Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    16s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 02:50

General

  • Target

    0f0c79b758b31b74bd364356def6fb7c5f41ec074572c0563efd65cc157194dcN.exe

  • Size

    313KB

  • MD5

    e7bedb15335bc62943b9c03ec2380c40

  • SHA1

    c372f1fc724e06a2ae4c746943f8a0724a54d668

  • SHA256

    0f0c79b758b31b74bd364356def6fb7c5f41ec074572c0563efd65cc157194dc

  • SHA512

    3a46eeaa5ff935f9d02aad6e474593e0288dd8b37beb8641a9635fae6fb9be3c97a5134a345ea51ab4e55145a11e1d68946805cfeae06ff7c441f0ac85d53ded

  • SSDEEP

    6144:91OgDPdkBAFZWjadD4sUCfvJnLYuauTpHziW/SHN:91OgLdaWLYua4TiW/I

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 4 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f0c79b758b31b74bd364356def6fb7c5f41ec074572c0563efd65cc157194dcN.exe
    "C:\Users\Admin\AppData\Local\Temp\0f0c79b758b31b74bd364356def6fb7c5f41ec074572c0563efd65cc157194dcN.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Users\Admin\AppData\Local\Temp\7zSAC94.tmp\setup.exe
      .\setup.exe /s
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • System policy modification
      PID:2160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\ADDICT-THING\uninstall.exe

    Filesize

    46KB

    MD5

    2628f4240552cc3b2ba04ee51078ae0c

    SHA1

    5b0cca662149240d1fd4354beac1338e97e334ea

    SHA256

    03c965d0bd9827a978ef4080139533573aa800c9803599c0ce91da48506ad8f6

    SHA512

    6ecfcc97126373e82f1edab47020979d7706fc2be39ca792e8f30595133cd762cd4a65a246bee9180713e40e61efa373ecfb5eb72501ee18b38f13e32e61793b

  • C:\Users\Admin\AppData\Local\Temp\7zSAC94.tmp\[email protected]\chrome.manifest

    Filesize

    114B

    MD5

    86679da5129065aa42967533db586853

    SHA1

    9ffbf04112e691ae2cba6cd861931043df4a3fe3

    SHA256

    0c62f8d7590d1d58028aa6f1b212fa453397dc98aaece2d2fdda6449f6cdea0e

    SHA512

    8a378523284a38a2d18576a4f404d94e0cc9fa738603bd7992b8dd43090f04c31c6d187755aef5042f1dbbd6111e3bd89cd86dae81e87f7080e91f15a343f3e6

  • C:\Users\Admin\AppData\Local\Temp\7zSAC94.tmp\[email protected]\content\indexeddb.js

    Filesize

    1KB

    MD5

    d4cbdc647d650a34bed32956469451b8

    SHA1

    b2e91c43e66d701df062da74e956c9c6a4b7b09b

    SHA256

    6a4ae1f2d66d5f81e36456033a6cae2b7f4da7386338775c5a292f6938a406fc

    SHA512

    5cbff76c94b078594423e57e4357e7dfc58c1bc043a6dbc39d251ee2ed6527473ff8c0c637e8fa27995ebf0a047df6f7af86de77f696f07012bb007415ccaebe

  • C:\Users\Admin\AppData\Local\Temp\7zSAC94.tmp\[email protected]\content\jquery.js

    Filesize

    91KB

    MD5

    4bab8348a52d17428f684ad1ec3a427e

    SHA1

    56c912a8c8561070aee7b9808c5f3b2abec40063

    SHA256

    3739b485ac39b157caa066b883e4d9d3f74c50beff0b86cd8a24ce407b179a23

    SHA512

    a693069c66d8316d73a3c01ed9e6a4553c9b92d98b294f0e170cc9f9f5502c814255f5f92b93aeb07e0d6fe4613f9a1d511e1bfd965634f04e6cf18f191a7480

  • C:\Users\Admin\AppData\Local\Temp\7zSAC94.tmp\[email protected]\content\jsext.js

    Filesize

    6KB

    MD5

    176edd98303aea4a603eee9562d3a66b

    SHA1

    494aea94233b4415352559f2dfb56f4bcdd9ad06

    SHA256

    fda3971846e24a467f9917e70a4de3495e24f5f4ce4f3bfc1314c63d77c92e92

    SHA512

    cf80bf43f4b140d9707bfe528aca749318705dbf6d568301300ae42d48bf8183d881eaeedd34ecaffd8ec1e199d42dbb6311ee1172a59377982c2e0b3ecdf0e8

  • C:\Users\Admin\AppData\Local\Temp\7zSAC94.tmp\[email protected]\content\lsdb.js

    Filesize

    1KB

    MD5

    b6ca342d14dcf30b0559630daae9fc3a

    SHA1

    ed2e7201287c39804f236afbbb205bb279b49ac4

    SHA256

    becdc9cda75e4805a6bfdd941f2dfc7bbcdd7689bd4aa5632b5f46eeb7a340a5

    SHA512

    4660a8046aaf95b0ffd91119158c052cd2ef6c2f4532ae9f85e1cb8b0c5191510d08a4e20944fb29baa7ac257a2939a2ec9271cac0071ae4d62bef36107f0c89

  • C:\Users\Admin\AppData\Local\Temp\7zSAC94.tmp\[email protected]\content\prfdb.js

    Filesize

    1KB

    MD5

    e87b5d1dd42c977cfb7851312346a95f

    SHA1

    1c89af574072294f916dd781958f86b5dc6851a3

    SHA256

    6d5a614220c8d9e3922e1812e333a745849d8531004f286227c0588b5e01f5f9

    SHA512

    a8bfd048db8e315437ca97cd9e142b4cc734962d1000b02caa752f8d94ee3ade10b64c5a0d65f356bec1afb94f21772cc6c5ba8e9e5668144f1680431b325a20

  • C:\Users\Admin\AppData\Local\Temp\7zSAC94.tmp\[email protected]\content\sqlite.js

    Filesize

    1KB

    MD5

    e7a41a27cb4d0c7cdf29fa00cf8470bf

    SHA1

    8ab49f07f7e2b307afb4b7d4e4b4fad752f4c801

    SHA256

    0100dd5a5150795e0f83c31c0c1a089cfff909d70417364e06825372b2904a24

    SHA512

    a2a27f26326186b31617be3de66b7f0e0301fc71028d11f613f82dc8da4deb61ce82fe28ca262cd7ada88b3157a59d4cfe61ffb2bb6cc8b08a3bcb8d49bc2e1a

  • C:\Users\Admin\AppData\Local\Temp\7zSAC94.tmp\[email protected]\content\wx.xul

    Filesize

    228B

    MD5

    67ddd023c2461137084f2ad633340b58

    SHA1

    975f7ae1dce94d9baef17c6af3d0bbd2c8e907d3

    SHA256

    f3819e8b078c69ea21f9b4d043671d7350858b1138cd711a9e199a613207ccba

    SHA512

    4c7fa51e2d2a2e13ad52937a1e822b8d5f5ac8acb7fce608bf6d273b8a0c0af7b23d63e6a5c61ca3bc9394b609dddb4a7693e114a04290653d1671ee8bb2646d

  • C:\Users\Admin\AppData\Local\Temp\7zSAC94.tmp\[email protected]\install.rdf

    Filesize

    677B

    MD5

    49feccf54972fa3b76cf7658bf311006

    SHA1

    a4011f7ef758c79c3d1dd2d95a17454ef1448a68

    SHA256

    7feee24667765112724869a54a1fcf84d61f38b7ff3248b531b29434eed89ca0

    SHA512

    55791c174587ee058c9bde128725954bf097f69401e1af2fd4c1a45cdff708c7b77541658eeaa13550aed62a9f785c02ef39d35de21f2572a865d5306dee5749

  • C:\Users\Admin\AppData\Local\Temp\7zSAC94.tmp\background.html

    Filesize

    5KB

    MD5

    4dec5b755e7668b3672d512954c4e724

    SHA1

    5611c637c361c69491fb786b1fb0eff0d420ff62

    SHA256

    de192c86493d056ba9c6bcfd94291969b3d248f58591dc0b41101f3adc56e98a

    SHA512

    c1056c625e9d9444db2255f025f96c518d4b4051ccb1e54cd3ffe6bf601272a848eaf6dfa8072bc63205c9f8fbf3fa61fc537c14dffc3dd477763229783b4b02

  • C:\Users\Admin\AppData\Local\Temp\7zSAC94.tmp\bhoclass.dll

    Filesize

    137KB

    MD5

    ac13c733379328f86568f6e514c2f7f8

    SHA1

    338901240fedcef4e3892fd4c723c89154f4de05

    SHA256

    7bf09b5c2a9b6348227199c1b3951b57907ca6a5c215a04ad8d5e43232f5b562

    SHA512

    35f69a82694a2ea4268a3dde7940af6bd1c87a32d93a72723464f90e4e818805be9e80872469d1cc29150a9aac872fc78613a584baa1327dfa8478c2de5672c4

  • C:\Users\Admin\AppData\Local\Temp\7zSAC94.tmp\content.js

    Filesize

    388B

    MD5

    4bd66e255ec205665674266fad7d18d7

    SHA1

    85b6b3a01f38adf8600cac29fc211435954639da

    SHA256

    bdf8614c129c09ae4a811fa9be68c4bffed0c86d0dc1b0f945259e8bf3789f8f

    SHA512

    6c8afed747f14c3d3cc1974639e6d224cf6df1f0f5b4320fbc2ae7843309ec33ce8219f3f3a1aac2cb25d228111b064fc1dd04ce2ffebcf44c82b27b2e5d4a96

  • C:\Users\Admin\AppData\Local\Temp\7zSAC94.tmp\gabbbdlniblhmfdoeaipdchcdlmjfbhc.crx

    Filesize

    37KB

    MD5

    23dd18e5b5e2c226ec3181e0c26b5505

    SHA1

    fa0d9596f0ed7bd7e330d38ac7108c0c8fad70dc

    SHA256

    9619a60458d5f91b5d82da7f0805e253041d96e50ab5d1c8dbebeb5d1927909d

    SHA512

    ad225d4dfc855fb3bb29e03835a9d620933411e1997aa8c429c18f94b03e7b4323e09e1abf3173bf7d2ba3056759aa3a1e7d25cf2112ad647921987f8762b41c

  • C:\Users\Admin\AppData\Local\Temp\7zSAC94.tmp\settings.ini

    Filesize

    610B

    MD5

    7d7c5fd6bf26f6c2bc1f4045c6fb827b

    SHA1

    089469850d8711edca36b10b0e1296d3f59013c9

    SHA256

    d81486fa2c5c3961ce5a684756a42668591c7bb3cd3c694a4c10eb1cd6b6946e

    SHA512

    d0f3f4b56b201d6a5a64887a66b9f453665e1f11dd5e9879fbe2671ffdf3dfc11a6bda4a9579a3bf5d1014d66787fe5c4da00615f5f49679ce8d425843db1eeb

  • \Users\Admin\AppData\Local\Temp\7zSAC94.tmp\setup.exe

    Filesize

    61KB

    MD5

    201d2311011ffdf6c762fd46cdeb52ab

    SHA1

    65c474ca42a337745e288be0e21f43ceaafd5efe

    SHA256

    15c0e4fd6091cda70fa308ea5ee956996f6eb23d24e44700bd5c74bf111cf2aa

    SHA512

    235d70114f391d9e7a319d94bdfc49665d147723379de7487ef76cfc968f7faa3191153b32ba1ab466caeeeeef4852381529a168c3acca9a8d5a26dfe0436f6b