Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 16:00
Static task
static1
Behavioral task
behavioral1
Sample
7aab2e101788cc646fbb4aec3c6e62da.exe
Resource
win7-20231129-en
General
-
Target
7aab2e101788cc646fbb4aec3c6e62da.exe
-
Size
7.6MB
-
MD5
7aab2e101788cc646fbb4aec3c6e62da
-
SHA1
22cad396e9b6916203cd144a697edbbb75018431
-
SHA256
b5ea244c11f1e0e5362548219fc8c8346dffeb2660bb14d5aadd5b80c0a9da8d
-
SHA512
91a0ce84852864e894bda62674e79fb692de119f39539400ed054665f459895aca12d3ca1cde944909a9edf15fdf18a82bf66d791567c13cbd2249d8cd0116f8
-
SSDEEP
196608:eZgf60JnP1EYNLGwSzqJ4dUEEyFKKYA/YeVI:eZgBJP1Ecwn5ElURVI
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1924 servbrow.exe 2832 servbrow.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 19 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\errorPageStrings[1] servbrow.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\info_48[1] servbrow.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\bullet[1] servbrow.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\background_gradient[1] servbrow.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\navcancl[1] servbrow.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\navcancl[1] servbrow.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\errorPageStrings[1] servbrow.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\httpErrorPagesScripts[1] servbrow.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\info_48[1] servbrow.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 servbrow.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\ErrorPageTemplate[1] servbrow.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\httpErrorPagesScripts[1] servbrow.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\bullet[1] servbrow.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 servbrow.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE servbrow.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies servbrow.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\ErrorPageTemplate[1] servbrow.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT servbrow.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\background_gradient[1] servbrow.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Ws2Help.dll 7aab2e101788cc646fbb4aec3c6e62da.exe File created C:\Program Files\VideoLAN\VLC\Ws2Help.dll 7aab2e101788cc646fbb4aec3c6e62da.exe File opened for modification C:\Program Files\VideoLAN\VLC\Ws2Help.dll 7aab2e101788cc646fbb4aec3c6e62da.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\Ws2Help.dll 7aab2e101788cc646fbb4aec3c6e62da.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Ws2Help.dll 7aab2e101788cc646fbb4aec3c6e62da.exe File created C:\Program Files\7-Zip\Ws2Help.dll 7aab2e101788cc646fbb4aec3c6e62da.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\servbrow.exe 7aab2e101788cc646fbb4aec3c6e62da.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" servbrow.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ servbrow.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" servbrow.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" servbrow.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" servbrow.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" servbrow.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix servbrow.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" servbrow.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeTcbPrivilege 1924 servbrow.exe Token: SeChangeNotifyPrivilege 1924 servbrow.exe Token: SeIncreaseQuotaPrivilege 1924 servbrow.exe Token: SeAssignPrimaryTokenPrivilege 1924 servbrow.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 5104 7aab2e101788cc646fbb4aec3c6e62da.exe 1924 servbrow.exe 2832 servbrow.exe 2832 servbrow.exe 2832 servbrow.exe 2832 servbrow.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2832 1924 servbrow.exe 97 PID 1924 wrote to memory of 2832 1924 servbrow.exe 97 PID 1924 wrote to memory of 2832 1924 servbrow.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\7aab2e101788cc646fbb4aec3c6e62da.exe"C:\Users\Admin\AppData\Local\Temp\7aab2e101788cc646fbb4aec3c6e62da.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:5104
-
C:\Windows\servbrow.exe"C:\Windows\servbrow.exe" /Service1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\servbrow.exe"C:\Windows\servbrow.exe" /Popup2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.6MB
MD567edf4c2778de85b519ec29169a40e17
SHA1c3daf08b6512a6517da4a0711f4d1a1d6b643f6e
SHA256d37914e9947ccd54343eee0c3137416fdd6161190dd872d077d3c8de186014cd
SHA512507d7da21ff5ca4bc0a9ebedb1ad69d891a9cb5c4a65303362022e7eb5892d8cdf90cf9b3af018a84dfab2ec65d4dd0c5ffbc89fc396034e2cac2945de82dba3
-
Filesize
7.6MB
MD5c5c55b03ade32cfd878331509b600149
SHA1735eec50caebc790d3607a5b87904420723ed39e
SHA256338df278b69992b00da5d0ebd0f796319101d407d5bb021ca04d689df006c744
SHA5123526f3bd30256f65c347c86d6cbe1ea7e8f0aa20bd58f364a580bb070bea441a87e6fcaa97b554481e043d5b7c77ee3b32279c1d1eecdf841a6137e5d9b62765