Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    599s
  • max time network
    440s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250218-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250218-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    14/03/2025, 02:20

General

  • Target

    4363463463464363463463463.exe

  • Size

    10KB

  • MD5

    2a94f3960c58c6e70826495f76d00b85

  • SHA1

    e2a1a5641295f5ebf01a37ac1c170ac0814bb71a

  • SHA256

    2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce

  • SHA512

    fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f

  • SSDEEP

    192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K

Malware Config

Signatures

  • Downloads MZ/PE file 4 IoCs
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe
    "C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"
    1⤵
    • Downloads MZ/PE file
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4840
    • C:\Users\Admin\AppData\Local\Temp\Files\FreeYoutubeDownloader.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\FreeYoutubeDownloader.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:796
      • C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe
        "C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3376
        • C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe
          "C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3408
        • C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe
          "C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4168
        • C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe
          "C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4708
        • C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe
          "C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4108
    • C:\Users\Admin\AppData\Local\Temp\Files\peinf.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\peinf.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1548
    • C:\Users\Admin\AppData\Local\Temp\Files\sintv.exe
      "C:\Users\Admin\AppData\Local\Temp\Files\sintv.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1036
      • C:\Windows\System32\certutil.exe
        "C:\Windows\System32\certutil.exe" -silent -importPFX -p "" -f "C:\Users\Admin\AppData\Local\Temp\tmpA990.tmp"
        3⤵
          PID:3428
      • C:\Users\Admin\AppData\Local\Temp\Files\neofindsetup.exe
        "C:\Users\Admin\AppData\Local\Temp\Files\neofindsetup.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4480
        • C:\Windows\SysWOW64\msiexec.exe
          "C:\Windows\System32\msiexec.exe" /I "C:\Program Files (x86)\Common Files\Wise Installation Wizard\WISAB9511B1EE52494CA9BAED6A1536F012_1_0_6_1940.MSI" WISE_SETUP_EXE_PATH="C:\Users\Admin\AppData\Local\Temp\Files\neofindsetup.exe"
          3⤵
          • Enumerates connected drives
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:1384
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4532
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding FDC7604CAC0727F55BEA95AF69B0E5BD C
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:4220

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Common Files\Wise Installation Wizard\WISAB9511B1EE52494CA9BAED6A1536F012_1_0_6_1940.MSI

      Filesize

      5.8MB

      MD5

      700991fc49e5dfb2ce19bc3d726e8c92

      SHA1

      379409fe827ce13a069cbccf0f24f30535ddcebb

      SHA256

      0e056a846b58cd1807e343ffdbbd87922f93e5807fead4bfa46152873b72456e

      SHA512

      282f1c5b717f3e2fca1391a0d8963596c2c7d3f838f82886c0750a00c8e11a757629fe6df36da330d62d299531c9a649e37b7a70640694ffeaf9d4bcc0462872

    • C:\Users\Admin\AppData\Local\Temp\Files\FreeYoutubeDownloader.exe

      Filesize

      396KB

      MD5

      13f4b868603cf0dd6c32702d1bd858c9

      SHA1

      a595ab75e134f5616679be5f11deefdfaae1de15

      SHA256

      cae57a60c4d269cd1ca43ef143aedb8bfc4c09a7e4a689544883d05ce89406e7

      SHA512

      e0d7a81c9cdd15a4ef7c8a9492fffb2c520b28cebc54a139e1bffa5c523cf17dfb9ffe57188cf8843d74479df402306f4f0ce9fc09d87c7cca92aea287e5ff24

    • C:\Users\Admin\AppData\Local\Temp\Files\neofindsetup.exe

      Filesize

      9.3MB

      MD5

      f51d5ee4178228fc8282e0a3dae84860

      SHA1

      c2c768c6f5d3feafa37864d4363e97910086f44d

      SHA256

      ab66fb52ab23e136dd294b2637707d7edd2c02f88d20c7ff5884ae2966a83a44

      SHA512

      528ea823361dc1d0b9678593783d6165a8c420cb4a89e1842b5e4fad290e7722d391dcf202e9122fb70187b7d6e9cc4550f16ea8eba518ac9f6e30615f069105

    • C:\Users\Admin\AppData\Local\Temp\Files\peinf.exe

      Filesize

      20KB

      MD5

      2e5f10745392643c8cf21aae4241e4cc

      SHA1

      ad390d62e2215a37a3faf5e0cb3f0f3244452c07

      SHA256

      44db578a4075ab126df387da3fa757f76bd3074606f3a9be21ee55ec6ac1ed29

      SHA512

      85e63e752fc43d4b2be83628f5f8dcb288276c5369a3e940f795e87409f70473221d2d28a87f04e68c126bc0836171310d00247f240e05f4618e1f9393b132af

    • C:\Users\Admin\AppData\Local\Temp\Files\sintv.exe

      Filesize

      4.5MB

      MD5

      38fcaa23700e62fb0b3fc2591f82cc80

      SHA1

      abedd6ec573a6fede05d15920f3ac3763062c75c

      SHA256

      fb829a6a8535a443932cd167e8301b5e74c60702b5f7fade7e9f13a736ce72b0

      SHA512

      5da88a61c716a9891cb225f36f275040d69915c4c731c2a5c042d5c997ca39241a3e9d6646569468d477f47db42462c21b58f2de7f56a84cb145e6cee478eeef

    • C:\Users\Admin\AppData\Local\Temp\MSIE6C6.tmp

      Filesize

      21KB

      MD5

      39415f3ea0e75203e7de8dfc6f05d28e

      SHA1

      2b859a319033eb6a32bd41b1636af23177050173

      SHA256

      7751e2d1cd2af8798eb1273bccab5ab61c1a7c99573aaf8e6f511e1de8393360

      SHA512

      28e29088e584090063ba90f0b39c1a26a77da7a35c84625f6af900b91598a16c2f98c511f4edd73211ecbffd2a23273b661e0e0ce1d189ca2712f2f5b83bd343

    • C:\Users\Admin\AppData\Local\Temp\MSIE744.tmp

      Filesize

      108KB

      MD5

      68406bfd28f87a63c412b75cdfa764f1

      SHA1

      244ec4ccbdff8458094b5dc272ee9e7333ffd9e0

      SHA256

      a9cc69cad361c4fca12cad2e7275127cef7f9398ca1022b5832042b05c316760

      SHA512

      5a95334b8dafd6addce08044fe9c6308e233d5b29b2bcedd12435d32fc873325a8c504efd1d692be43e7e9bd2a75e615224bf642aa1bf122fc3c3524b33e98ef

    • C:\Users\Admin\AppData\Local\Temp\MSIE850.tmp

      Filesize

      45KB

      MD5

      d5ca89ec04b8d2062188839e3a1c9822

      SHA1

      ec62de307121f1846a9befecdd05f9db8a1361a3

      SHA256

      7ca109c7342593f94dae644c6162c2a7d6fa71d8385458dc05372b91023a32f3

      SHA512

      f1fbc362e96a9eb793948e934f9829f7fd6e47c88755164d1b1c6235d044de5d74caf6b3799038e538f64f5e92a5415cb59bd866116603fca1de9a00e40cf29f

    • C:\Users\Admin\AppData\Local\Temp\TmpA940.tmp

      Filesize

      2KB

      MD5

      da081f111aef07352dd4a4744176ca81

      SHA1

      59b34ae663d9abab971cd7be324e5326110edc1f

      SHA256

      9f21f2dbcec68ea2c7e2f1c5191973d0ef4b67189ef67a2a6e3d4ae2a53a053d

      SHA512

      cd5fbaddbf12657380e4de7fc917a2b8bef74c767d388726e3fb63cf4fba89224367d384ed0813aa2e192935e4e8f8a34acb943a5fcdf8c1534a9d8afeebd811

    • C:\Users\Admin\AppData\Local\Temp\tmpA990.tmp

      Filesize

      2KB

      MD5

      f2fc29a5ad65f98254bccc0949c8a8e0

      SHA1

      fa66923dd94f3947875a470c8eebc42c98e838fe

      SHA256

      65b752e4fadf5df1eb9b62bfd68a04e410851e61220eb7b4b9f0feeeb4d3cad3

      SHA512

      ad9ac29a8031cb28dfa179b8e10a3b62ddeb1244b564c79791021f0dba3c7c406285a816d7ad01c0c67a0c01c41b5acb7b58e80b9ea719b18e122070e26149b4

    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\BF01B878FE48E0E374517A2808989AA29F713E2A

      Filesize

      1KB

      MD5

      a3a5e9f99c614b9052dcff5e6d8d1efe

      SHA1

      2f5dff4085be339be1cb0761bcd159d3d7a24119

      SHA256

      ce8b172530aa6504c92c028df4cbcf3e688bf5ea286cb76b99be25fa3d1bbdca

      SHA512

      6396b7c7ca4571c2f0a4a485945eb64d762a1d3b64751e4e9f2104b0f39fa8750cdf1e1e67e7d32b36bcfc4efcf97d9ad8d3756edee6d8897103392d617a74da

    • C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe

      Filesize

      438KB

      MD5

      1bb4dd43a8aebc8f3b53acd05e31d5b5

      SHA1

      54cd1a4a505b301df636903b2293d995d560887e

      SHA256

      a2380a5f503bc6f5fcfd4c72e5b807df0740a60a298e8686bf6454f92e5d3c02

      SHA512

      94c70d592e806bb426760f61122b8321e8dc5cff7f793d51f9d5650821c502c43096f41d3e61207ca6989df5bfdbff57bc23328de16e99dd56e85efc90affdce

    • C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe

      Filesize

      153KB

      MD5

      f33a4e991a11baf336a2324f700d874d

      SHA1

      9da1891a164f2fc0a88d0de1ba397585b455b0f4

      SHA256

      a87524035509ff7aa277788e1a9485618665b7da35044d70c41ec0f118f3dfd7

      SHA512

      edf066968f31451e21c7c21d3f54b03fd5827a8526940c1e449aad7f99624577cbc6432deba49bb86e96ac275f5900dcef8d7623855eb3c808e084601ee1df20

    • memory/796-64-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/1036-80-0x000002621F130000-0x000002621F5C0000-memory.dmp

      Filesize

      4.6MB

    • memory/1036-82-0x0000026239F00000-0x000002623A0C2000-memory.dmp

      Filesize

      1.8MB

    • memory/3376-65-0x000001FF9FCA0000-0x000001FF9FCCE000-memory.dmp

      Filesize

      184KB

    • memory/3408-171-0x0000000005660000-0x000000000566A000-memory.dmp

      Filesize

      40KB

    • memory/3408-170-0x00000000056D0000-0x0000000005762000-memory.dmp

      Filesize

      584KB

    • memory/3408-169-0x0000000005C80000-0x0000000006226000-memory.dmp

      Filesize

      5.6MB

    • memory/3408-168-0x0000000000D30000-0x0000000000DA4000-memory.dmp

      Filesize

      464KB

    • memory/4840-107-0x000000007504E000-0x000000007504F000-memory.dmp

      Filesize

      4KB

    • memory/4840-1-0x0000000000640000-0x0000000000648000-memory.dmp

      Filesize

      32KB

    • memory/4840-2-0x0000000005000000-0x000000000509C000-memory.dmp

      Filesize

      624KB

    • memory/4840-3-0x0000000075040000-0x00000000757F1000-memory.dmp

      Filesize

      7.7MB

    • memory/4840-129-0x0000000075040000-0x00000000757F1000-memory.dmp

      Filesize

      7.7MB

    • memory/4840-0-0x000000007504E000-0x000000007504F000-memory.dmp

      Filesize

      4KB