Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    15/02/2025, 19:56

General

  • Target

    95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe

  • Size

    3.8MB

  • MD5

    3db1c66a1e51f7c1e258b1c12205a435

  • SHA1

    98e24a9ea6e7c38a95543c89a037c7f3f7b1591c

  • SHA256

    95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2

  • SHA512

    7bec8f484f8f047d84d6f703853a56cbffa061ab22813e9449fa78382a88d9f42a27eb1f999e1e7ab30597afb49e2ff5c23f65654c4584fc75d1c2835607a407

  • SSDEEP

    98304:ZsFwe8EuILKpQN0d7aePKtGBz/smtrm+2f/VSnGIm+LR4ZzK:FEoO01aFGBz/sYK+2fIGImy

Malware Config

Extracted

Family

cryptbot

C2

http://home.elvnjj1sr.top/pekvtmslVrBVfMWtJqVA17

Signatures

  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 2 IoCs
  • Embeds OpenSSL 1 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 47 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe
    "C:\Users\Admin\AppData\Local\Temp\95b7a961a634c972681d935cf4f78150c0e2f0d962daa3daf59c3fd3af714db2.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2904
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x64.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x64.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2860
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exe"
      2⤵
      • Enumerates VirtualBox registry keys
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2220
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\dotNetFx45_Full_setup.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\dotNetFx45_Full_setup.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3352
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {CA6043E6-500B-4DAD-8586-CE0128B43AFC} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:S4U:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4960
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAFAAcABSAGUAZgBFAFIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AFMASQBvAG4AcABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABSAG8AYQBtAGkAbgBnAFwASQBzAFMAcABlAGMAaQBhAGwATgBhAG0AZQBcAFQAbwBrAGUAbgAuAGUAeABlACwAQwA6AFwAVwBpAG4AZABvAHcAcwBcAE0AaQBjAHIAbwBzAG8AZgB0AC4ATgBFAFQAXABGAHIAYQBtAGUAdwBvAHIAawA2ADQAXAB2ADQALgAwAC4AMwAwADMAMQA5AFwALABDADoAXABXAGkAbgBkAG8AdwBzAFwATQBpAGMAcgBvAHMAbwBmAHQALgBOAEUAVABcAEYAcgBhAG0AZQB3AG8AcgBrADYANABcAHYANAAuADAALgAzADAAMwAxADkAXABBAGQAZABJAG4AUAByAG8AYwBlAHMAcwAuAGUAeABlACwAQwA6AFwAVQBzAGUAcgBzAFwAQQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAEwAbwBjAGEAbABcAFQAZQBtAHAAXAAgAC0AZgBvAHIAYwBlADsAIABBAEQARAAtAG0AUABQAHIAZQBGAGUAcgBlAE4AYwBlACAALQBlAFgAQwBsAFUAUwBpAG8AbgBQAFIATwBDAGUAUwBzACAAQwA6AFwAVwBpAG4AZABvAHcAcwBcAE0AaQBjAHIAbwBzAG8AZgB0AC4ATgBFAFQAXABGAHIAYQBtAGUAdwBvAHIAawA2ADQAXAB2ADQALgAwAC4AMwAwADMAMQA5AFwAQQBkAGQASQBuAFAAcgBvAGMAZQBzAHMALgBlAHgAZQAsAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABSAG8AYQBtAGkAbgBnAFwASQBzAFMAcABlAGMAaQBhAGwATgBhAG0AZQBcAFQAbwBrAGUAbgAuAGUAeABlACAALQBmAE8AcgBDAGUA
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5004
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAASQBkAC4AZQB4AGUAOwA=
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3992
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {BE33A36F-BF9E-4940-A2CC-AB69437B381B} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Users\Admin\AppData\Roaming\IsSpecialName\Token.exe
      C:\Users\Admin\AppData\Roaming\IsSpecialName\Token.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2416
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
        3⤵
          PID:3528
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
          3⤵
            PID:1688
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
            3⤵
              PID:588
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
              3⤵
                PID:3276
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                3⤵
                  PID:4652
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                  3⤵
                    PID:3900
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                    3⤵
                      PID:3596
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                      3⤵
                        PID:2384
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                        3⤵
                          PID:2348
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                          3⤵
                            PID:4680

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                        Filesize

                        7KB

                        MD5

                        7e7434bed2fab70fd12a994601ffdf28

                        SHA1

                        02ba50de9e6e56f75baed3f24bffd972851df971

                        SHA256

                        3591ccaa87aae93391574b9ff12e66764810900ede2089090967fc0aedd960c4

                        SHA512

                        00258f31d089a0f70dc410807f2a9e8ec112a13be8c63da570b9f4a3cf2828464db0eeca13e9aa8882cb5ea9f33c4202576ebbf0116eb26fc8282878e9390574

                      • \Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x64.exe

                        Filesize

                        653KB

                        MD5

                        4f6e118ff053bda4f358922e704e6e2d

                        SHA1

                        b09ee9ecb9b16910e7d5b0b151095655eac86666

                        SHA256

                        c4d8a65844301bbe75699e5de0d2a576f1fa07e0cf259810bdc68b045cb14225

                        SHA512

                        a78fb7027e39f29cb768cd0f6ed11ab4e56179b04b782f0f293fe0743fc88e418da8ea9698d78ff462cb650694fc4a14003537f4decb0db6313061a1afa25b4c

                      • \Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exe

                        Filesize

                        8.2MB

                        MD5

                        95a8e03433879dc9bbe059a6f8ba3f5c

                        SHA1

                        9b15abecbc64573f9709847e22c2006a2bfec327

                        SHA256

                        c09055cde3e0d6c5ebad2cf79f3e735c3ce5f5ded864130098fe2c4165b99fa1

                        SHA512

                        3d1d9c0e77085258bfb834ca5d65e6aaad3a3a3a426cda50f2a6b99ad03c65b83f25a853a3a8c900aa01fe17e0a741b73bf20364006d1a16a5c21356095c49c5

                      • \Users\Admin\AppData\Local\Temp\RarSFX0\dotNetFx45_Full_setup.exe

                        Filesize

                        544KB

                        MD5

                        1336375cf1aaa4efdad95d0b64ea1aac

                        SHA1

                        9be80a505aa2dfcc4db73c8e5264ed5867533e66

                        SHA256

                        04d68438f75065f5c2997e80a317b1c6fad78d723af585a64d39138861055ec6

                        SHA512

                        12d91fefeb431b60b2501f7868e25dfa04eb42f94bd630b21fef4f3cd6ae5962b6764215da77824e06c53ae8d5d446b322936406396aaa178c71edf24b765f48

                      • memory/2416-2831-0x00000000000F0000-0x0000000000198000-memory.dmp

                        Filesize

                        672KB

                      • memory/2860-43-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-16-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-15-0x000007FEF6BB0000-0x000007FEF759C000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/2860-33-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-35-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-77-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-79-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-75-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-73-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-71-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-70-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-67-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-65-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-63-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-61-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-59-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-55-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-53-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-51-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-49-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-47-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-57-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-13-0x0000000001300000-0x00000000013A8000-memory.dmp

                        Filesize

                        672KB

                      • memory/2860-41-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-14-0x00000000011D0000-0x00000000012DA000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-12-0x000007FEF6BB3000-0x000007FEF6BB4000-memory.dmp

                        Filesize

                        4KB

                      • memory/2860-39-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-29-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-27-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-25-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-23-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-21-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-19-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-17-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-45-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-31-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2860-2798-0x0000000000DE0000-0x0000000000E36000-memory.dmp

                        Filesize

                        344KB

                      • memory/2860-2799-0x00000000010A0000-0x00000000010EC000-memory.dmp

                        Filesize

                        304KB

                      • memory/2860-2800-0x00000000010F0000-0x0000000001144000-memory.dmp

                        Filesize

                        336KB

                      • memory/2860-2801-0x000007FEF6BB3000-0x000007FEF6BB4000-memory.dmp

                        Filesize

                        4KB

                      • memory/2860-2802-0x000007FEF6BB0000-0x000007FEF759C000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/2860-2811-0x000007FEF6BB0000-0x000007FEF759C000-memory.dmp

                        Filesize

                        9.9MB

                      • memory/2860-37-0x00000000011D0000-0x00000000012D6000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3352-5638-0x0000000002160000-0x0000000002228000-memory.dmp

                        Filesize

                        800KB

                      • memory/3352-5637-0x0000000000910000-0x000000000099E000-memory.dmp

                        Filesize

                        568KB

                      • memory/3352-7520-0x0000000004CC0000-0x0000000004D14000-memory.dmp

                        Filesize

                        336KB

                      • memory/3352-7519-0x0000000000550000-0x00000000005A6000-memory.dmp

                        Filesize

                        344KB

                      • memory/3992-7526-0x0000000019CB0000-0x0000000019F92000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/3992-7527-0x0000000000AC0000-0x0000000000AC8000-memory.dmp

                        Filesize

                        32KB

                      • memory/5004-2807-0x0000000019EF0000-0x000000001A1D2000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/5004-2808-0x0000000000EC0000-0x0000000000EC8000-memory.dmp

                        Filesize

                        32KB