Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    74s
  • max time network
    76s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 07:02

General

  • Target

    015f263e759ee7d432477896b133e2e1.exe

  • Size

    1.7MB

  • MD5

    015f263e759ee7d432477896b133e2e1

  • SHA1

    3d681383899c36f8b68f5dcd07467fe5500b62e2

  • SHA256

    78a447652c13652d61bab358c48f634e9c005d38d06e6f93ae260c7aa7236c57

  • SHA512

    2e16ca38d5e3b42711119471100a8d7b526302cf5ebe6e36d90c52c8f0b779393c66d58aaf0571c202f04aa2ffff602adf6940a843d29218ad68360a0a61333f

  • SSDEEP

    49152:JtGL2S0VHoPxdKRo2sTjgL9R2fk5RbMqhpFhjSpY:JtG63VOuo2E8LOCI2U

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\015f263e759ee7d432477896b133e2e1.exe
    "C:\Users\Admin\AppData\Local\Temp\015f263e759ee7d432477896b133e2e1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1892
    • C:\Users\Admin\AppData\Local\Temp\015f263e759ee7d432477896b133e2e1.exe
      "C:\Users\Admin\AppData\Local\Temp\015f263e759ee7d432477896b133e2e1.exe"
      2⤵
      • Loads dropped DLL
      • Accesses Microsoft Outlook profiles
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:4668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Nzczlu.tmp

    Filesize

    92KB

    MD5

    2c87b2d541eecd3b4a69f502e63a5783

    SHA1

    c3d1777df678cf4ef89ec8330f4d64f07fb26f9e

    SHA256

    eae2daadf140785ff98f48909f57ec24b3138fc0744018ec84a4ff8932c3d638

    SHA512

    502bd68d3ead4d794969b1db7dde114e0d3ded7fc52d81ab4e50c9d59ba74a0279426b54502301e2589929802b91ff8aa32d7e3d02a79d98209e540b40f7304c

  • C:\Users\Admin\AppData\Local\Temp\Oobkyamwuht.tmp

    Filesize

    148KB

    MD5

    90a1d4b55edf36fa8b4cc6974ed7d4c4

    SHA1

    aba1b8d0e05421e7df5982899f626211c3c4b5c1

    SHA256

    7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

    SHA512

    ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

  • \Users\Admin\AppData\Local\Temp\Costura\AF7011DB9BA75DE3E4434379E8037F31\32\sqlite.interop.dll

    Filesize

    1.3MB

    MD5

    e962a1987ddf83d7050ad3752bb56cb6

    SHA1

    378cd57c7afeeb030f7a93cec7af50526123886e

    SHA256

    77b3eadbc24d7bafdb5ffbea389fad9722db7b563e849388510002cb759e2c00

    SHA512

    cf58268c3cdeb4ad98892e46a8615c690b2c66d15c13cd815c8c1f98386eceecc120769936e87ace212fd0fc0716dc497691f4b7c123890823473ff328bfd68e

  • memory/1892-0-0x00000000742EE000-0x00000000742EF000-memory.dmp

    Filesize

    4KB

  • memory/1892-1-0x00000000009E0000-0x0000000000BA4000-memory.dmp

    Filesize

    1.8MB

  • memory/1892-2-0x0000000004C00000-0x0000000004DAC000-memory.dmp

    Filesize

    1.7MB

  • memory/1892-3-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-14-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-12-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-10-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-8-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-6-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-4-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-16-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-18-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-20-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-22-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-24-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-26-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-28-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-30-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-32-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-34-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-36-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-38-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-40-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-42-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-44-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-46-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-48-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-50-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-52-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-54-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-56-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-58-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-60-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-62-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-64-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-66-0x0000000004C00000-0x0000000004DA5000-memory.dmp

    Filesize

    1.6MB

  • memory/1892-1076-0x00000000008D0000-0x000000000091C000-memory.dmp

    Filesize

    304KB

  • memory/1892-1075-0x0000000002140000-0x0000000002266000-memory.dmp

    Filesize

    1.1MB

  • memory/1892-1077-0x00000000742E0000-0x00000000749CE000-memory.dmp

    Filesize

    6.9MB

  • memory/1892-1078-0x00000000742E0000-0x00000000749CE000-memory.dmp

    Filesize

    6.9MB

  • memory/1892-1079-0x00000000022D0000-0x0000000002324000-memory.dmp

    Filesize

    336KB

  • memory/1892-1096-0x00000000742E0000-0x00000000749CE000-memory.dmp

    Filesize

    6.9MB

  • memory/4668-1095-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/4668-1098-0x00000000742E0000-0x00000000749CE000-memory.dmp

    Filesize

    6.9MB

  • memory/4668-1097-0x00000000742E0000-0x00000000749CE000-memory.dmp

    Filesize

    6.9MB

  • memory/4668-1099-0x00000000050A0000-0x00000000051AE000-memory.dmp

    Filesize

    1.1MB

  • memory/4668-3958-0x0000000004CE0000-0x0000000004D7E000-memory.dmp

    Filesize

    632KB

  • memory/4668-3959-0x0000000007050000-0x0000000007268000-memory.dmp

    Filesize

    2.1MB

  • memory/4668-3960-0x0000000008520000-0x000000000884C000-memory.dmp

    Filesize

    3.2MB

  • memory/4668-3965-0x00000000742E0000-0x00000000749CE000-memory.dmp

    Filesize

    6.9MB

  • memory/4668-3966-0x0000000005C40000-0x0000000005CBA000-memory.dmp

    Filesize

    488KB

  • memory/4668-3967-0x0000000005580000-0x00000000055E4000-memory.dmp

    Filesize

    400KB

  • memory/4668-3969-0x00000000021D0000-0x00000000021F0000-memory.dmp

    Filesize

    128KB

  • memory/4668-3997-0x00000000742E0000-0x00000000749CE000-memory.dmp

    Filesize

    6.9MB