Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

10/04/2024, 02:28

240410-cyaxtsca43 10

10/04/2024, 02:28

240410-cx45aaca36 10

10/04/2024, 02:28

240410-cx4hrafc61 10

10/04/2024, 02:28

240410-cx37zsfc6y 10

14/10/2023, 01:16

231014-bm3ysshd6t 10

Analysis

  • max time kernel
    1556s
  • max time network
    1560s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/04/2024, 02:28

General

  • Target

    m1f1f3a069223072f8d6802a079235d.exe

  • Size

    306KB

  • MD5

    4b36dcaa94c3eca48a6292bd670ffe79

  • SHA1

    705484e61ac39ba02cc80903be0da6ce74333334

  • SHA256

    c2e57e9b6e52a5429ae7a7bd36c57f63589d78fbf0ffe5760ada4a67b9fadec9

  • SHA512

    cf07d7f80264554eb3b945421ca41db38ff79707775d355d478c09f4b64d14f523339295aa4bc9b79c0dbb004e6756585bcf85edc8cbc2d16f7f0481be93513a

  • SSDEEP

    3072:71E/yXS0m2pOVLVewP2D/kIyC+mvXi1QJIkjXAToknBq9tT/8RJ6W3t3dpdQGqKI:7E2mDMtqa5EOTeKXAllKD9bmTneefA

Malware Config

Extracted

Family

gurcu

C2

https://api.telegram.org/bot6209822134:AAHQxD-CI1YDVcNbXijXHlonsEUgv3dfYtg/sendMessage?chat_id=-1001529292045

Signatures

  • Gurcu, WhiteSnake

    Gurcu is a malware stealer written in C#.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\m1f1f3a069223072f8d6802a079235d.exe
    "C:\Users\Admin\AppData\Local\Temp\m1f1f3a069223072f8d6802a079235d.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "m1f1f3a069223072f8d6802a079235d" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\TeamViewer\m1f1f3a069223072f8d6802a079235d.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\m1f1f3a069223072f8d6802a079235d.exe" &&START "" "C:\Users\Admin\AppData\Local\TeamViewer\m1f1f3a069223072f8d6802a079235d.exe"
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:2556
        • C:\Windows\system32\PING.EXE
          ping 127.0.0.1
          3⤵
          • Runs ping.exe
          PID:2580
        • C:\Windows\system32\schtasks.exe
          schtasks /create /tn "m1f1f3a069223072f8d6802a079235d" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\TeamViewer\m1f1f3a069223072f8d6802a079235d.exe" /rl HIGHEST /f
          3⤵
          • Creates scheduled task(s)
          PID:2484
        • C:\Users\Admin\AppData\Local\TeamViewer\m1f1f3a069223072f8d6802a079235d.exe
          "C:\Users\Admin\AppData\Local\TeamViewer\m1f1f3a069223072f8d6802a079235d.exe"
          3⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Modifies system certificate store
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2356
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 2356 -s 1972
            4⤵
              PID:1808
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {E5F4B081-06E1-44E2-9573-EA9A33985ED0} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:Interactive:[1]
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:1092
        • C:\Users\Admin\AppData\Local\TeamViewer\m1f1f3a069223072f8d6802a079235d.exe
          C:\Users\Admin\AppData\Local\TeamViewer\m1f1f3a069223072f8d6802a079235d.exe
          2⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • outlook_office_path
          • outlook_win_path
          PID:1916
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 1916 -s 1232
            3⤵
              PID:2204

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          fc1ebc3b26c9d13f366155e6f18f77ba

          SHA1

          b7f5e6c0a79ffa5294719eae426a8655223b9333

          SHA256

          9cb30afda0b892738fb457f3738a448d938ac5890389693c898f9a48db6a81fb

          SHA512

          4bb776bf981a8149f7857af18b5dd7be6fbaf7375332e3a092d858b07dcfda43a58ac15c599dcbd29ebb6de0e976d8c0ba51bc372e318177df63310d137948b3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          59462e718eb3067849209f958225352d

          SHA1

          4eba52e3d6120b1b95b08e2691589d2c87ba4599

          SHA256

          5eb5a1713417e9beaf224fdbeb7dc5024a63ed0f223e4a160e15e8a1bcbd762e

          SHA512

          e5f5362f4ce28903ca269ed971c897d48ca5b60e7f55d97247e3d5ad457ffc613c691b668e5422f43eab27a8b502c0ac54c1063a944b007751b71ff558f48aab

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          734f0f2e1cc739fc9612f01090c2c925

          SHA1

          b28248aed83faf3e6824d91e29d59f64359ac3bd

          SHA256

          283d19820422b5a96201e2a40faeb161ec7e614db9277b97825fe37443fb6b75

          SHA512

          4d7403e1d133ef1d908f8f354d3acee6054acf1f7efbc31c22f249908c54009117a50177c498ba0e9257f447dc9829560e27f256660e958c1d1b0468848b413e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          e83bf30cf289032ef7c0decbd191e3a5

          SHA1

          ae5bf69ab0d7ea827f9a42b544e227cd91e7cfda

          SHA256

          1711f2e48e8d38b23548823d86fa73efa8e9a9ebf7d404c0f950323b88b3c198

          SHA512

          de02503917e01161dd4edc2b6d8850c43fad930c0b6bdcff8643041c6f237c877e76bf1c66ad541e38dad534a8b3b9ceed503839b83c523f9a810cd7c699d416

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          a7536b1856873608c87ca81871f462d7

          SHA1

          bdc30ec469af7724060f71d4616f6eae73f61918

          SHA256

          67fd762e949d0e0d596762b4e268382bd5dbe4aa464051c5180790ee2353fb87

          SHA512

          6cf305ae165af5792da1561eb33f980aad077abb8af91c4ee8e589e279e33271de3b3ee6adab4aba38d94e9e959e2eaa33e87e5d58f347b5afb6ebd03a524a66

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          6abbe0d5ac6d8fff9095cb766194c8bb

          SHA1

          5a67816deaaa40f6edd81491a82b005c2d1e1d7b

          SHA256

          fcee44dfcc90ab2899e1e39d9dd42e6be78f1b6aa2c09b99cc3bfa54a49da255

          SHA512

          bb2fcc751e600a644dc66f773dc5d256c5beb765df99f5244c91f3509981be0c4ad7af10e3f7f81697753fda02e19a6bdb23a43cab4413a105598d039c5a6c1c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          4d861e9ebdcf13c303742924973c2275

          SHA1

          13bdd042f95b0edbeba84c89ce5b4aced1734909

          SHA256

          705f2044da665f40aa398ec744af8e284eb67f2e11caccf8e45d54a3fc6a0c59

          SHA512

          4659488a25255935f3fdfcedc7162771c54f4abff879753b0c22c3adb1a61173eec3609d78cf24b7895791fdadd779379d3ec966e8dcf27ac9b27eb48242a6f2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          6cd05b7432bceb4ac4ac4eb24e7aafbc

          SHA1

          a0df99a2bdabdabab2c681b83b24f4def721157e

          SHA256

          e3a1b08b29e1f57a399014830ec80c7075e239909b00593eb8a90cdc5acc19c4

          SHA512

          5ae3ea6055f50c42e8f5db04ee054f38fd0b3bf44648bdfb19bdd0ee76e90843103995ac0ddea3928635051a7cda1bfca250efda3980b5ddf8e0f6cf6e13342b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          05a498b288f6467a2484d0562007256c

          SHA1

          1f90c4aba6d4dc188120aa2abe64813c33845ded

          SHA256

          798a1924a9518ceb386f152a021ad13344111256483ac2ead3e552b4f368df4f

          SHA512

          9fab009e4f64739406fe6171b495308d94bcac7360b72314dcc452c0400396c09189ad514e62c0be2d88fe0aebcec8ed5a9c6f621677c65b19677f6c96c92ce1

        • C:\Users\Admin\AppData\Local\TeamViewer\m1f1f3a069223072f8d6802a079235d.exe

          Filesize

          306KB

          MD5

          4b36dcaa94c3eca48a6292bd670ffe79

          SHA1

          705484e61ac39ba02cc80903be0da6ce74333334

          SHA256

          c2e57e9b6e52a5429ae7a7bd36c57f63589d78fbf0ffe5760ada4a67b9fadec9

          SHA512

          cf07d7f80264554eb3b945421ca41db38ff79707775d355d478c09f4b64d14f523339295aa4bc9b79c0dbb004e6756585bcf85edc8cbc2d16f7f0481be93513a

        • C:\Users\Admin\AppData\Local\Temp\CabAF74.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\CabAFD4.tmp

          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\Local\Temp\TarB017.tmp

          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • C:\Users\Admin\AppData\Local\d67800nkmj\port.dat

          Filesize

          4B

          MD5

          70afbf2259b4449d8ae1429e054df1b1

          SHA1

          05d9cde9b2a8491cb54a4cd7a400c21432d3a0d0

          SHA256

          3d19e945ed5a25a399da3036bc862275296544218de8260d47a5ad3d9b853af4

          SHA512

          913916f9278bd02db42979f4e49271d53302a441678e328c8b7b3b45524dce8bb6f45eb5895ecec3bd87c1bbbe74096db5757f3001a7990ef0799c7b22c40231

        • memory/1664-2-0x000000001B150000-0x000000001B1D0000-memory.dmp

          Filesize

          512KB

        • memory/1664-0-0x0000000001050000-0x00000000010A2000-memory.dmp

          Filesize

          328KB

        • memory/1664-1-0x000007FEF5C50000-0x000007FEF663C000-memory.dmp

          Filesize

          9.9MB

        • memory/1664-5-0x000007FEF5C50000-0x000007FEF663C000-memory.dmp

          Filesize

          9.9MB

        • memory/1916-382-0x000007FEF5260000-0x000007FEF5C4C000-memory.dmp

          Filesize

          9.9MB

        • memory/1916-383-0x000000001B220000-0x000000001B2A0000-memory.dmp

          Filesize

          512KB

        • memory/1916-469-0x000007FEF5260000-0x000007FEF5C4C000-memory.dmp

          Filesize

          9.9MB

        • memory/1916-470-0x000000001B220000-0x000000001B2A0000-memory.dmp

          Filesize

          512KB

        • memory/2356-379-0x000007FEF5260000-0x000007FEF5C4C000-memory.dmp

          Filesize

          9.9MB

        • memory/2356-380-0x000000001B4F0000-0x000000001B570000-memory.dmp

          Filesize

          512KB

        • memory/2356-9-0x0000000000390000-0x00000000003E2000-memory.dmp

          Filesize

          328KB

        • memory/2356-10-0x000007FEF5260000-0x000007FEF5C4C000-memory.dmp

          Filesize

          9.9MB

        • memory/2356-11-0x000000001B4F0000-0x000000001B570000-memory.dmp

          Filesize

          512KB