Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
172s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 19:44
Static task
static1
Behavioral task
behavioral1
Sample
7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe
Resource
win7-20240221-en
General
-
Target
7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe
-
Size
1.8MB
-
MD5
4901a08eee2cc636f6fd904b39beb89b
-
SHA1
ddca16ff6a8bef2e331139f0b1899a969cab34fd
-
SHA256
7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af
-
SHA512
b73aa63af1d20d3ab8f510fbd9c26e19f8e6458a527fd260935c8d8e056d5823d4b8f838426fdca4734d9da79113b2858b2bc4c6e51b286160c2ec602d32ebee
-
SSDEEP
49152:sKJ0WR7AFPyyiSruXKpk3WFDL9zxnSO8HNUPCAaq8Wdo0:sKlBAFPydSS6W6X9lnF8t4C7
Malware Config
Signatures
-
Executes dropped EXE 7 IoCs
pid Process 3420 alg.exe 388 DiagnosticsHub.StandardCollector.Service.exe 5004 fxssvc.exe 1664 elevation_service.exe 3220 elevation_service.exe 3340 maintenanceservice.exe 3332 OSE.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\system32\dllhost.exe 7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\System32\alg.exe 7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe File opened for modification C:\Windows\system32\AppVClient.exe 7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\17a8becff9ef887b.bin alg.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe File opened for modification C:\Windows\system32\fxssvc.exe 7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe File opened for modification C:\Windows\system32\AppVClient.exe alg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUM7153.tmp\goopdateres_kn.dll 7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javacpl.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUM7153.tmp\GoogleCrashHandler64.exe 7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe File created C:\Program Files (x86)\Google\Temp\GUM7153.tmp\goopdateres_pt-PT.dll 7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe alg.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUM7153.tmp\goopdateres_am.dll 7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\tnameserv.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUM7153.tmp\goopdateres_en-GB.dll 7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUM7153.tmp\goopdateres_ca.dll 7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUM7153.tmp\goopdateres_no.dll 7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_117781\java.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUM7153.tmp\goopdateres_it.dll 7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe File created C:\Program Files (x86)\Google\Temp\GUM7153.tmp\goopdateres_iw.dll 7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Temp\GUT7154.tmp 7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUM7153.tmp\goopdateres_sk.dll 7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe File created C:\Program Files (x86)\Google\Temp\GUM7153.tmp\goopdateres_uk.dll 7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_117781\javaws.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUM7153.tmp\goopdateres_ms.dll 7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe File created C:\Program Files (x86)\Google\Temp\GUM7153.tmp\goopdateres_sr.dll 7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe alg.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\123.0.2420.81\elevation_service.exe 7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe File created C:\Program Files (x86)\Google\Temp\GUM7153.tmp\GoogleUpdateCore.exe 7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe alg.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 672 Process not Found 672 Process not Found -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2320 7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe Token: SeAuditPrivilege 5004 fxssvc.exe Token: SeDebugPrivilege 3420 alg.exe Token: SeDebugPrivilege 3420 alg.exe Token: SeDebugPrivilege 3420 alg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe"C:\Users\Admin\AppData\Local\Temp\7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3420
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:388
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:112
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5004
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
- Executes dropped EXE
PID:1664
-
C:\Program Files (x86)\Microsoft\Edge\Application\123.0.2420.81\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\123.0.2420.81\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3220
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:3340
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:3332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD59f3b23e52977de28d87e0dcfa48e4e00
SHA11b1796b7473e81bad1ccded2fcc7767b21cf88d0
SHA256590759dd7904e0cff8c00d2f9e24d198f5b4597b823d74a807c6074f1519c1be
SHA512e102a383d304425dc0d2dfcd82264d089917ed3fa74c1242fe7ea8c1004a83682eb920558fdf88a69eb7a37a5d113b8512509582a27e3a00992e3994236bf8b2
-
Filesize
797KB
MD593df57d74085bc119f6f7d967a6097a2
SHA177185fdf409ff91e8622e1becb3475d755b26bb8
SHA256747f8009e5b5e99ea8400ea372d03ca76686a9b0f6851cb04ba8b0087cf8a463
SHA51239a1bc1323ecc8deee1445ca2626d45407e6af7cc1cc8e1df13fed8da443bc871f57430a90ced12263d26089496bfc1e5a77a766de065a85a4ce95d33d8e084b
-
Filesize
805KB
MD5f11a44742488f33fd74932baa55e5e52
SHA199ddda4cf7020fda5528eb37cc278d3eaab9adee
SHA256d7744fea74116e3f4291baac73320785bb16bb3cb18d61afdbc7dfc6e7bf32cd
SHA51241fea353076518ac5cb7de981691558bcfda7b145bfbf92148e1f4132f5ec01ebf2c2d6a45678d4572f833e43a024b1ef9231852454b50fa2acb379f1bcab9c9
-
Filesize
2.2MB
MD52fedb62f68d329af008864c10b9d5298
SHA1d545294ee0aa8945521fcc4ebcc8b1bba9463fba
SHA256a14ae365645a15d8c6198bbcbb840bf1579f49eece8b781765ac6d22ff2337f4
SHA51211a7334bfac4e14e27c0305b6495a58c3cc62bfe025ba19ee1ec184eebd3ef31c954e66addb3aa6e3474b2dc9eae908ca22ed7b2ebcd3a54d23b07c898a153e0
-
Filesize
659KB
MD53f22a280532f2df29128a3e4aa338528
SHA1c15919fa022f170536ef265630be789639785c52
SHA25645c48e0dc8c2bf1bf8c1c03f5ab1d40f77bbdfd477e6c9053da60929146fe1a2
SHA512155810d0ed59908b8bea5958e078d097455fade1cd8fbf90cfbc129f21f870d5fddd6237ee0c5073c4753d6828fb1407c7cf69c173952c00bc1ee4c4ba6370d8
-
Filesize
1.2MB
MD53c4c179c6855816097400726013196df
SHA10efcb1caca03d68b84bfb72a133765b1d1c084c6
SHA25609e8c764ff7a057e1f001b74467b89a705f00517e1e6e2a2b6b2bca8fc1e7075
SHA5120427328729101203a528c8ed441a3a44b6ea3881cebbf04aa4e49da5c4f4b58c5099f74621942ab5e127dc0e18883a175c54d1c1af76bb7f61dc4a582f76acbf
-
Filesize
661KB
MD570f3f97825cf34469b9967921e20fa9d
SHA17f393418059bf7eb07cbc55a45726ef22d00fead
SHA256063dc996c32bac99adf1f8396af18b463518975be78d8f26a05dcc5c00d73097
SHA512d9710f201a138d32fc6aba485173e87d4014cdeb01df099310ebb2a4de0e8338b7f1c1852d31b5f8e8014e3990deb57318e3c52d4e065f6361d1c9ae72c7fc9e
-
Filesize
1.3MB
MD5482a53cba17382eff72538cb810bb1e2
SHA1613ea4385f901c66669aa46f7b5bb88a4b18c1c7
SHA256abcb842741efabb078ec4ea7d3f76a4cf9960064163479eb1ef55a277213ea1f
SHA512713b7e22342edd111200c2de002c90f37e77938a082b3aa1199297fb486015e38f30ef0247e1fe31c9b45594735a1a13960262cafe6652a8c854368ae3d35647