Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/02/2025, 18:56

General

  • Target

    1546405e25eaeb58fcef39a5baf9e6efb929a0ec0527fb923182748510b70c4c.exe

  • Size

    3.8MB

  • MD5

    f095f48a0fc5d1369e1e9a33f30624cf

  • SHA1

    a87365138e7a92880051249411814562953a4307

  • SHA256

    1546405e25eaeb58fcef39a5baf9e6efb929a0ec0527fb923182748510b70c4c

  • SHA512

    c2707019659aeda30ad1fba0b639800a7cd966be8e55fbf5ea09b79608e5f930b99b68792f86904645616af7c30ea93587852c12c68ccc62028c296963b3a2e2

  • SSDEEP

    98304:ZsFwe8EuILKpQN0f7aePKtGBz/smtrm+2f/VSnGIm+LR4ZzK:FEoO0DaFGBz/sYK+2fIGImy

Malware Config

Extracted

Family

cryptbot

C2

http://home.elvnjj1sr.top/pekvtmslVrBVfMWtJqVA17

Signatures

  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Embeds OpenSSL 1 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1546405e25eaeb58fcef39a5baf9e6efb929a0ec0527fb923182748510b70c4c.exe
    "C:\Users\Admin\AppData\Local\Temp\1546405e25eaeb58fcef39a5baf9e6efb929a0ec0527fb923182748510b70c4c.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x64.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x64.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2688
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exe"
      2⤵
      • Enumerates VirtualBox registry keys
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4872
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {B3AF52FB-EC91-477B-9499-22858A60A6AF} S-1-5-21-1846800975-3917212583-2893086201-1000:ZQABOPWE\Admin:S4U:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4720
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4752
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {F3A0E619-44F0-4D4A-BAF5-B6AE59DBB3A0} S-1-5-21-1846800975-3917212583-2893086201-1000:ZQABOPWE\Admin:Interactive:[1]
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:5008
    • C:\Users\Admin\AppData\Roaming\IsSpecialName\Token.exe
      C:\Users\Admin\AppData\Roaming\IsSpecialName\Token.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5040
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x64.exe

    Filesize

    653KB

    MD5

    4f6e118ff053bda4f358922e704e6e2d

    SHA1

    b09ee9ecb9b16910e7d5b0b151095655eac86666

    SHA256

    c4d8a65844301bbe75699e5de0d2a576f1fa07e0cf259810bdc68b045cb14225

    SHA512

    a78fb7027e39f29cb768cd0f6ed11ab4e56179b04b782f0f293fe0743fc88e418da8ea9698d78ff462cb650694fc4a14003537f4decb0db6313061a1afa25b4c

  • \Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exe

    Filesize

    8.2MB

    MD5

    95a8e03433879dc9bbe059a6f8ba3f5c

    SHA1

    9b15abecbc64573f9709847e22c2006a2bfec327

    SHA256

    c09055cde3e0d6c5ebad2cf79f3e735c3ce5f5ded864130098fe2c4165b99fa1

    SHA512

    3d1d9c0e77085258bfb834ca5d65e6aaad3a3a3a426cda50f2a6b99ad03c65b83f25a853a3a8c900aa01fe17e0a741b73bf20364006d1a16a5c21356095c49c5

  • memory/2688-69-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-21-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-15-0x000007FEF53F0000-0x000007FEF5DDC000-memory.dmp

    Filesize

    9.9MB

  • memory/2688-19-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-17-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-16-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-77-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-53-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-35-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-33-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-31-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-29-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-27-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-61-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-23-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-63-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-79-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-75-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-73-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-71-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-13-0x0000000001210000-0x00000000012B8000-memory.dmp

    Filesize

    672KB

  • memory/2688-67-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-14-0x00000000010A0000-0x00000000011AA000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-65-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-25-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-59-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-57-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-55-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-51-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-49-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-47-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-45-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-2799-0x0000000000ED0000-0x0000000000F1C000-memory.dmp

    Filesize

    304KB

  • memory/2688-2798-0x0000000000CE0000-0x0000000000D36000-memory.dmp

    Filesize

    344KB

  • memory/2688-43-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-41-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-39-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-37-0x00000000010A0000-0x00000000011A6000-memory.dmp

    Filesize

    1.0MB

  • memory/2688-2800-0x00000000011B0000-0x0000000001204000-memory.dmp

    Filesize

    336KB

  • memory/2688-12-0x000007FEF53F3000-0x000007FEF53F4000-memory.dmp

    Filesize

    4KB

  • memory/2688-2809-0x000007FEF53F0000-0x000007FEF5DDC000-memory.dmp

    Filesize

    9.9MB

  • memory/4752-2806-0x0000000001240000-0x0000000001248000-memory.dmp

    Filesize

    32KB

  • memory/4752-2805-0x000000001A1F0000-0x000000001A4D2000-memory.dmp

    Filesize

    2.9MB

  • memory/4908-5621-0x0000000000400000-0x00000000004A8000-memory.dmp

    Filesize

    672KB

  • memory/5040-2829-0x0000000000910000-0x00000000009B8000-memory.dmp

    Filesize

    672KB