Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
57s -
max time network
138s -
platform
windows7_x64 -
resource
win7 -
submitted
07/07/2020, 10:05
Static task
static1
Behavioral task
behavioral1
Sample
kWRzqj4iO78z4ri.exe
Resource
win7
Behavioral task
behavioral2
Sample
kWRzqj4iO78z4ri.exe
Resource
win10v200430
General
-
Target
kWRzqj4iO78z4ri.exe
-
Size
746KB
-
MD5
9edb7a4a29110cd92c0f304fd69f8308
-
SHA1
95f1be6b1e4f159712d415bfb99c8dd57202a18b
-
SHA256
d47f5168e5b3b521b9e2722207e1fcf5be168c8dab409ffd575cba8c08fe1f9e
-
SHA512
bb3dbd10ad536c69aed3a7963ba5f8e10e1f1d4a79d65ff7d7cfe5d4cff6331a128b0a6d8ce21b8dc6e936db633bbb47fa487857699d3797b86561c8849c3ebc
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1076 kWRzqj4iO78z4ri.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1032 schtasks.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.ipify.org -
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1456 set thread context of 1076 1456 kWRzqj4iO78z4ri.exe 26 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1076 kWRzqj4iO78z4ri.exe -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1456 wrote to memory of 1032 1456 kWRzqj4iO78z4ri.exe 24 PID 1456 wrote to memory of 1032 1456 kWRzqj4iO78z4ri.exe 24 PID 1456 wrote to memory of 1032 1456 kWRzqj4iO78z4ri.exe 24 PID 1456 wrote to memory of 1032 1456 kWRzqj4iO78z4ri.exe 24 PID 1456 wrote to memory of 1076 1456 kWRzqj4iO78z4ri.exe 26 PID 1456 wrote to memory of 1076 1456 kWRzqj4iO78z4ri.exe 26 PID 1456 wrote to memory of 1076 1456 kWRzqj4iO78z4ri.exe 26 PID 1456 wrote to memory of 1076 1456 kWRzqj4iO78z4ri.exe 26 PID 1456 wrote to memory of 1076 1456 kWRzqj4iO78z4ri.exe 26 PID 1456 wrote to memory of 1076 1456 kWRzqj4iO78z4ri.exe 26 PID 1456 wrote to memory of 1076 1456 kWRzqj4iO78z4ri.exe 26 PID 1456 wrote to memory of 1076 1456 kWRzqj4iO78z4ri.exe 26 PID 1456 wrote to memory of 1076 1456 kWRzqj4iO78z4ri.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\kWRzqj4iO78z4ri.exe"C:\Users\Admin\AppData\Local\Temp\kWRzqj4iO78z4ri.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QcygUAJrL" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8ED6.tmp"2⤵
- Creates scheduled task(s)
PID:1032
-
-
C:\Users\Admin\AppData\Local\Temp\kWRzqj4iO78z4ri.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1076
-