
SSDEEP
12288:JF9B+VIGt/sB1KcYmqgZvAMlUoUjG+YKtMfnkOeZb5JYiNAgAPh:JF9Bet/sBlDqgZQd6XKtiMJYiPU
Malware Config
Signatures
-
Executes dropped EXE 7 IoCs
pid Process 4844 alg.exe 2372 DiagnosticsHub.StandardCollector.Service.exe 4552 elevation_service.exe 2784 fxssvc.exe 876 elevation_service.exe 2332 maintenanceservice.exe 4872 OSE.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\System32\alg.exe 9c2ca285142fce8678940edc2f2a60cbdb58ec93c4a23958e5757ce2ade5d06c.exe File opened for modification C:\Windows\system32\AppVClient.exe 9c2ca285142fce8678940edc2f2a60cbdb58ec93c4a23958e5757ce2ade5d06c.exe File opened for modification C:\Windows\system32\dllhost.exe 9c2ca285142fce8678940edc2f2a60cbdb58ec93c4a23958e5757ce2ade5d06c.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\48e23430c92b1ccd.bin alg.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 9c2ca285142fce8678940edc2f2a60cbdb58ec93c4a23958e5757ce2ade5d06c.exe File opened for modification C:\Windows\system32\fxssvc.exe 9c2ca285142fce8678940edc2f2a60cbdb58ec93c4a23958e5757ce2ade5d06c.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\klist.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmid.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe alg.exe File opened for modification C:\Program Files\7-Zip\7zG.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe alg.exe File opened for modification C:\Program Files\dotnet\dotnet.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaws.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\policytool.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaws.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe alg.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 672 Process not Found 672 Process not Found -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 404 9c2ca285142fce8678940edc2f2a60cbdb58ec93c4a23958e5757ce2ade5d06c.exe Token: SeAuditPrivilege 2784 fxssvc.exe Token: SeDebugPrivilege 4844 alg.exe Token: SeDebugPrivilege 4844 alg.exe Token: SeDebugPrivilege 4844 alg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c2ca285142fce8678940edc2f2a60cbdb58ec93c4a23958e5757ce2ade5d06c.exe"C:\Users\Admin\AppData\Local\Temp\9c2ca285142fce8678940edc2f2a60cbdb58ec93c4a23958e5757ce2ade5d06c.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:404
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:2372
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:2036
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4552
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:876
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:2332
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:4872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD56b88a27f101b5c9c8e0abbd30536e82c
SHA18f8d039bdcbcd213a45e8051136adb841cc235af
SHA2562f25e14db91ba7b8530fa540bf37fbd06b336d9dca1447ee7c355185cca83611
SHA512ac2317f5e062580001038bbcb465dddfaf7dc8d0bc8d3776827ae8768f3d466ab8a7596648d5f4fcea937cc041e14212e7a6db51d5a46037b6af3fd24a0589de
-
Filesize
781KB
MD5bc2c09a9647eb7918d5e05472c09c291
SHA160184eb4f8678b8432a7d47c7c0fbbe77f49c2b3
SHA256dd0e0bfd52d9f8ead3d8d76a6ab87f9cf62953618a93730452b2b67ea6284868
SHA512dbbbb6c9761802dbf6f954e8ca85c1fc70e430eeff3576eac3a600bc18bff8c00d795f28eb39d39d535c41606b78a238afd3c3404c74462ef9d46ed960af5f23
-
Filesize
805KB
MD58cbd6f5ed03218fd78eb2153d795f7ac
SHA1759b1a830c87575d9de7a67eed5098c65f78bf16
SHA256334f8029744de9809a0969d77183c58a1d17f9d7125238304946142c43a1fd11
SHA5124f6a3228606249ba67b3f2859ed3cbf0161f228118a0af66cb191b0f9434ea759cea26cb2925c050278c4ed7d227c77d4ad4b3824081ec909ff3febe5a76e48b
-
Filesize
2.1MB
MD588437d161a58a6cedc63241f5f906be4
SHA156aba7d7b47bc3f193a726a9f6612eb12dd28bb2
SHA25680652c4c802808da156f162436736a325bd049b5963ce31c361882863d6c8ea6
SHA512917e5d6b97b325a3470dac7bf930f9d0afe6f4fb2fce171b15c5d98df61c46ce72a80bb9b2f32534a52eb172d3f33f15ec7e596e9268dff3331cad805efd9db6
-
Filesize
659KB
MD5f1486df3938da9bb7bd720c3517bfe3d
SHA1fe0545823e9ba13c6d90cefa9a8fc6fd14389064
SHA2564edea33796b3485b971cbe99abe90f06e024ab95c7f6e0315e0c4c2289476a57
SHA5120403d8677699cf2cee7e9a51423a8bd8694424925419c6e51eb40d7cafb08dd833ff540a8d49145b129f0313a4112db88426d27d4b14282f1accef119fadb895
-
Filesize
661KB
MD5d7ff5ca99035413d6ff2c676352803d7
SHA14cbc4a0ca224b5268d17704bb38f50d7963226ea
SHA256e656e2a43d2c2b14d9ce747368156facf762a785fbb2a033091080b06af3073c
SHA512f245ebb20ddcb32f395697d910e7b02d0afb39ccc66ffd141634beb80ccdb99ab81e60a119aa6619d2d5377cc124086305ac2fc2a5fc13644118d91df0074661
-
Filesize
1.3MB
MD5c86933a35915aa9cedf497d1e297023d
SHA1e8d6f65c778969be16cb615227672620edc1de7d
SHA2563f7f234eef11f11ec5594926d9eb639f497dcc8ce7e0a3de7f16e136a4b3849e
SHA51239e030440f103e0da11ebdc6593440eb0ca18d9415bfec9b4c732556330c91490544f0b1a83b8dac86028b60fb744019639bfa38b3afd74a26fdaf6e76010d79
-
Filesize
1.2MB
MD564282111dd1dc1fbe062c9c7377493b0
SHA1bc951d8678ea8d79ceb6dbeef700a4f6d1905495
SHA2566396d0ac0c77b20bf8247390d369d7e5ac19c36b2d51f56d53b330a2ef990616
SHA512cd56e9888bde6ee0116628b5e6e7692a7693737c49c43e2aef38dbee925283331c68fafa6d32cee5b21b16b8d866787290bc7d7abe321aa44812c7d363616bf8