Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    129s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01/07/2024, 15:31

General

  • Target

    2024-07-01_5f561b027050af8696e6447496f478ba_avoslocker_chir_magniber.exe

  • Size

    2.6MB

  • MD5

    5f561b027050af8696e6447496f478ba

  • SHA1

    d6dbcaf1b598f75691a763caf2b787113d45f648

  • SHA256

    1bb380b7b96510e61ffade26ef294fd80d5cb8bebcf9f9fb4e7b1f65aefba619

  • SHA512

    0093e3de1e44126fdf663f468bc1e4521b283cbfa469aa2418c4f2d5902962601b56135040038fd8990ac391bcd46dfc497f6c81ce90d2727e800da240400f91

  • SSDEEP

    49152:vwwwwsK27RBxxr0AlXlTWBfBOH5iQZhNW2LZvvFDDNzVZeoDBQADCXOzN5:Atxr0AfTWEiQZhI2LZlDxVZeap5

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-01_5f561b027050af8696e6447496f478ba_avoslocker_chir_magniber.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-01_5f561b027050af8696e6447496f478ba_avoslocker_chir_magniber.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Users\Admin\AppData\Local\Temp\2024-07-01_5f561b027050af8696e6447496f478ba_avoslocker_chir_magniber.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-07-01_5f561b027050af8696e6447496f478ba_avoslocker_chir_magniber.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2196
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 116
        3⤵
        • Program crash
        PID:864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Java\jdk1.7.0_80\jre\readme.eml

    Filesize

    14KB

    MD5

    0417d88327098a9891272b8f9f6d68fe

    SHA1

    c610253561c68bbc80d835e5bb88961bffde9ab3

    SHA256

    8e233447c303b13ce503a58699f143a8865125cdbf37fbd4e662a5b3d9872a5e

    SHA512

    d4a33f19684ac4c1cff2b604f9719d36ab924176a1d69f6791d8336f04b85c4774b32d7b3173561c52ac0da77cc33d1e3bb87fc776bd7c628715d976d5e25688

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html

    Filesize

    12KB

    MD5

    8156706568e77846b7bfbcc091c6ffeb

    SHA1

    792aa0db64f517520ee8f745bee71152532fe4d2

    SHA256

    5e19cfbd6690649d3349e585472385186d99f56a94dc32d9073b83011cea85f8

    SHA512

    8760f26069296f0fe09532f1244d93a57db4cafa8d06aaa9dc981bcaed4bde05366ef21e6f0c1aadad4478382b59a4e43d26c04185cf2ed965901321d05604b8

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html

    Filesize

    8KB

    MD5

    7757fe48a0974cb625e89012c92cc995

    SHA1

    e4684021f14053c3f9526070dc687ff125251162

    SHA256

    c0a8aa811a50c9b592c8f7987c016e178c732d7ebfd11aa985a8f0480539fa03

    SHA512

    b3d4838b59f525078542e7ebbf77300d6f94e13b0bff1c9a2c5b44a66b89310a2593815703f9571565c18b0cdeb84e9e48432208aaa25dff9d2223722902d526

  • C:\ProgramData\Package Cache\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\vcredist_x86.exe

    Filesize

    451KB

    MD5

    4903e553b6700133ebb9b6f51bd8de8f

    SHA1

    04ffd88b13723d65119573e0db507c61ce8f9f10

    SHA256

    7e69cfdf967a127a4f72521a5e129a85f0f46f8f17bd0f03fc39c9cf528e6b5b

    SHA512

    10b2d16d4a44bba16713db86efbfd6671583452e6227fea52a8ba16582a760ae154ae2e82cd9d27c6ac98bc04d35c68dc407a9f90c34c011eac4ab82bd8c6d87

  • C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe

    Filesize

    640KB

    MD5

    caca9c9c4da5696297bd4b1fe04886f3

    SHA1

    241fb52ab9581d68e97323040d669655184ff5bf

    SHA256

    b6f84187a104b8a134f889e85c0f7d554065bb14c294d17904b48bd36d84eb46

    SHA512

    80b84ad2e5aa79d8e9967c9ef9178d01d248569bbee8e3a3e05e376892be63b3d584d39d9e00f58dee593fa52ed8655d9b89782b2e6431d56ded19b672730ca1

  • C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe

    Filesize

    640KB

    MD5

    31a3d88b84227f3beef98d41718498d6

    SHA1

    660e5e2924a45e218b5851e3e70993539c028432

    SHA256

    09353f4fb65a95990e7e35f8e8fe79c3145cb2d82dd964b9eaa776d528ca871b

    SHA512

    55e46d7f5a8de1c3f6b915dcc4bb767555f9284e30c019c72f631b115c51d4eb86c5db6b9e14e01b22af263fb3ee8d63834cc4e711c667da7806a9e108814141

  • C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe

    Filesize

    461KB

    MD5

    025c6f2675f1588b6ab3d39c6d9546bd

    SHA1

    0c1ec1ecf238fc79fb534f6899dc65b4218a1f08

    SHA256

    3f059b69cd2b9894310b925928e59159f07ea68c0a98f4e37cea71f282c7f9d2

    SHA512

    dc250a7b6e26521e4a0c1b0b41d3ba460e9ed88ebc6e46782f668fead6f95d2ce9d6a4bc8f128cc6a60431372b4c0b0728a2c2472875e06768ecec2e91863cc8

  • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

    Filesize

    451KB

    MD5

    048c979b7bae2b171fcdc4c0619f4ea8

    SHA1

    01b7341e4265654af1f34f039d1ca79f4d82f687

    SHA256

    4c2c22bec4b883069575422d6abdc14e99a7e34231340e9244685a3f77e1d1b2

    SHA512

    7059b2beca7eae22aff488ab7fd7da00030b34eb75a891584d0edebb4655e15a6baddeef6e1e962a249bb1001f5cd29e4a8a2bc3a6f8a48a21bac6090056d22d

  • C:\ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\vcredist_x64.exe

    Filesize

    461KB

    MD5

    0e918c55de4fe455a6514545db7669bf

    SHA1

    853a46a7ebf6039e5c9059ca3874636465d5e10c

    SHA256

    bf1d552408e05470b03023161e71777acf7bc2cd899070eb053de90e0a50e17d

    SHA512

    a17d19c78aa7e6dfe283699aeefdb938dc7d26895dc7474c3914c459077647d02c8328cab51d850ddfb3665e9c1f4f6ef9171988c735d12f8bc54076a7761901

  • C:\Users\Admin\AppData\Local\Temp\ose00000.exe

    Filesize

    152KB

    MD5

    4bb528e6ae958a0493653616f37d1da9

    SHA1

    b1793090909b9a2dd11bd7a4a4759620cd10b369

    SHA256

    beacbaf081edd0237fc5326311e4ffea6640e96e6304010ee2f7f6c86b43fb75

    SHA512

    f46d6dfdb87a1932dd0ca24e57c4ba3ef552fddde224270dbb3943a772a7e3c4656b56df6b539fe5b35617deae43267b1f4332f098403522400fdabda4b1c60c

  • C:\Windows\SysWOW64\runouce.exe

    Filesize

    10KB

    MD5

    8ff8f249440dc8cd3bbd64436bebff84

    SHA1

    683862c3af90bd8e801026ba1ed7fe9a6e94019e

    SHA256

    dc0d5707b4e300e968aaefd116adbcae33cb8ac830a592794fbfd5a36979e4a7

    SHA512

    e09c052b424f93b09e489d15110a7939dca5065cddf519887534efc787c645a97a64079765664a260bad8612c304e66b918b667d068fcf63aade72681e07ecfa

  • C:\vcredist2010_x86.log.html

    Filesize

    81KB

    MD5

    1cc0fe68c2303e5fd2246df69bdc5e22

    SHA1

    712ff37ac4074a6883fdefd69f84a88195ace920

    SHA256

    10b4f3c83e4abddd16cda48b6d76e6a9dedbaa101e66aab529c0d5a0b65c2510

    SHA512

    6def6582e7ab36a85a4b62ca2a9150d105d94e547d8bd0c7b0ed790172d227149abf3c6b79ee96df1e0ef0f4b7c995c99c8a55dbf8def265b4a2ccee0559065f

  • memory/864-6-0x0000000000A30000-0x0000000000A31000-memory.dmp

    Filesize

    4KB

  • memory/864-5-0x0000000000A30000-0x0000000000A31000-memory.dmp

    Filesize

    4KB

  • memory/864-7-0x0000000000A30000-0x0000000000A31000-memory.dmp

    Filesize

    4KB

  • memory/2196-1-0x0000000001170000-0x0000000001417000-memory.dmp

    Filesize

    2.7MB

  • memory/2196-3-0x0000000001170000-0x0000000001417000-memory.dmp

    Filesize

    2.7MB

  • memory/2792-0-0x0000000001170000-0x0000000001417000-memory.dmp

    Filesize

    2.7MB

  • memory/2792-2-0x0000000000820000-0x0000000000AC7000-memory.dmp

    Filesize

    2.7MB