Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

22/01/2025, 13:58

250122-q9vm9szrbk 10

03/12/2024, 20:48

241203-zlx8xstlbs 10

Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/01/2025, 13:58

General

  • Target

    2024-12-03_67b4f997c2950c3a7da49a06ad0d6da8_frostygoop_hijackloader_luca-stealer_poet-rat_snatch.exe

  • Size

    956.1MB

  • MD5

    67b4f997c2950c3a7da49a06ad0d6da8

  • SHA1

    a72981393641868956f5329fd8d5009cf418c8d1

  • SHA256

    8526de38fe915997bbc8cc4c697b719a63ae49636249f8749cad7c075188a70a

  • SHA512

    9d234d0e3e9e78c76089d7538a190d5e4c1e1aa67b62b344c3523824ea942dee836421e7ff634ddfef66a601f72e5a71d1e46ac51dc8cd7df3827550cea1d22f

  • SSDEEP

    49152:9y9HGov4ftacY9lbcByt5rJscl4F51CWJAs5EeG7GIV/7LyBThv3ILW01am:0vfe7P5ENGIVPoThv3Iam

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-12-03_67b4f997c2950c3a7da49a06ad0d6da8_frostygoop_hijackloader_luca-stealer_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-12-03_67b4f997c2950c3a7da49a06ad0d6da8_frostygoop_hijackloader_luca-stealer_poet-rat_snatch.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell "" "SCHTASKS.exe /Create /SC MINUTE /ED 12/12/2030 /TN system_updater /TR C:\Users\Admin\AppData\Roaming\Microsoft\config\system.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2468
      • C:\Windows\system32\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Create /SC MINUTE /ED 12/12/2030 /TN system_updater /TR C:\Users\Admin\AppData\Roaming\Microsoft\config\system.exe
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:1592
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --mojo-platform-channel-handle=3456 --field-trial-handle=1600,i,15554764459745766658,2657313602245406631,131072 /prefetch:1
    1⤵
      PID:2428
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --mojo-platform-channel-handle=4216 --field-trial-handle=1600,i,15554764459745766658,2657313602245406631,131072 /prefetch:1
      1⤵
        PID:1652
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --mojo-platform-channel-handle=3408 --field-trial-handle=1600,i,15554764459745766658,2657313602245406631,131072 /prefetch:1
        1⤵
          PID:2236
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3808 --field-trial-handle=1600,i,15554764459745766658,2657313602245406631,131072 /prefetch:8
          1⤵
            PID:2704
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --mojo-platform-channel-handle=1548 --field-trial-handle=1600,i,15554764459745766658,2657313602245406631,131072 /prefetch:1
            1⤵
              PID:2688
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --mojo-platform-channel-handle=3888 --field-trial-handle=1600,i,15554764459745766658,2657313602245406631,131072 /prefetch:1
              1⤵
                PID:2632
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --mojo-platform-channel-handle=4080 --field-trial-handle=1600,i,15554764459745766658,2657313602245406631,131072 /prefetch:1
                1⤵
                  PID:1904
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --mojo-platform-channel-handle=3704 --field-trial-handle=1600,i,15554764459745766658,2657313602245406631,131072 /prefetch:1
                  1⤵
                    PID:1344
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1544 --field-trial-handle=1600,i,15554764459745766658,2657313602245406631,131072 /prefetch:8
                    1⤵
                      PID:1956
                    • C:\Windows\system32\taskeng.exe
                      taskeng.exe {3DBC1FCC-6C8B-42D1-AD96-18A24997125C} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]
                      1⤵
                      • Loads dropped DLL
                      • Suspicious use of WriteProcessMemory
                      PID:876
                      • C:\Users\Admin\AppData\Roaming\Microsoft\config\system.exe
                        C:\Users\Admin\AppData\Roaming\Microsoft\config\system.exe
                        2⤵
                        • Executes dropped EXE
                        PID:1216
                    • C:\Program Files\Internet Explorer\iexplore.exe
                      "C:\Program Files\Internet Explorer\iexplore.exe"
                      1⤵
                      • Modifies Internet Explorer settings
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:2352
                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:2
                        2⤵
                        • System Location Discovery: System Language Discovery
                        • Modifies Internet Explorer settings
                        • Suspicious use of SetWindowsHookEx
                        PID:2832

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                      Filesize

                      342B

                      MD5

                      3b53db4f3d5d2d9d5db87ba9c807db69

                      SHA1

                      48c9516afeaa40ea70f721702582fd27886ac09b

                      SHA256

                      0b54eee4bf0b06520266dd783e791367d6d9f154dba3cf5d1c35b9315a2512c1

                      SHA512

                      7b4caccd3653e70fcc68f9f3799e04f33e57c1735f533f286d911bfb2cf06ba25a893b165b69d24e52b9a369bf04722abe41a4058c08043da0bb817a577fa3ad

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                      Filesize

                      342B

                      MD5

                      103710d3863544b824fa7a80d720d920

                      SHA1

                      25bcb299c6860030f6a398ee11000b2dc618611a

                      SHA256

                      eb4559f51024efdc69c3c06d5372c93573b30b04552a59ef757f99a6ae68d7ab

                      SHA512

                      4ec05b12425cc3b775c8718c45a99d4b997cc34f03d2609b1fce610c0ebb1a5bc53553380690c3e6eac60fa100287a792d861618ba1a5ad8680488da7e013169

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                      Filesize

                      342B

                      MD5

                      13c24affb62ff4fe600a90d21e5c469e

                      SHA1

                      590b90ab97352e92c7208bfaf70e5ab696526361

                      SHA256

                      f05e838b54f3769e54929ce14e3097f18415144ea6f49ea2d70fdad44ca3d1cd

                      SHA512

                      ea76df213f60c001af26d21ca24736e7ee26041cc911bdb67d9a4bd586ee6f36b47002f587f1f4daf838fb3505d913403156918921b15ac93e32a25b8e73c7c5

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                      Filesize

                      342B

                      MD5

                      33fbd0af09f883397b2f3dc5e4a87192

                      SHA1

                      dfe83815814d6430f5d0e88f90202c71eb7de2f9

                      SHA256

                      975937a647ac542617af0237c6bf0b9092d15c9c5f5a44c5ae009da2cc9ba1b8

                      SHA512

                      2f9f32113b5abbab4ad8542d286ee73d7b356691ac88b118ea9971b3f5bd3b4da117001c2daab010a18cefba0234b7b10c851193ac890fb57663d0e8c2fa06fa

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                      Filesize

                      342B

                      MD5

                      01b7cc1ce2b0b15c7f06a911a306967d

                      SHA1

                      f49644559e8d1789dd3db26b5fae297ce3d485ca

                      SHA256

                      759cb22519b9b33b2e4208be0a56816268d2c429cc6335c3bcc16bc55f86d934

                      SHA512

                      84577a7c6939c19a5fdc768d6482156c633943ece00c05af4500a1cd29f1f66f437d7bfd29779d01aa4d6cbcd7dc974c5912a499ed470054a1362e8860087396

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                      Filesize

                      342B

                      MD5

                      10936b7fe61fdbfd66632362538c256f

                      SHA1

                      f10f99c4a44d7da0f753b264de489ee57cbd7288

                      SHA256

                      508bd69eaf267cb5065145882c33c1ca225cbe14404b874c6b58270a5c8f962b

                      SHA512

                      ea46c87bec70fe8156581067aa1ade0977f69960426e64670b1766135ca2871790bb576931b958bb854204a64d4ad247f83952e30223ffd7a60eea1fdf33142d

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                      Filesize

                      342B

                      MD5

                      6608f5d7379426e8cfeabdbd5faf6e40

                      SHA1

                      a227ccf00e2f74ac76f7999d0935fc02814a715d

                      SHA256

                      008777257e82604981964916c517dccce4eb76f2b13b2b4505d94de7b8c7481f

                      SHA512

                      0753cb7d912bfec045d007de18924a5fda6960effc3b8dbc24bf4c2988d6af27b08f309ee829263aaaafcc488b1f3888a83c2176c464ccafe7282f1d910b6cb7

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                      Filesize

                      342B

                      MD5

                      bfd172ea4b79cbb9cbe39fd2892718dc

                      SHA1

                      4df9a472567563285ab2faa5f040189ea4fd2a45

                      SHA256

                      3569dc880629d7ff4c78036b5d3369334ca100e25b71d6f1d562ca6c0ebe2f16

                      SHA512

                      fcf446dc8212aed324e73507b55ee81201b73b0659f4d74d9b325ffe4ff90d68d3cc921cf1e8d5ff2e037c03f690cc3895e94945c867cba5173ab1a2f8955c94

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                      Filesize

                      342B

                      MD5

                      b852489f4fa6c9c9664a461cc3fc5e26

                      SHA1

                      8aff4a3e73b6f17fefe37cd122777b240dfb51b0

                      SHA256

                      41c9f652a167cbe4c2a14008de519f4277c628158fa61d4087fc3e29d7729edb

                      SHA512

                      c6704eb8184a5915ea7f30a54a9834c07ba968dacc152ada257496cc5d97cc5d48c3f25da13c16a1307fa436768781748acbeceeb523d134a1719ca12179b4d6

                    • C:\Users\Admin\AppData\Local\Temp\CabF789.tmp

                      Filesize

                      70KB

                      MD5

                      49aebf8cbd62d92ac215b2923fb1b9f5

                      SHA1

                      1723be06719828dda65ad804298d0431f6aff976

                      SHA256

                      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                      SHA512

                      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                    • C:\Users\Admin\AppData\Local\Temp\TarF80B.tmp

                      Filesize

                      181KB

                      MD5

                      4ea6026cf93ec6338144661bf1202cd1

                      SHA1

                      a1dec9044f750ad887935a01430bf49322fbdcb7

                      SHA256

                      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                      SHA512

                      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                    • memory/2468-6-0x000007FEF454E000-0x000007FEF454F000-memory.dmp

                      Filesize

                      4KB

                    • memory/2468-14-0x000007FEF4290000-0x000007FEF4C2D000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2468-13-0x000007FEF4290000-0x000007FEF4C2D000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2468-12-0x0000000001F00000-0x0000000001F08000-memory.dmp

                      Filesize

                      32KB

                    • memory/2468-11-0x000007FEF4290000-0x000007FEF4C2D000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2468-10-0x000000001B610000-0x000000001B8F2000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/2468-9-0x000007FEF4290000-0x000007FEF4C2D000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2468-8-0x000007FEF4290000-0x000007FEF4C2D000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2468-7-0x000007FEF4290000-0x000007FEF4C2D000-memory.dmp

                      Filesize

                      9.6MB