Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 18:25

General

  • Target

    170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe

  • Size

    10.4MB

  • MD5

    8cc689ef8ff2c65b2b34469c0a586cc1

  • SHA1

    51917ae28e6a1a35eb5825d46debcf8e62148bd1

  • SHA256

    170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6

  • SHA512

    7b8346360f4f964eeed16a25416f11a0392c18d64b2a6878665225500df8f26dd78f3cbafbfd571f283fe343f688a407cf0f720a1b328f08fcb8fce477f45ec4

  • SSDEEP

    196608:uVBPUSSJ7PbDdh0HtQba8z1sjzkAilU4I4:ubs5J7PbDjOQba8psjzyz

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe
    "C:\Users\Admin\AppData\Local\Temp\170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:292
    • C:\Users\Admin\AppData\Local\Temp\170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe
      "C:\Users\Admin\AppData\Local\Temp\170e58ad15c295b733caca94b3737c7a7e145562bec4c940dd9030e7bf2cb9a6.exe" --parent-installer-process-id=292 --run-as-admin --setup-cmd-line="fake_browser_arc --abt-config-resource-file=\"C:\Users\Admin\AppData\Local\Temp\abt_config_resource\" --abt-update-path=\"C:\Users\Admin\AppData\Local\Temp\5c60073d-0446-4c05-bf79-98c6177e4e35.tmp\" --brand-name=yandex --browser-present=none --distr-info-file=\"C:\Users\Admin\AppData\Local\Temp\distrib_info\" --installer-brand-id=yandex --installer-partner-id=exp_firstscreen_2 --make-browser-default-after-import --progress-window=393558 --send-statistics --testids=1045949 --variations-update-path=\"C:\Users\Admin\AppData\Local\Temp\ec4d9302-708a-45b9-ad1c-4acb1f4926cf.tmp\" --verbose-logging"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2348
      • C:\Users\Admin\AppData\Local\Temp\yb9618.tmp
        "C:\Users\Admin\AppData\Local\Temp\yb9618.tmp" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\5c60073d-0446-4c05-bf79-98c6177e4e35.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --browser-present=none --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --distr-info-file="C:\Users\Admin\AppData\Local\Temp\distrib_info" --histogram-download-time=145 --install-start-time-no-uac=230064000 --installer-brand-id=yandex --installer-partner-id=exp_firstscreen_2 --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --make-browser-default-after-import --partner-package="C:\Users\Admin\AppData\Local\Temp\PartnerFile" --progress-window=393558 --send-statistics --source=lite --testids=1045949 --variations-update-path="C:\Users\Admin\AppData\Local\Temp\ec4d9302-708a-45b9-ad1c-4acb1f4926cf.tmp" --verbose-logging
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1756
        • C:\Users\Admin\AppData\Local\Temp\YB_BB2F7.tmp\setup.exe
          "C:\Users\Admin\AppData\Local\Temp\YB_BB2F7.tmp\setup.exe" --install-archive="C:\Users\Admin\AppData\Local\Temp\YB_BB2F7.tmp\BROWSER.PACKED.7Z" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\5c60073d-0446-4c05-bf79-98c6177e4e35.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --browser-present=none --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --distr-info-file="C:\Users\Admin\AppData\Local\Temp\distrib_info" --histogram-download-time=145 --install-start-time-no-uac=230064000 --installer-brand-id=yandex --installer-partner-id=exp_firstscreen_2 --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --make-browser-default-after-import --partner-package="C:\Users\Admin\AppData\Local\Temp\PartnerFile" --progress-window=393558 --send-statistics --source=lite --testids=1045949 --variations-update-path="C:\Users\Admin\AppData\Local\Temp\ec4d9302-708a-45b9-ad1c-4acb1f4926cf.tmp" --verbose-logging
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2092
          • C:\Users\Admin\AppData\Local\Temp\YB_BB2F7.tmp\setup.exe
            "C:\Users\Admin\AppData\Local\Temp\YB_BB2F7.tmp\setup.exe" --install-archive="C:\Users\Admin\AppData\Local\Temp\YB_BB2F7.tmp\BROWSER.PACKED.7Z" --abt-config-resource-file="C:\Users\Admin\AppData\Local\Temp\abt_config_resource" --abt-update-path="C:\Users\Admin\AppData\Local\Temp\5c60073d-0446-4c05-bf79-98c6177e4e35.tmp" --brand-name=yandex --brand-package="C:\Users\Admin\AppData\Local\Temp\BrandFile" --browser-present=none --clids-file="C:\Users\Admin\AppData\Local\Temp\clids.xml" --distr-info-file="C:\Users\Admin\AppData\Local\Temp\distrib_info" --histogram-download-time=145 --install-start-time-no-uac=230064000 --installer-brand-id=yandex --installer-partner-id=exp_firstscreen_2 --installerdata="C:\Users\Admin\AppData\Local\Temp\master_preferences" --make-browser-default-after-import --partner-package="C:\Users\Admin\AppData\Local\Temp\PartnerFile" --progress-window=393558 --send-statistics --source=lite --testids=1045949 --variations-update-path="C:\Users\Admin\AppData\Local\Temp\ec4d9302-708a-45b9-ad1c-4acb1f4926cf.tmp" --verbose-logging --verbose-logging --run-as-admin --target-path="C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\Application" --child-setup-process --restart-as-admin-time=378388800
            5⤵
              PID:2548
              • C:\Users\Admin\AppData\Local\Temp\YB_BB2F7.tmp\setup.exe
                C:\Users\Admin\AppData\Local\Temp\YB_BB2F7.tmp\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Yandex\YandexBrowser\User Data\Crashpad" --url=https://crash-reports.browser.yandex.net/submit --annotation=machine_id=2dd7b5e4628752fb0b47757ed5724904 --annotation=main_process_pid=2548 --annotation=plat=Win32 --annotation=prod=Yandex --annotation=session_logout=False --annotation=ver=24.7.1.1081 --initial-client-data=0x1b0,0x1b4,0x1b8,0x184,0x1bc,0x559d28,0x559d34,0x559d40
                6⤵
                  PID:1100

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

        Filesize

        1KB

        MD5

        a266bb7dcc38a562631361bbf61dd11b

        SHA1

        3b1efd3a66ea28b16697394703a72ca340a05bd5

        SHA256

        df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

        SHA512

        0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        51ce2e5f750299ffc4227fa34a1f58d5

        SHA1

        5f6bb49445e633ffca8e698a2aeb6d1a3a63c548

        SHA256

        30766a599f521c9cc57fa46b06cf72dddd22ddd679975f4682caac9ca94741f6

        SHA512

        e030ce1f4a64e96f0cb1ce0f148883f2d4bb2ab75d17a9328144e9dc4eadc3fe13ef54a16fdd2605b958e0f35a92427a865aa32062df56800e55664f25818fb3

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

        Filesize

        242B

        MD5

        280508e6b60a84b17957efa087cd215d

        SHA1

        70c2866593318a2fe461c414ef8ebcfa2d57fffb

        SHA256

        3b9a2f5fc9f4b562c11286a823b4dc5dd48825f5eca8405641a4083ebe2c04c8

        SHA512

        b532681ab9265477baa7b551d8ebf4e6842c736df170a6e6491a988f93095b4f6de034911c46dfdf8c504abae8049846be96cd9aa10b0653b4f946c4f9565e95

      • C:\Users\Admin\AppData\Local\Temp\CabD0F9.tmp

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\Local\Temp\TarD198.tmp

        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

      • C:\Users\Admin\AppData\Local\Temp\YB_BB2F7.tmp\setup.exe

        Filesize

        2.4MB

        MD5

        c8f023d3ed227b33c08916208a5055a2

        SHA1

        d4ff785512c0983ae3315728df980dffd19a9bd6

        SHA256

        bff155ac4da5649d6466ffbc5b44282058459cabd6431385152e71467f796638

        SHA512

        998f73662684e81204402bc210024cb1643362fa959112d3ade5626dc016528b7e3ffdeedcaa2ae14011a7a903795babdaeed3e2f25bf277c36170a314862a48

      • C:\Users\Admin\AppData\Local\Temp\YB_BB2F7.tmp\setup.exe

        Filesize

        1.9MB

        MD5

        1fa2e24997d8e6cafe1c403319bca4d7

        SHA1

        26e0355602f45f6e429e9c7b976626ffb5bd0b0c

        SHA256

        70e5a4a31d07e2162b58ad7db5f7128ef9511537e6c2066d9e148f27093b15b6

        SHA512

        afd91b889235d04ff74cd266cf16ae0d599bef89d86ccfdd6f1ad4a17bc964009069efc5fc2b6af03a828be6ce6924fdf938d047b3a98e1ab3dc3332fc73e063

      • C:\Users\Admin\AppData\Local\Temp\YB_BB2F7.tmp\setup.exe

        Filesize

        1.8MB

        MD5

        dfc1284dee7eedbd77f40d47a66dc4b2

        SHA1

        8407b1dcf8088a1132b403b908bbe5ca0a65102b

        SHA256

        b6114df18741dfc6f454dbfef066bc8ccf80b87f5078b30659b71e3cf4611e9b

        SHA512

        4272503b1d106e39eae439d1ec0c88cfa9ff02742d18a76312ae36bf05933e160498af41a852dfeaca80d09ff59a12165d977d40d118430cb5ed05f3dfe1ab59

      • C:\Users\Admin\AppData\Local\Temp\distrib_info

        Filesize

        361B

        MD5

        33ae4078cc7853bf50d0d2e90f5d96e9

        SHA1

        c75b317ba76df2837047122591594cfc00003258

        SHA256

        98ddb6f16e1a38f73c6447d09e529e2b9fa774ceb1604bb6dc54d3a3849e277d

        SHA512

        8866ddfa4d6051916d893d77f4daaf8c006e8e907fb43a68c68d3d533ba496e7aa0f483113315f236e066aa21b32d49ad8b7e44ad1a70d23ba68f48c5c9ae9d7

      • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

        Filesize

        16KB

        MD5

        62bdffbec5ff38a2e207ab654506d93d

        SHA1

        87402a5fb6fb5e18012d81cee51635c15e90dddc

        SHA256

        5b44d01f25abdfb8d5bc9a9fc2b9121dfa6b5f2a3b798ad5364910bbdca6e3cc

        SHA512

        36eedc65e0cef92d18d0b16205856b9f7b353bf972daab039015f675db03d7f1a090657ebea8f3c68e0ef7d2d800ac2128b61f0d598794b6063deee117eff89b

      • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

        Filesize

        16KB

        MD5

        df07aea7454c455aa99948d912c4ecf6

        SHA1

        408ee31054132e9d7b55c777159260d9eb1f345e

        SHA256

        657b8ffc6921a780986e96d92b5565d53f719f960eb0a1113699cc668942e05b

        SHA512

        8bf00705a98900158bfe63518275fa93333e2b560dffc9b4f12589e69582e4642c8e840dc953c12c9dffe581671b3906d207b19e52d29734cf25a4d17691f647

      • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

        Filesize

        6KB

        MD5

        15f941db258a704ed0b475cfedc3a3e1

        SHA1

        d48ef541fee78fc006533c5b541aedce4950a1da

        SHA256

        8e72e1f7b96afae5dac74959d6435721e815823588d3ec30f3af04de61ceeae1

        SHA512

        48edcb85bb75073bd78310b8b5ed2f48732eec9ab12de20b79c5cd40817f716acfd1354731433078b56aeace80356533eb8054cd72a0612c0c5bcc08f80c8d08

      • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

        Filesize

        43KB

        MD5

        2f98fc685a16bfc3a0f1e959a7eb6585

        SHA1

        d7d7f20234708b1f975a9d0b800040293e0006b2

        SHA256

        f5a8f234351bd668075a128a753ce034f43e8c29096890dfdbff6e15062c8c41

        SHA512

        5428ff620ca9ab0ad51dd77b145ec25952be4c483a04af5acd1010577cd57dbc672c05d6c694382bdb62c34be1451aebe027497ac777f0ed4def8445eb69ebcb

      • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

        Filesize

        44KB

        MD5

        45e5523e2f7dc82dc74747edf4268704

        SHA1

        764af8b28fc174b214eb5e2d6130ac8568f73dd2

        SHA256

        2eab0637d641ec876d30b36155c9ae2f58e746ee874bd1ef8b29ca78c10d6671

        SHA512

        f1bfd626b22e3e3628f08ffdcbd98cd117be2397ee76c8d13b870562cc98ea6f9a2ecada3a4f8e2016450df789c43130a727509c682e89252bfe11dc623bf25f

      • C:\Users\Admin\AppData\Local\Temp\master_preferences

        Filesize

        171KB

        MD5

        5df7b03d702fd3bdd383455dd82e6086

        SHA1

        b98ac2732ff8383dbd747f04998ef2648e3d910a

        SHA256

        43d8afe58ea0972e36416dc7e9535bc1d7252caa20200ba3b4b29ae7c886c893

        SHA512

        d8648f29fa3e5ef9bd82ca92651766fae2de7f4eface02fc5c9fc1d375f09879cd21f1a59e361344182a284539e5e07977e208680357692872660af353e23e38

      • C:\Users\Admin\AppData\Local\Temp\yandex_browser_installer.log

        Filesize

        4KB

        MD5

        380be59ff38f502ae4d53fb60addcc21

        SHA1

        37bb8735174f7f7ef12217c1d49c687572bacee2

        SHA256

        5f8ac9bbf497154912df112fd77323363c47525e1ac0bdd6254205bef3a4bc32

        SHA512

        03fd000d676936ac2893e8cb8dd5bcf5e28cd9d29c3241e9e555214bc5aafea5deb944891ba240cb20941dbd9b8aeb0505da3e1845557d78fea0688513219088

      • C:\Users\Admin\AppData\Roaming\Yandex\ui

        Filesize

        38B

        MD5

        3d50736d08726f7ca87fa7b16e74170a

        SHA1

        a5f00877635d94063e25f0bb2c3e8a5ac9d99e9c

        SHA256

        e38f5e2e9dd42596f69933c98487b78aece08bf249c14bca422c20b4195c6441

        SHA512

        9497b6396c5c848ada109e1a0b9d732b4bfd0c20d5abe5414dba97413e14a2a1000b07aad9ed21022af7a88af870093c55cb6e7a71cd815885e174d89fb0f26e

      • \Users\Admin\AppData\Local\Temp\YB_BB2F7.tmp\setup.exe

        Filesize

        3.6MB

        MD5

        3a9c7d273b8bf5efa8da85a34e2d9b53

        SHA1

        203a32abc3ba654bf9b70c878108650335f6f69d

        SHA256

        3abae8d6370b79e4e90e21e7615bccb5f4f586a8cd7742dd642c161cf6e13215

        SHA512

        8bedeadced997a1b2797d92301f6e9aa247d9779a7c4013a499a73354e07db5edb08780b60d43ed14de5527c8ed99dd4e53b608f9f6e63cb79e85443ec1e7e6c

      • \Users\Admin\AppData\Local\Temp\YB_BB2F7.tmp\setup.exe

        Filesize

        2.1MB

        MD5

        e9a593007dbe3e8c6af944ec6eebc8bf

        SHA1

        7d1eb743334be955abe22a62d437a735bd0e369e

        SHA256

        df8c654cbb63b73f4f9470309dc04ccfafd922260e446b16938e703a72b36542

        SHA512

        4e9b2b47c848b0eb63654f1bfd65a0b508aa64d27f3110655ec9062d06c54648355b21040829ba59535f1c1772b3ddfa963ebdeb19b3fe053212d299cf8cf014

      • \Users\Admin\AppData\Local\Temp\YB_BB2F7.tmp\setup.exe

        Filesize

        1.9MB

        MD5

        bd8eb2c1fc99ed2c084852492ab03350

        SHA1

        604b7684de7c43a9616880d69ef208916e3599c5

        SHA256

        d71cdcb2d8d396253302da5713106d116111a6a8066b7f3cf08c5af282538514

        SHA512

        66ca3f772be13da8591093c29ee37488d86c92499d6985f16ec0fcc1015213fe63fa6f1f0a666d3b1f2564bd4bd0b2f5bd75a1c764ab08e3c1aa536d15bea02a

      • \Users\Admin\AppData\Local\Temp\YB_BB2F7.tmp\setup.exe

        Filesize

        1.3MB

        MD5

        68995e8fccc05ca91208033230df6995

        SHA1

        0d4bbe31a7d8dd039309d026ef9a233d4f44a3c0

        SHA256

        8c1a11a7bd4481da41176b42ac18c02404061eddce7f08e5f49bf3ccae7a43f6

        SHA512

        c0c231748a1a877283f3a0e9a834f5d47f94cb52e0180be3ba113d9625f69dbfcd31b84e19ea954ff1086e15377dfc9194f0244926ff8b191ad7472cb93520c6