Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 05:47
Static task
static1
Behavioral task
behavioral1
Sample
b6a819ef7e168d266b46fea369795c6d.exe
Resource
win7-20240221-en
General
-
Target
b6a819ef7e168d266b46fea369795c6d.exe
-
Size
1.5MB
-
MD5
b6a819ef7e168d266b46fea369795c6d
-
SHA1
fa60566c82eb267a28b456f9b71377f9b1801623
-
SHA256
58c9d3a5be31309d1842f9a9f0531d632df817fcd0dba5690645631a6b81b6c0
-
SHA512
57f48832ebc52c40e2f04c277579768d3466ff72301679c35215c59821d932bc483f64140d07cb254fa6cada9aa2e2d34d0c11050b7840e913e4befde825567c
-
SSDEEP
24576:sGoseufagFnX8dfncq6cPwKPqnLolyMEIChp2GClQjX0bX7xNTlRFb5jnOAJIxd:JZfaeqn56wwQqLolrEIC3J4r7/TbTjnm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2480 cookieman.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b6a819ef7e168d266b46fea369795c6d.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b6a819ef7e168d266b46fea369795c6d.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0b1071b8a6fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{45F7D991-DB7D-11EE-866F-4AADDC6219DF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d94d2d3723739f48802cd6414eea5c7e000000000200000000001066000000010000200000002935205f46209598503123dcb5c02cc96b22cccb38c2b83f26d7cd29675c816d000000000e800000000200002000000065fe2ccfe9e176b9fe0daf4c777b55ae739fcd076e610e13331acdf3c0fa0735200000000cc96f0234f9c0f3ef12085fb9f2fd7f5742834b1ad956b7a47896cb6ad9f63040000000d4a572a12f35ff638aae6062d6388d81ddb13594f04baa537e70f8f8e8555f213bd99b2995c0acc40c4c38993933d6f97de6775e97183aa2f38433a2dfd54e57 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2200 b6a819ef7e168d266b46fea369795c6d.exe 2200 b6a819ef7e168d266b46fea369795c6d.exe 2716 b6a819ef7e168d266b46fea369795c6d.exe 2716 b6a819ef7e168d266b46fea369795c6d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2716 b6a819ef7e168d266b46fea369795c6d.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 744 iexplore.exe 744 iexplore.exe 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2716 2200 b6a819ef7e168d266b46fea369795c6d.exe 28 PID 2200 wrote to memory of 2716 2200 b6a819ef7e168d266b46fea369795c6d.exe 28 PID 2200 wrote to memory of 2716 2200 b6a819ef7e168d266b46fea369795c6d.exe 28 PID 2200 wrote to memory of 2716 2200 b6a819ef7e168d266b46fea369795c6d.exe 28 PID 2200 wrote to memory of 2716 2200 b6a819ef7e168d266b46fea369795c6d.exe 28 PID 2200 wrote to memory of 2716 2200 b6a819ef7e168d266b46fea369795c6d.exe 28 PID 2200 wrote to memory of 2716 2200 b6a819ef7e168d266b46fea369795c6d.exe 28 PID 744 wrote to memory of 1384 744 iexplore.exe 34 PID 744 wrote to memory of 1384 744 iexplore.exe 34 PID 744 wrote to memory of 1384 744 iexplore.exe 34 PID 744 wrote to memory of 1384 744 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6a819ef7e168d266b46fea369795c6d.exe"C:\Users\Admin\AppData\Local\Temp\b6a819ef7e168d266b46fea369795c6d.exe"1⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\b6a819ef7e168d266b46fea369795c6d.exe"C:\Users\Admin\AppData\Local\Temp\b6a819ef7e168d266b46fea369795c6d.exe" /wrapper /dir="C:\Users\Admin\AppData\Local\Temp\pkg_52f2a890"2⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2716 -
C:\Users\Admin\AppData\LocalLow\cookieman.exe"C:\Users\Admin\AppData\LocalLow\cookieman.exe" /mode=read installiq.com3⤵
- Executes dropped EXE
PID:2480
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:744 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c345663a9efef2a38a984061ea32bd8e
SHA195943fda8449dd1e463aa356ff54ef4420649954
SHA256b648c452d995a54f84f3a32ca6b1e8200f640e73bb517ba5dca5d5565a480968
SHA5125217c06abee29ceb89cdac7914d223113631ce53a6092172d4d4934029ede70e006affd4b2906ec7a668b2ef0a52b2839090001ddb176ca5f83b83913d2938ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565e6831b117c44305568238559efe224
SHA10fde9453c308b9686e6f39512a6053eae94e3c16
SHA256fd0deab322a4aed005c5b58f772da26224833234826bbc1818f1e0578ae86e7b
SHA5128dfb6b1396e17087176cf7c51b518eb74b7726b68430f417e63333bba2fff3336bcf0def800a63ce859d2dd20f92a9460b2d43c09050845b354c92255347edc6
-
Filesize
34B
MD53f4519b56cb1e006dfe4341e72112913
SHA10ff5675d359c898b6a6bdc1dff10f71097bc9927
SHA256125adf4924899f2026436c0919853bb78b718c7cb6f2187148b01938b79388a2
SHA51278c0961f0828f32032c643f0e6ab59d1ca8b96bb891a74b0b255e1a1a63a0c581f486e9e16b070399e6365d1fb53464eb2b723932480b41a2df5e9f1eb89ab40
-
Filesize
45KB
MD5ab5cb7f226388cf9e27218fccfcced0c
SHA12c1f6f71c6887220d718c539ed7b210bc93af2d5
SHA256c5c48cc063094e3663f0f1931831ac79a6a9e465be10db72e0b7f8130ec45276
SHA512d6e2318553fe7aca3c186d0446163278e0481a8d244e9b837cec7fd72f5561534ac5b1a513a72202b433959556d1aff78d416c6a20dc73552b36aae9fc9a60cc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
125B
MD5b58695b233b69c4502acd4b65453c77a
SHA1897699242b02206523d980d9caf18f4f0b00709c
SHA256aee64388c220040dd53324a9c8482c3e75c2c9340dec83f0c9240da00616c8ce
SHA512bd4d486ee5c30923fcb9f7e5e873f4c3fbd4e1f239346b60d22d3481c0cd23af6ec90b7263a5b3fa9412e66e8341ee7ab4ea647befeb190b400e53c88b4c54fd
-
Filesize
371B
MD5bfa55e417c486f5f5b76a16a99feb668
SHA12508e7aa5a27cfa3dab1be653b51a2fcdcda1f24
SHA256f7955d2c6e725247c40286df5e226e2f641b85cfee302b17b0fbaec283248051
SHA5122443add90cce533aa5c80851c0399cf533f89337fd0d4151e33237755ed4caeff23b85afb99e0e924d1523ac701d5165a12ec9ef1734842cce144d7495a3d31d
-
Filesize
692B
MD544601e00ff712607d2a0b64de786d843
SHA15696d1604b564a38669035faf395f78c933d8717
SHA256424ef303f88bcd0c6af1858cdacc0e3225545957fcb6c49110e39ff39b26b7f9
SHA5127328a2db19fc89d43a4c6dac7338ebf71dfe418bf3bd5bf04966afa1cd76cc7c73daeea07496c7df425ad369f6b17ffcbdf3b2d5de7e7d70424621d9375b73d1
-
Filesize
103B
MD5266ab2140e2a622245fa1d53a8ce82fd
SHA1e4bdcad51065c7ce19066c2f7ef7f694c7ba30fe
SHA256bf61529d39e4311de4a53f9651abdb4918a9d89770cbdecfcbbc663e27364373
SHA5129a63be27174df95f744eed8cf6e5cd0ad0291c6be1bae43c4285d0776ecffcc7c48e6918cbf6bc3ac37c61defcf1d0d3a275d9baabbd8e8b0400c0f1ffd7d8bf