Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20240221-en -
submitted
19/04/2024, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
948d096a3931a22f116b93ffeefb3a374834d8eb578620c0ffc83f3e468eed81.exe
Resource
win7-20240221-en
General
-
Target
948d096a3931a22f116b93ffeefb3a374834d8eb578620c0ffc83f3e468eed81.exe
-
Size
940KB
-
MD5
265d5b8b9f603f0f5ef62f2c27449607
-
SHA1
39576d6d8388dea489946141dbccf9cf5fe3a28f
-
SHA256
948d096a3931a22f116b93ffeefb3a374834d8eb578620c0ffc83f3e468eed81
-
SHA512
9d4ac79a62fbd0cb1d76c48848af7863dda72bd16368250a2258b3d30a4dddcb24c38ac62555222706041a5073cbc39d291b14ecdf222c7e04add5374403af66
-
SSDEEP
12288:oekLV5eBOkw6Qhe4Yh5wV/uVJuEk6sP4lX8DbDK45dg/bdlh84LZ8Xt8quJsHmrE:on6rhau/OglUbD5yb5LLuXBuJsH4
Malware Config
Signatures
-
Risepro family
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 948d096a3931a22f116b93ffeefb3a374834d8eb578620c0ffc83f3e468eed81.exe Key opened \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 948d096a3931a22f116b93ffeefb3a374834d8eb578620c0ffc83f3e468eed81.exe Key opened \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 948d096a3931a22f116b93ffeefb3a374834d8eb578620c0ffc83f3e468eed81.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Run\RageMP131 = "C:\\Users\\Admin\\AppData\\Local\\RageMP131\\RageMP131.exe" 948d096a3931a22f116b93ffeefb3a374834d8eb578620c0ffc83f3e468eed81.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ipinfo.io 4 ipinfo.io -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 948d096a3931a22f116b93ffeefb3a374834d8eb578620c0ffc83f3e468eed81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 948d096a3931a22f116b93ffeefb3a374834d8eb578620c0ffc83f3e468eed81.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 948d096a3931a22f116b93ffeefb3a374834d8eb578620c0ffc83f3e468eed81.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1964 schtasks.exe 1284 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2920 948d096a3931a22f116b93ffeefb3a374834d8eb578620c0ffc83f3e468eed81.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2920 wrote to memory of 1964 2920 948d096a3931a22f116b93ffeefb3a374834d8eb578620c0ffc83f3e468eed81.exe 30 PID 2920 wrote to memory of 1964 2920 948d096a3931a22f116b93ffeefb3a374834d8eb578620c0ffc83f3e468eed81.exe 30 PID 2920 wrote to memory of 1964 2920 948d096a3931a22f116b93ffeefb3a374834d8eb578620c0ffc83f3e468eed81.exe 30 PID 2920 wrote to memory of 1964 2920 948d096a3931a22f116b93ffeefb3a374834d8eb578620c0ffc83f3e468eed81.exe 30 PID 2920 wrote to memory of 1284 2920 948d096a3931a22f116b93ffeefb3a374834d8eb578620c0ffc83f3e468eed81.exe 32 PID 2920 wrote to memory of 1284 2920 948d096a3931a22f116b93ffeefb3a374834d8eb578620c0ffc83f3e468eed81.exe 32 PID 2920 wrote to memory of 1284 2920 948d096a3931a22f116b93ffeefb3a374834d8eb578620c0ffc83f3e468eed81.exe 32 PID 2920 wrote to memory of 1284 2920 948d096a3931a22f116b93ffeefb3a374834d8eb578620c0ffc83f3e468eed81.exe 32 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 948d096a3931a22f116b93ffeefb3a374834d8eb578620c0ffc83f3e468eed81.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 948d096a3931a22f116b93ffeefb3a374834d8eb578620c0ffc83f3e468eed81.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\948d096a3931a22f116b93ffeefb3a374834d8eb578620c0ffc83f3e468eed81.exe"C:\Users\Admin\AppData\Local\Temp\948d096a3931a22f116b93ffeefb3a374834d8eb578620c0ffc83f3e468eed81.exe"1⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2920 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1964
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1284
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5bd46342c69fd0683a51911e8976bf6b9
SHA117a2451a41ecaaa03e7634dfd5c534aff30d4ce4
SHA256f1467f4fb97e82cbb8490d787f2ca113f32fcc94a6d008fffb3ae7e73e5a089b
SHA51291e7f0bd5acd35b68788d077529b76a54e9bc4875129a2134bfd5ed5e27588cb43fea26a241e184d9170155c961c16bc724e00502f173351ec2df5c9e3cfb32f