Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 04:58
Static task
static1
Behavioral task
behavioral1
Sample
720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe
Resource
win7-20240220-en
General
-
Target
720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe
-
Size
1.8MB
-
MD5
b04bf10382a78635486925f43c521400
-
SHA1
cc6d7c92abef67967a24816eb4b9d0038d1679a6
-
SHA256
720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20
-
SHA512
c6ebe3cdf99d96771d5c4834f044257b19febe6438bccbf695da414ad8727f62fbd284f34919f752a24329d5a9f4ac16bc2a40d3a43d3879970f50070ad64df0
-
SSDEEP
49152:tx5SUW/cxUitIGLsF0nb+tJVYleAMz77+WAwLYj+3WZUY5kq:tvbjVkjjCAzJLYjLH5h
Malware Config
Signatures
-
Executes dropped EXE 8 IoCs
pid Process 380 alg.exe 3612 DiagnosticsHub.StandardCollector.Service.exe 368 fxssvc.exe 2032 elevation_service.exe 1800 elevation_service.exe 316 maintenanceservice.exe 4948 msdtc.exe 3104 OSE.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\system32\AppVClient.exe 720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe File opened for modification C:\Windows\system32\dllhost.exe 720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\System32\alg.exe 720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\b43f7cbbb3e2edcd.bin alg.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe File opened for modification C:\Windows\system32\fxssvc.exe 720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe File opened for modification C:\Windows\System32\msdtc.exe 720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Google\Temp\GUMEC54.tmp\goopdateres_te.dll 720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_156609\javaw.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUMEC54.tmp\goopdateres_gu.dll 720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe File created C:\Program Files (x86)\Google\Temp\GUMEC54.tmp\goopdateres_no.dll 720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe File created C:\Program Files (x86)\Google\Temp\GUMEC54.tmp\goopdateres_uk.dll 720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUMEC54.tmp\goopdate.dll 720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe File created C:\Program Files (x86)\Google\Temp\GUMEC54.tmp\GoogleUpdateBroker.exe 720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe File created C:\Program Files (x86)\Google\Temp\GUMEC54.tmp\goopdateres_en-GB.dll 720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\policytool.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUMEC54.tmp\goopdateres_tr.dll 720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe 720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUMEC54.tmp\goopdateres_sr.dll 720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUMEC54.tmp\goopdateres_hi.dll 720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_156609\java.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUMEC54.tmp\goopdateres_ro.dll 720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUMEC54.tmp\goopdateres_zh-TW.dll 720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\keytool.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUMEC54.tmp\psmachine.dll 720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe File created C:\Program Files (x86)\Google\Temp\GUMEC54.tmp\psuser.dll 720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe File created C:\Program Files (x86)\Google\Temp\GUMEC54.tmp\goopdateres_kn.dll 720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUMEC54.tmp\goopdateres_sw.dll 720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUMEC54.tmp\GoogleCrashHandler.exe 720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUMEC54.tmp\goopdateres_lt.dll 720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2432 720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe Token: SeAuditPrivilege 368 fxssvc.exe Token: SeDebugPrivilege 380 alg.exe Token: SeDebugPrivilege 380 alg.exe Token: SeDebugPrivilege 380 alg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe"C:\Users\Admin\AppData\Local\Temp\720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:380
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:3612
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:4092
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:368
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2032
-
C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\elevation_service.exe"1⤵
- Executes dropped EXE
PID:1800
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:316
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:4948
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:3104
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2232 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:81⤵PID:228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
699KB
MD5a4c724c771a23cd1e395f88784589f51
SHA118d658242ca08e0815d18f1edec2efc9dd4a89b2
SHA25623f54da4721846c35423fd34cbc6597553780fc8c54c68af43738e27070bd111
SHA512e179417261273aed29bad81f15384e2c7adf48f4628bac0af03f7afe787e5d9a506e81087b221eb8599f2115bb64a01f5d8420dc62c0ab8055ec3a9a0144080f
-
Filesize
178KB
MD5f2aa6643b2c75db5d5d2a5b5e3a557a2
SHA1c96d93ede52aeef8f59b86b856361b38942c73f2
SHA25621f9c5446fd24246b2b650edc10fed7057c60583d3dd1218cb4a71048ca79489
SHA512d2235883d6944da90da5a524f12019c47baa03029ab8b4041ed007c29e235be7b3360a8662dde6bb276638ce33191c44e57764f477aeb98542c805c1eb04918b
-
Filesize
792KB
MD549c266f443814b59c93517cd606433a4
SHA13d787127acee0f8d9947c11d044ba9a52eaa5364
SHA256684cdecceb1efd7c6eefbc8d015185578b6e8fcfcb9624cafd54de8de0629ced
SHA51296e38a2fe356f8ed6371a1629b85f29844db3c6e58cdb8f59e73a72b11ec3cca6f96b707f39b82f9234d8fac944df0e824485314e5736a845469f15944a382ed
-
Filesize
314KB
MD53d35063156bd6284fb56245422609fc0
SHA1e96ffb0c185937df4d41fcefc84b86a290f56a6a
SHA256eec40874c707b1cfadb039e26f1adc85519be8265b44ffd34f1012766cd47314
SHA51273e8bceb40694ec08f14df26a7a3d86838758a52a4a36ad85eef78c0f212e9bf50e0e0336eaaf424f80ff3c766258b3a6c1ea88d561d566774e1347c33899bc5
-
Filesize
2.1MB
MD5f1da5acd55c1794d314f83e6cf666a20
SHA1f64d467cc60be2531e9198adcb94f7948ec213ec
SHA2560d3da63f362f1b07c92e9983388a9bb210496381d0cabdce89852626d740918d
SHA512eea6fcbcb080423fd8ed0807e0e8dd6789893c0267ca0adc7c8d6ae6230ccf360be92518ba982fd69bbb9094537eea81f3909ed5b469a740af53a56d85ad6ec5
-
Filesize
1.3MB
MD52822dac912a62fd05f271acd95e5a308
SHA120efe08134a3d12fe2bbea1b99dc7497675bc3f1
SHA256d7548b83942c309538682ddce793024ad8bd308a0a9c21e12cb2c3e07f1d97df
SHA512c5fa7113294792f6ff9cc6b0b8aeca66e3601c04d83147957f0b3c9405498421d061c3eaae1ee43c80951736f9bb9d4f64924ead31550a2e330f71e79cf77f4c
-
Filesize
599KB
MD53fee5eb6ee6c593a4f59d1f7e243987c
SHA14a110d2390c7fa246ebd15a9d4091f77408cdf6e
SHA256327c55ab1b9dc78e10849ee1cfca2897ec5160100831c4176ea0b0f8cbf1ea4c
SHA51231c05a3ede01f0d34f89f2003f564199167834ba33c40d69ca7cd927ccb3f4f67d8ff39d0270f84ce7b0b725fcff3552a661295c67c38b16168bbb182c43562a
-
Filesize
408KB
MD5e7de13c5d24d625c9ed4f13238e2bd1a
SHA15e245437397b4af57499f2883eb0f7b4bca68f19
SHA25622b9293313fc027177e6befcdbac42d1bd18074cc2d2f63fff948f3d373decf3
SHA512316299f82b1dff377338da8ba54b5ec0d7ce8e1097b4420be273b370840f828c1dd533e030dc17a88fe2bd319829f3c93b5c714c486e7a0e07babc55ded78131
-
Filesize
760KB
MD541f01df16f50a26387f1914ee57f90ad
SHA13e0712b1943c83ecc59eff3ca02db80b292fc58c
SHA256145e29b8b70220e4c2cc0bc0cb8c122c800dbf21dc8089e1613b9a31476d98c4
SHA51214f1c232e4c2adf0cb128a9223779e03356626a4c7d2e3ec8da742479e289c467683b5a7d6622f771bf03755f94c57f75a41f1c5df961513c940085f1b4025bf
-
Filesize
517KB
MD505b2e032d81f15bcfa335bf60cf3e18c
SHA132369f1ad26ceb4384d5bf948feafaef8f69dbab
SHA256f9615cfa214e5a247e2d2f70ca0456aa7f407f7f14af698fc0ef3186e228872e
SHA51235ab8ba2941bc357418852c139bdee8bec9ca9d79d37b4b7e9c50768fdfb6f548ffb3097d1891129eaf8c5b66b707a1b67b5f31e2070f833c90372a42a319e81
-
Filesize
618KB
MD56dcd369f8650cbdc2f9ea5e7df2d5c98
SHA140cbd2151075681e2e1aadb6ba48d44b19452d64
SHA256aa43dad916e2cc51a9e2ede415f99647a18d6104a2cb4c4fe534fa5c17dc9642
SHA5123053100e798a20dfc8137da1ba3ad908a69194bd48eec3be8c77a7b7d591d9a330c62f1ffa6eefe1b5be5b567a1d2a35f46a266e221c7704e6a51b884ee342b3