Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 12:06

General

  • Target

    60bb3a6004eda4dd946b5da7d1abd7f42dec2fd50d2da94aaeb4e21989c0bf32.exe

  • Size

    1.8MB

  • MD5

    ff315ebd7aa82f6445ffc27fa50539db

  • SHA1

    47bb53469b938fc952744a157c7641454e19df55

  • SHA256

    60bb3a6004eda4dd946b5da7d1abd7f42dec2fd50d2da94aaeb4e21989c0bf32

  • SHA512

    497e8e75261f9e11018821b2241f72239e1fce41777c4563001bb38bcaab109a6686a91e1969ce5cebdc84a5351b7f0175446fe22ca54d7cf996ee8023fbd33e

  • SSDEEP

    24576:VEeqQq3K8ZXFPLXydzhsDjQWC5zUmtdIeaV2lqAHKyS9lgMDiSeRIyI8NJ6:VEuq66XFDyWnCtUuddaklqjihhI8/6

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60bb3a6004eda4dd946b5da7d1abd7f42dec2fd50d2da94aaeb4e21989c0bf32.exe
    "C:\Users\Admin\AppData\Local\Temp\60bb3a6004eda4dd946b5da7d1abd7f42dec2fd50d2da94aaeb4e21989c0bf32.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2860
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\SC450024181.pdf"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2000
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\SC450061736.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\SC450061736.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\SC450061736.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\SC450061736.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Accesses Microsoft Outlook profiles
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:2720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Guqkzmuj.tmp

    Filesize

    92KB

    MD5

    6093b9b9effe107a1958b5e8775d196a

    SHA1

    f86ede48007734aebe75f41954ea1ef64924b05e

    SHA256

    a10b04d057393f5974c776ed253909cafcd014752a57da2971ae0dddfa889ab0

    SHA512

    2d9c20a201655ffcce71bfafa71b79fe08eb8aa02b5666588302608f6a14126a5a1f4213a963eb528514e2ea2b17871c4c5f9b5ef89c1940c40c0718ec367a77

  • C:\Users\Admin\AppData\Local\Temp\Ofovgugdega.tmp

    Filesize

    148KB

    MD5

    90a1d4b55edf36fa8b4cc6974ed7d4c4

    SHA1

    aba1b8d0e05421e7df5982899f626211c3c4b5c1

    SHA256

    7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

    SHA512

    ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\SC450024181.pdf

    Filesize

    203KB

    MD5

    5be59a3550f0bbb7f14eb2dd55ba9d4d

    SHA1

    bacb5949dec128baab9d0af68a3a58541e11484c

    SHA256

    f87aecd38a06a7a203cfe9d445e11ba1b99b96c5d7afa5f19f50d922e9d52142

    SHA512

    e559bfe90200a1dfa62aa6faf98641a33ad0603618b2e642d8d43e7f30b9205756646a7f8db7af69e3f92258520922164975fcbd914160cae4b7442659b6a713

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\SC450061736.exe

    Filesize

    1.3MB

    MD5

    3a43808ca74b465f9f22ff956f13da72

    SHA1

    d6eedf05b5a7f539c05ee5a462cd490e35da984d

    SHA256

    b050fd2ddc0eb99ced97ea5aadecccb2041550a5443cc3656bd593db0def5247

    SHA512

    a3472a71758b0a8e1f7d409fdf660f84843ccad503aab88fe48c3942f1a9700b91838e691e9f7af81003d305859d1602c84a579db5389148f993633a5f34a6fc

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    2f5efeb62e8f2711f4b5f4d0e02d0b02

    SHA1

    3adfcdd8a30bf84329e789210a8ccc1d7d7c7eae

    SHA256

    c79d6d34fd77bc09f086becad7963e072ce6647a96b405a0a7665d504cf746d5

    SHA512

    5c33585a41144c73edb32798b4f5d7037e0f8b50f3af8f8a4fad802e771cba4e93241c842d9d601bd0dd2a8d78c2007adf213112c26bc221df8c024bb436dcf7

  • \Users\Admin\AppData\Local\Temp\Costura\AF7011DB9BA75DE3E4434379E8037F31\32\sqlite.interop.dll

    Filesize

    1.3MB

    MD5

    e962a1987ddf83d7050ad3752bb56cb6

    SHA1

    378cd57c7afeeb030f7a93cec7af50526123886e

    SHA256

    77b3eadbc24d7bafdb5ffbea389fad9722db7b563e849388510002cb759e2c00

    SHA512

    cf58268c3cdeb4ad98892e46a8615c690b2c66d15c13cd815c8c1f98386eceecc120769936e87ace212fd0fc0716dc497691f4b7c123890823473ff328bfd68e

  • memory/2636-41-0x00000000011D0000-0x0000000001330000-memory.dmp

    Filesize

    1.4MB

  • memory/2636-42-0x0000000000490000-0x00000000004AA000-memory.dmp

    Filesize

    104KB

  • memory/2636-43-0x0000000000330000-0x0000000000340000-memory.dmp

    Filesize

    64KB

  • memory/2636-44-0x0000000007430000-0x0000000007554000-memory.dmp

    Filesize

    1.1MB

  • memory/2720-46-0x0000000000400000-0x00000000004E2000-memory.dmp

    Filesize

    904KB

  • memory/2720-55-0x0000000000400000-0x00000000004E2000-memory.dmp

    Filesize

    904KB

  • memory/2720-58-0x0000000000400000-0x00000000004E2000-memory.dmp

    Filesize

    904KB

  • memory/2720-57-0x0000000000400000-0x00000000004E2000-memory.dmp

    Filesize

    904KB

  • memory/2720-54-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2720-52-0x0000000000400000-0x00000000004E2000-memory.dmp

    Filesize

    904KB

  • memory/2720-50-0x0000000000400000-0x00000000004E2000-memory.dmp

    Filesize

    904KB

  • memory/2720-48-0x0000000000400000-0x00000000004E2000-memory.dmp

    Filesize

    904KB

  • memory/2720-59-0x0000000000DA0000-0x0000000000EB0000-memory.dmp

    Filesize

    1.1MB

  • memory/2720-67-0x0000000000DA0000-0x0000000000EA9000-memory.dmp

    Filesize

    1.0MB

  • memory/2720-81-0x0000000000DA0000-0x0000000000EA9000-memory.dmp

    Filesize

    1.0MB

  • memory/2720-65-0x0000000000DA0000-0x0000000000EA9000-memory.dmp

    Filesize

    1.0MB

  • memory/2720-63-0x0000000000DA0000-0x0000000000EA9000-memory.dmp

    Filesize

    1.0MB

  • memory/2720-61-0x0000000000DA0000-0x0000000000EA9000-memory.dmp

    Filesize

    1.0MB

  • memory/2720-60-0x0000000000DA0000-0x0000000000EA9000-memory.dmp

    Filesize

    1.0MB

  • memory/2720-105-0x0000000000DA0000-0x0000000000EA9000-memory.dmp

    Filesize

    1.0MB

  • memory/2720-111-0x0000000000DA0000-0x0000000000EA9000-memory.dmp

    Filesize

    1.0MB

  • memory/2720-109-0x0000000000DA0000-0x0000000000EA9000-memory.dmp

    Filesize

    1.0MB

  • memory/2720-107-0x0000000000DA0000-0x0000000000EA9000-memory.dmp

    Filesize

    1.0MB

  • memory/2720-103-0x0000000000DA0000-0x0000000000EA9000-memory.dmp

    Filesize

    1.0MB

  • memory/2720-101-0x0000000000DA0000-0x0000000000EA9000-memory.dmp

    Filesize

    1.0MB

  • memory/2720-99-0x0000000000DA0000-0x0000000000EA9000-memory.dmp

    Filesize

    1.0MB

  • memory/2720-97-0x0000000000DA0000-0x0000000000EA9000-memory.dmp

    Filesize

    1.0MB

  • memory/2720-95-0x0000000000DA0000-0x0000000000EA9000-memory.dmp

    Filesize

    1.0MB

  • memory/2720-93-0x0000000000DA0000-0x0000000000EA9000-memory.dmp

    Filesize

    1.0MB

  • memory/2720-91-0x0000000000DA0000-0x0000000000EA9000-memory.dmp

    Filesize

    1.0MB

  • memory/2720-89-0x0000000000DA0000-0x0000000000EA9000-memory.dmp

    Filesize

    1.0MB

  • memory/2720-87-0x0000000000DA0000-0x0000000000EA9000-memory.dmp

    Filesize

    1.0MB

  • memory/2720-2947-0x0000000000590000-0x00000000005DC000-memory.dmp

    Filesize

    304KB

  • memory/2720-2946-0x0000000001110000-0x00000000011AE000-memory.dmp

    Filesize

    632KB

  • memory/2720-85-0x0000000000DA0000-0x0000000000EA9000-memory.dmp

    Filesize

    1.0MB

  • memory/2720-83-0x0000000000DA0000-0x0000000000EA9000-memory.dmp

    Filesize

    1.0MB

  • memory/2720-79-0x0000000000DA0000-0x0000000000EA9000-memory.dmp

    Filesize

    1.0MB

  • memory/2720-77-0x0000000000DA0000-0x0000000000EA9000-memory.dmp

    Filesize

    1.0MB

  • memory/2720-75-0x0000000000DA0000-0x0000000000EA9000-memory.dmp

    Filesize

    1.0MB

  • memory/2720-73-0x0000000000DA0000-0x0000000000EA9000-memory.dmp

    Filesize

    1.0MB

  • memory/2720-71-0x0000000000DA0000-0x0000000000EA9000-memory.dmp

    Filesize

    1.0MB

  • memory/2720-69-0x0000000000DA0000-0x0000000000EA9000-memory.dmp

    Filesize

    1.0MB

  • memory/2720-2948-0x0000000006F80000-0x00000000071DE000-memory.dmp

    Filesize

    2.4MB

  • memory/2720-2949-0x0000000008470000-0x000000000879C000-memory.dmp

    Filesize

    3.2MB

  • memory/2720-2954-0x0000000005A60000-0x0000000005ADA000-memory.dmp

    Filesize

    488KB

  • memory/2720-2955-0x0000000005680000-0x00000000056E4000-memory.dmp

    Filesize

    400KB

  • memory/2720-2957-0x0000000000EF0000-0x0000000000F10000-memory.dmp

    Filesize

    128KB