Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2024, 05:46

General

  • Target

    $TEMP/Toolbar_Phpnuke.exe

  • Size

    210KB

  • MD5

    1e3e68a0a110922361890ff0de710d74

  • SHA1

    adf466a53c099099541e48655118e2dfeea75be2

  • SHA256

    0930a168d6c22438d2d55cda730b93b330e849325d6ac47590682b3417541baf

  • SHA512

    3a769923b6822dc4d62f3bde718efa87c3da8d5fa7237128236c6249e0d4a1345c0c1b23fdf669052ae30551ac79258ab9e654eb44480b7f0033ea460562f565

  • SSDEEP

    3072:OLk395hYXJN3rSx0M1BnmSplKPl/L49qqw2LsFLK2pJBdEjy4RP/tsFLK2pJBdEb:OQq3W2M3mWsoBL8N7jEjt5V8N7jEjt/5

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 15 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 10 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$TEMP\Toolbar_Phpnuke.exe
    "C:\Users\Admin\AppData\Local\Temp\$TEMP\Toolbar_Phpnuke.exe"
    1⤵
    • Loads dropped DLL
    • Installs/modifies Browser Helper Object
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /s "C:\Program Files (x86)\DealPly\DealPlyIE.dll"
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:1524
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.dealply.com/go/postinstall/?partner=vn&channel=tgldpo
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a6076b6a93f93efba44a51a4815f665d

    SHA1

    faea135433a35ebc6f8a2b6c7cdabc49f692b552

    SHA256

    5f0c73aed65cfa7651bad679e49463fe570e5f1378ff292304ddbb8d2c6883e8

    SHA512

    3d2634a143409fd26d6432b79be565ba4bb9b07f5d12f24c2c5ab56ddd5d91ffc7b56c6b2fac1395837bfcb9c977e515c0b1907fd14b448de8536c65902cf7b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a159b6cff95136a9b527afbab60311a5

    SHA1

    6a8b2a986f44a0f91c2712479df600c06ed31b3a

    SHA256

    3d3e349a02012b0971c70f57024998964bcfd795f3cd5f7d6d3c70d2a0e6ad2d

    SHA512

    0162d2e1d4186ca789755b82de4622d4994d0e4da9e2b28e5028112cf650c77d8bc4b5e5558cb39325fae0d17d625ba68841b864fb8e52baed349c23b85a2115

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d483e0e82c426be18ca7b8c27bc2a4a7

    SHA1

    3516f5781a341307f2a34880273bb028484fc145

    SHA256

    bb2192c31f4b078db7e46634f8bf7a8cf0497c9a9410b63b19335d3d4506f349

    SHA512

    fe97eddcaf5bd9743285f9c8df7a04e49168b23e0a1ba4639afb74d7d2dc1f9d8df6ab6ef3f98f4839f9245f49e018ab4864c2da72bc48ea1a719670f830c4fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d5ccba841ca4af5d8a7d7730a1129cb7

    SHA1

    c0c56baae8efc570455b26f135e826ed430c4e41

    SHA256

    f977cb97fc4f7461607482556dba91199cfa29803b9412c11dd5697266d14af0

    SHA512

    602597ec08f04761f4df29c96d501f8fa4ebc45d93c405b1adeb5c272728e3186253c592c741fdb9aef4119e03f44715ec2fdebb1e383dc2d34626d5705cb4a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d49890f384322a652123be4f977123cf

    SHA1

    70d6d5bccf5d267145248c5efd68bb11fa663d92

    SHA256

    8228e32377fad5dd5d91b9e44d59ff4818aff6b1c2be7e27660d1723e843d129

    SHA512

    8a4059965c94695084938bd2f1c3130bcc275b1ff633c1120884ec5d00e125c700a80d4054adf290a36c615f8f980a730bf768829d369a2cd03b01f32dfa8db2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8cc114aac0052aac1266c80589506d4b

    SHA1

    183006181802b7e39220061753cb9f4609824fd1

    SHA256

    047d176694bb8e11d99d33610ee7356a2b4ede71cc24b6a485f054e0a401dfa6

    SHA512

    e4f7666d589d2e3633dfc33056f3662e14d568b31f9245c85d78bc3b092c4d2f9e0d85f82e678781559e0c5d839c91e3afc52568079fb50704829be859633976

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3c82659fe332456b9f8089693dac0d48

    SHA1

    74aae43db26133b90af203d1974794f15b41c5a2

    SHA256

    d8d90ca7ac55ad71b7d953d2c53ac2c76220a680050c6518577e97ece08317e9

    SHA512

    4f76d5b54a2dc9fd5e148cff707351a9362528644a6ea33acab762e94b2d055ea9ee9ce7a3608b3fcd99d0122666fef92d31da5973a78e93b2771a3d89d3b3e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    51398576e8e7e60950230171dc485a66

    SHA1

    cc60caa6a126484075a0e2d3f7885695a97f2068

    SHA256

    e239bb962cb3e5834a52170b7b31c482e2e0fa6362b5fd6b8c8b69ee017420c4

    SHA512

    a630bf955a3340aeedff77ecb1967a39b56cdbdb22c253378d517581f5be522efcc054867355e9ddc947b5f8a31d328e564e28e80e8fabe5e758f73ab5c964c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    29def2a8dbc510d64cef7e5ccdb692ad

    SHA1

    e2ffb254dba42d640d79168bed71d77fe4a161a4

    SHA256

    a39b045adf8a815e9962de81e7a293b4f1283b5a1804809897909baf7abc58ce

    SHA512

    f832de1c663b2f7e37d81f8941e8f28733d45ebfeaf318d115f7e169cc90103ffbeabca2ddad14a875af7c936f0f38a625c60dce4ef2b1dcd505fbaf64b2a2d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ed9b5d496dea81a8d8b9978efc6a607e

    SHA1

    5848cab3fa3e31fd8fb51287fa5c4d259a2185bb

    SHA256

    660a868046379c7bd7942d6dd5ca48dd5fd3170243f72f8ded5bfabcda4c030a

    SHA512

    1d6bf2a84246b5be31e2828d46bebf5a2230e3a3f5a300933e4290f8ed6a26d45325042025fe05a13396dc0c6d73c3c23b0d88d61ddc75fc68a95c761e8d90e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    312a9c293311152b118a23f1609f6cea

    SHA1

    9849724e0b7dd1f66f89ef34b0a79e754f6163b5

    SHA256

    9b956734d69a98caa0a51b1c2934c327fa2fd0e52c9cc56ca717d5eaecc0bc51

    SHA512

    8f4bc5b9ac2d90a9f4be7799b0050b62432ab73e7c9af5527551d522f8a38cf028fde6aaf90b37a47ef3a673858080ca293277458beea862697a567196f5e6f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3c3ef51baa5edfbc53447570ae4b2e08

    SHA1

    00d2f6c6368a1dbdd65c4f00d68898ccbcc5f910

    SHA256

    8e9ae118cf924d1420cbc331a00b22e6d7e7a953a3315f9d5f682b021388c615

    SHA512

    5058d792e122da0326b7d9c4be41d8fabe74ef2a4e0c7b1370b6d3f2c53ff4b611d616f6eb503f36fcc5983bc11f4bfdeaccb455314f364b11c9c22024df4594

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e3c0473cb547b3a2d146766463d2bc8c

    SHA1

    ae32e45397e4c5bd3295d49b3205bb99bf8e48e4

    SHA256

    5330d8d23fe73b33a560dcd6903c238f8f6e355c4a9ae8b3a643cba57794082c

    SHA512

    f0345bf9880d0815ad442d802ca41c772764c190eccc1b9ba935d4dffd74f2c0539f14838a54a288283f45ee59d0f49f90c109b2be2df199a5d9b06338dbc871

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d07636d32353e248b614537d905a035

    SHA1

    1d8d5f59f8cf769dc95470281d34d684decb7a9f

    SHA256

    2eec279744a685bcf3869fd048f5000da457f99320af263d7b015b1d26452c75

    SHA512

    77763955239525bd83997606280479162512bf4362ad813dee5113f3705ca4509dacc726ca88c9f0621d17ed4877a76daa9614dacbf0a6227cabab9bbcdc0a14

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df2dad17e7597539deaa215d98454791

    SHA1

    f25dfd4654b9f0a19591770a608793e856008093

    SHA256

    bee5292473ffdc557c52c43315b6c3bd5aad48b5067b63e62b93a20b02250df0

    SHA512

    9afba56843a18e387df0b6a965c75f0f3e6f07725d882691db7346917ed537742d378ae71ba4f9bdf1841bb69a4805d2068a30d352025800fd5f6c1a5e664845

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    00cdee88c66df3d68dd2e27b3c2b3281

    SHA1

    e0f2722fe3a05bd70454a9c17d38fe0451f958de

    SHA256

    5b532f58ebe5367096603810831b525e9edae0d1219477c7f9ab807d383b3983

    SHA512

    e561fcafbe53749cfc757cfbc2c8fb4f325e0ab219d2e828441ef03febdf6d186f17314cb2820ebfdbbcf4f27d6a8a6a99b722c1f80827be5903404c4ba5da39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bdd2c3405a6c746603002642a122bd13

    SHA1

    97cafcdbe15701c348122ecb65e1f1e92720a955

    SHA256

    3b8336a82cf064f434e5bdc3822664544c0581bd0f8a39498f73b03b8d04b711

    SHA512

    56fb6198fe19d5f91a74d040d53f97fafb049414d136e458dc8295999b6c9ff40b3cd85c0eafcff18c7ba1746c2fd38c1d67a886b6f34a863b246f1acf4e3190

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b4697b0e39a8980c18f8a1d7f9851ff

    SHA1

    f3b7020cae92e3f1c1d55fb04223dca33780b498

    SHA256

    aa0dc73c3856b77a3e3d0b14506cb1ee9e850b2a4d1e02f7e6fd095bf570a759

    SHA512

    a5563266d2ee0036761a6d4e7335ff52ade237191bf9e12b736e7eb08e878958288309b2555de099963ba8682c9fb77f047948cf08be1466b7f2a5132ea08210

  • C:\Users\Admin\AppData\Local\Temp\Cab7D1.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar870.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\nsoB09B.tmp\ioSpecial.ini

    Filesize

    721B

    MD5

    a0c9f8ee462bfe46ca17cbb28be60887

    SHA1

    157c5e940d809cd5d6cf45cdd5c369fa541b0444

    SHA256

    e8fe9ba2a0c94f300e4eb7c21cb61261e746e411334c9bc21198d0afc8b04a3a

    SHA512

    0562601ac9e3a7df2106042bfdb33da2fafee164bfecfbb197eb9e9c60012831f05812227e8f6e7a34df445dae22041b1cb13b2498548c1bed6477fa8c9198b3

  • \Program Files (x86)\DealPly\DealPlyIE.dll

    Filesize

    76KB

    MD5

    ee5fb0fd8c2d19d90e8fad8e8636a38e

    SHA1

    5d41abc6c1e69e72466eeb4e4f2128ac0343bb16

    SHA256

    02e1d44c854de1f8400a1cc24c2ba89efec402cf327dd192b0c581c6e01dede9

    SHA512

    607212af21ecd1d0bb0f308f566a457c8ed57d71eb4848242f5efe450de149b232c0953dde49140a8b4e6571fabbc21196272a1a856a6b34cb2da27c38def68f

  • \Users\Admin\AppData\Local\Temp\nsoB09B.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    325b008aec81e5aaa57096f05d4212b5

    SHA1

    27a2d89747a20305b6518438eff5b9f57f7df5c3

    SHA256

    c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

    SHA512

    18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf

  • \Users\Admin\AppData\Local\Temp\nsoB09B.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    9384f4007c492d4fa040924f31c00166

    SHA1

    aba37faef30d7c445584c688a0b5638f5db31c7b

    SHA256

    60a964095af1be79f6a99b22212fefe2d16f5a0afd7e707d14394e4143e3f4f5

    SHA512

    68f158887e24302673227adffc688fd3edabf097d7f5410f983e06c6b9c7344ca1d8a45c7fa05553adcc5987993df3a298763477168d4842e554c4eb93b9aaaf

  • \Users\Admin\AppData\Local\Temp\nsoB09B.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    a5f8399a743ab7f9c88c645c35b1ebb5

    SHA1

    168f3c158913b0367bf79fa413357fbe97018191

    SHA256

    dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

    SHA512

    824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

  • \Users\Admin\AppData\Local\Temp\nsoB09B.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nsoB09B.tmp\nsRandom.dll

    Filesize

    21KB

    MD5

    ab467b8dfaa660a0f0e5b26e28af5735

    SHA1

    596abd2c31eaff3479edf2069db1c155b59ce74d

    SHA256

    db267d9920395b4badc48de04df99dfd21d579480d103cae0f48e6578197ff73

    SHA512

    7d002dc203997b8a4d8ec20c92cd82848e29d746414f4a61265c76d4afb12c05bce826fc63f4d2bd3d527f38506c391855767d864c37584df11b5db9ca008301

  • \Users\Admin\AppData\Local\Temp\nsoB09B.tmp\nsisdt.dll

    Filesize

    5KB

    MD5

    df4795dfabe3bc9278a73d496cc4b40d

    SHA1

    2648ded47e29ecf3e1a1cc20c631e83caf566897

    SHA256

    2261027077f23c8dba6b72af28862832aaa059740d0f5634b46cabb14326dd10

    SHA512

    013d9712c3d699a7f41ab3e55931c9abb421fb2eda3542da5a4831ad2f073a1b0643120cc78147db0bfcd01df98ade3045ecb2f1e252fff1dc40be845e5ae303

  • memory/1292-121-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/1292-125-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB