Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe
Resource
win10v2004-20240802-en
General
-
Target
170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe
-
Size
10.4MB
-
MD5
8cc689ef8ff2c65b2b34469c0a586cc1
-
SHA1
51917ae28e6a1a35eb5825d46debcf8e62148bd1
-
SHA256
170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6
-
SHA512
7b8346360f4f964eeed16a25416f11a0392c18d64b2a6878665225500df8f26dd78f3cbafbfd571f283fe343f688a407cf0f720a1b328f08fcb8fce477f45ec4
-
SSDEEP
196608:uVBPUSSJ7PbDdh0HtQba8z1sjzkAilU4I4:ubs5J7PbDjOQba8psjzyz
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 1756 yb9618.tmp 2092 setup.exe -
Loads dropped DLL 5 IoCs
pid Process 292 170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe 292 170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe 292 170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe 2348 170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe 1756 yb9618.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yb9618.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 292 170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 292 170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 292 wrote to memory of 2348 292 170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe 30 PID 292 wrote to memory of 2348 292 170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe 30 PID 292 wrote to memory of 2348 292 170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe 30 PID 292 wrote to memory of 2348 292 170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe 30 PID 292 wrote to memory of 2348 292 170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe 30 PID 292 wrote to memory of 2348 292 170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe 30 PID 292 wrote to memory of 2348 292 170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe 30 PID 2348 wrote to memory of 1756 2348 170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe 33 PID 2348 wrote to memory of 1756 2348 170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe 33 PID 2348 wrote to memory of 1756 2348 170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe 33 PID 2348 wrote to memory of 1756 2348 170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe 33 PID 2348 wrote to memory of 1756 2348 170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe 33 PID 2348 wrote to memory of 1756 2348 170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe 33 PID 2348 wrote to memory of 1756 2348 170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe 33 PID 1756 wrote to memory of 2092 1756 yb9618.tmp 34 PID 1756 wrote to memory of 2092 1756 yb9618.tmp 34 PID 1756 wrote to memory of 2092 1756 yb9618.tmp 34 PID 1756 wrote to memory of 2092 1756 yb9618.tmp 34 PID 1756 wrote to memory of 2092 1756 yb9618.tmp 34 PID 1756 wrote to memory of 2092 1756 yb9618.tmp 34 PID 1756 wrote to memory of 2092 1756 yb9618.tmp 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe"C:\Users\Admin\AppData\Local\Temp\170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Users\Admin\AppData\Local\Temp\170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe"C:\Users\Admin\AppData\Local\Temp\170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe" --parent-installer-process-id=292 --run-as-admin --setup-cmd-line="fake_browser_arc --abt-config-resource-file=\"C:\Users\Admin\AppData\Local\Temp\abt_config_resource\" --abt-update-path=\"C:\Users\Admin\AppData\Local\Temp\5c60073d-0446-4c05-bf79-98c6177e4e35.tmp\" --brand-name=yandex --browser-present=none --distr-info-file=\"C:\Users\Admin\AppData\Local\Temp\distrib_info\" --installer-brand-id=yandex --installer-partner-id=exp_firstscreen_2 --make-browser-default-after-import --progress-window=393558 --send-statistics --testids=1045949 --variations-update-path=\"C:\Users\Admin\AppData\Local\Temp\ec4d9302-708a-45b9-ad1c-4acb1f4926cf.tmp\" --verbose-logging"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\yb9618.tmp"C:\Users\Admin\AppData\Local\Temp\yb9618.tmp" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\5c60073d-0446-4c05-bf79-98c6177e4e35.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --browser-present=none --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --distr-info-file="C:\Users\Admin\AppData\Local\Temp\distrib_info" --histogram-download-time=145 --install-start-time-no-uac=230064000 --installer-brand-id=yandex --installer-partner-id=exp_firstscreen_2 --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --make-browser-default-after-import --partner-package="C:\Users\Admin\AppData\Local\Temp\PartnerFile" --progress-window=393558 --send-statistics --source=lite --testids=1045949 --variations-update-path="C:\Users\Admin\AppData\Local\Temp\ec4d9302-708a-45b9-ad1c-4acb1f4926cf.tmp" --verbose-logging3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\YB_BB2F7.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\YB_BB2F7.tmp\setup.exe" --install-archive="C:\Users\Admin\AppData\Local\Temp\YB_BB2F7.tmp\BROWSER.PACKED.7Z" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\5c60073d-0446-4c05-bf79-98c6177e4e35.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --browser-present=none --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --distr-info-file="C:\Users\Admin\AppData\Local\Temp\distrib_info" --histogram-download-time=145 --install-start-time-no-uac=230064000 --installer-brand-id=yandex --installer-partner-id=exp_firstscreen_2 --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --make-browser-default-after-import --partner-package="C:\Users\Admin\AppData\Local\Temp\PartnerFile" --progress-window=393558 --send-statistics --source=lite --testids=1045949 --variations-update-path="C:\Users\Admin\AppData\Local\Temp\ec4d9302-708a-45b9-ad1c-4acb1f4926cf.tmp" --verbose-logging4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\YB_BB2F7.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\YB_BB2F7.tmp\setup.exe" --install-archive="C:\Users\Admin\AppData\Local\Temp\YB_BB2F7.tmp\BROWSER.PACKED.7Z" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\5c60073d-0446-4c05-bf79-98c6177e4e35.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --browser-present=none --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --distr-info-file="C:\Users\Admin\AppData\Local\Temp\distrib_info" --histogram-download-time=145 --install-start-time-no-uac=230064000 --installer-brand-id=yandex --installer-partner-id=exp_firstscreen_2 --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --make-browser-default-after-import --partner-package="C:\Users\Admin\AppData\Local\Temp\PartnerFile" --progress-window=393558 --send-statistics --source=lite --testids=1045949 --variations-update-path="C:\Users\Admin\AppData\Local\Temp\ec4d9302-708a-45b9-ad1c-4acb1f4926cf.tmp" --verbose-logging --verbose-logging --run-as-admin --target-path="C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application" --child-setup-process --restart-as-admin-time=3783888005⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\YB_BB2F7.tmp\setup.exeC:\Users\Admin\AppData\Local\Temp\YB_BB2F7.tmp\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id=2dd7b5e4628752fb0b47757ed5724904 --annotation=main_process_pid=2548 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=24.7.1.1081 --initial-client-data=0x1b0,0x1b4,0x1b8,0x184,0x1bc,0x559d28,0x559d34,0x559d406⤵PID:1100
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551ce2e5f750299ffc4227fa34a1f58d5
SHA15f6bb49445e633ffca8e698a2aeb6d1a3a63c548
SHA25630766a599f521c9cc57fa46b06cf72dddd22ddd679975f4682caac9ca94741f6
SHA512e030ce1f4a64e96f0cb1ce0f148883f2d4bb2ab75d17a9328144e9dc4eadc3fe13ef54a16fdd2605b958e0f35a92427a865aa32062df56800e55664f25818fb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5280508e6b60a84b17957efa087cd215d
SHA170c2866593318a2fe461c414ef8ebcfa2d57fffb
SHA2563b9a2f5fc9f4b562c11286a823b4dc5dd48825f5eca8405641a4083ebe2c04c8
SHA512b532681ab9265477baa7b551d8ebf4e6842c736df170a6e6491a988f93095b4f6de034911c46dfdf8c504abae8049846be96cd9aa10b0653b4f946c4f9565e95
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
2.4MB
MD5c8f023d3ed227b33c08916208a5055a2
SHA1d4ff785512c0983ae3315728df980dffd19a9bd6
SHA256bff155ac4da5649d6466ffbc5b44282058459cabd6431385152e71467f796638
SHA512998f73662684e81204402bc210024cb1643362fa959112d3ade5626dc016528b7e3ffdeedcaa2ae14011a7a903795babdaeed3e2f25bf277c36170a314862a48
-
Filesize
1.9MB
MD51fa2e24997d8e6cafe1c403319bca4d7
SHA126e0355602f45f6e429e9c7b976626ffb5bd0b0c
SHA25670e5a4a31d07e2162b58ad7db5f7128ef9511537e6c2066d9e148f27093b15b6
SHA512afd91b889235d04ff74cd266cf16ae0d599bef89d86ccfdd6f1ad4a17bc964009069efc5fc2b6af03a828be6ce6924fdf938d047b3a98e1ab3dc3332fc73e063
-
Filesize
1.8MB
MD5dfc1284dee7eedbd77f40d47a66dc4b2
SHA18407b1dcf8088a1132b403b908bbe5ca0a65102b
SHA256b6114df18741dfc6f454dbfef066bc8ccf80b87f5078b30659b71e3cf4611e9b
SHA5124272503b1d106e39eae439d1ec0c88cfa9ff02742d18a76312ae36bf05933e160498af41a852dfeaca80d09ff59a12165d977d40d118430cb5ed05f3dfe1ab59
-
Filesize
361B
MD533ae4078cc7853bf50d0d2e90f5d96e9
SHA1c75b317ba76df2837047122591594cfc00003258
SHA25698ddb6f16e1a38f73c6447d09e529e2b9fa774ceb1604bb6dc54d3a3849e277d
SHA5128866ddfa4d6051916d893d77f4daaf8c006e8e907fb43a68c68d3d533ba496e7aa0f483113315f236e066aa21b32d49ad8b7e44ad1a70d23ba68f48c5c9ae9d7
-
Filesize
16KB
MD562bdffbec5ff38a2e207ab654506d93d
SHA187402a5fb6fb5e18012d81cee51635c15e90dddc
SHA2565b44d01f25abdfb8d5bc9a9fc2b9121dfa6b5f2a3b798ad5364910bbdca6e3cc
SHA51236eedc65e0cef92d18d0b16205856b9f7b353bf972daab039015f675db03d7f1a090657ebea8f3c68e0ef7d2d800ac2128b61f0d598794b6063deee117eff89b
-
Filesize
16KB
MD5df07aea7454c455aa99948d912c4ecf6
SHA1408ee31054132e9d7b55c777159260d9eb1f345e
SHA256657b8ffc6921a780986e96d92b5565d53f719f960eb0a1113699cc668942e05b
SHA5128bf00705a98900158bfe63518275fa93333e2b560dffc9b4f12589e69582e4642c8e840dc953c12c9dffe581671b3906d207b19e52d29734cf25a4d17691f647
-
Filesize
6KB
MD515f941db258a704ed0b475cfedc3a3e1
SHA1d48ef541fee78fc006533c5b541aedce4950a1da
SHA2568e72e1f7b96afae5dac74959d6435721e815823588d3ec30f3af04de61ceeae1
SHA51248edcb85bb75073bd78310b8b5ed2f48732eec9ab12de20b79c5cd40817f716acfd1354731433078b56aeace80356533eb8054cd72a0612c0c5bcc08f80c8d08
-
Filesize
43KB
MD52f98fc685a16bfc3a0f1e959a7eb6585
SHA1d7d7f20234708b1f975a9d0b800040293e0006b2
SHA256f5a8f234351bd668075a128a753ce034f43e8c29096890dfdbff6e15062c8c41
SHA5125428ff620ca9ab0ad51dd77b145ec25952be4c483a04af5acd1010577cd57dbc672c05d6c694382bdb62c34be1451aebe027497ac777f0ed4def8445eb69ebcb
-
Filesize
44KB
MD545e5523e2f7dc82dc74747edf4268704
SHA1764af8b28fc174b214eb5e2d6130ac8568f73dd2
SHA2562eab0637d641ec876d30b36155c9ae2f58e746ee874bd1ef8b29ca78c10d6671
SHA512f1bfd626b22e3e3628f08ffdcbd98cd117be2397ee76c8d13b870562cc98ea6f9a2ecada3a4f8e2016450df789c43130a727509c682e89252bfe11dc623bf25f
-
Filesize
171KB
MD55df7b03d702fd3bdd383455dd82e6086
SHA1b98ac2732ff8383dbd747f04998ef2648e3d910a
SHA25643d8afe58ea0972e36416dc7e9535bc1d7252caa20200ba3b4b29ae7c886c893
SHA512d8648f29fa3e5ef9bd82ca92651766fae2de7f4eface02fc5c9fc1d375f09879cd21f1a59e361344182a284539e5e07977e208680357692872660af353e23e38
-
Filesize
4KB
MD5380be59ff38f502ae4d53fb60addcc21
SHA137bb8735174f7f7ef12217c1d49c687572bacee2
SHA2565f8ac9bbf497154912df112fd77323363c47525e1ac0bdd6254205bef3a4bc32
SHA51203fd000d676936ac2893e8cb8dd5bcf5e28cd9d29c3241e9e555214bc5aafea5deb944891ba240cb20941dbd9b8aeb0505da3e1845557d78fea0688513219088
-
Filesize
38B
MD53d50736d08726f7ca87fa7b16e74170a
SHA1a5f00877635d94063e25f0bb2c3e8a5ac9d99e9c
SHA256e38f5e2e9dd42596f69933c98487b78aece08bf249c14bca422c20b4195c6441
SHA5129497b6396c5c848ada109e1a0b9d732b4bfd0c20d5abe5414dba97413e14a2a1000b07aad9ed21022af7a88af870093c55cb6e7a71cd815885e174d89fb0f26e
-
Filesize
3.6MB
MD53a9c7d273b8bf5efa8da85a34e2d9b53
SHA1203a32abc3ba654bf9b70c878108650335f6f69d
SHA2563abae8d6370b79e4e90e21e7615bccb5f4f586a8cd7742dd642c161cf6e13215
SHA5128bedeadced997a1b2797d92301f6e9aa247d9779a7c4013a499a73354e07db5edb08780b60d43ed14de5527c8ed99dd4e53b608f9f6e63cb79e85443ec1e7e6c
-
Filesize
2.1MB
MD5e9a593007dbe3e8c6af944ec6eebc8bf
SHA17d1eb743334be955abe22a62d437a735bd0e369e
SHA256df8c654cbb63b73f4f9470309dc04ccfafd922260e446b16938e703a72b36542
SHA5124e9b2b47c848b0eb63654f1bfd65a0b508aa64d27f3110655ec9062d06c54648355b21040829ba59535f1c1772b3ddfa963ebdeb19b3fe053212d299cf8cf014
-
Filesize
1.9MB
MD5bd8eb2c1fc99ed2c084852492ab03350
SHA1604b7684de7c43a9616880d69ef208916e3599c5
SHA256d71cdcb2d8d396253302da5713106d116111a6a8066b7f3cf08c5af282538514
SHA51266ca3f772be13da8591093c29ee37488d86c92499d6985f16ec0fcc1015213fe63fa6f1f0a666d3b1f2564bd4bd0b2f5bd75a1c764ab08e3c1aa536d15bea02a
-
Filesize
1.3MB
MD568995e8fccc05ca91208033230df6995
SHA10d4bbe31a7d8dd039309d026ef9a233d4f44a3c0
SHA2568c1a11a7bd4481da41176b42ac18c02404061eddce7f08e5f49bf3ccae7a43f6
SHA512c0c231748a1a877283f3a0e9a834f5d47f94cb52e0180be3ba113d9625f69dbfcd31b84e19ea954ff1086e15377dfc9194f0244926ff8b191ad7472cb93520c6