Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
33s -
max time network
81s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
11/07/2020, 11:45
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.Heri.7826.11629.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.Heri.7826.11629.exe
Resource
win10
General
-
Target
SecuriteInfo.com.Win32.Heri.7826.11629.exe
-
Size
375KB
-
MD5
4c2bb13e90e3472478d25c657e26fde2
-
SHA1
0bb0197a5ee48af6c4efdaa435ff73b43bf478f6
-
SHA256
cbf644b3dc49a4148301cb941e3b693615a3e2b61169fc62a23fe59184297a1f
-
SHA512
fa42e264359dbfea8d314a1952b1e44bcae2d9e056c3dea23441d6094409faa2e826b1757692bdc7813a73757ef84daf69e4b7b82de6befac6ebda24e5c9a4cb
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run entry to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\kissq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kissq.exe" SecuriteInfo.com.Win32.Heri.7826.11629.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Loads dropped DLL 4 IoCs
pid Process 1500 SecuriteInfo.com.Win32.Heri.7826.11629.exe 1500 SecuriteInfo.com.Win32.Heri.7826.11629.exe 1500 SecuriteInfo.com.Win32.Heri.7826.11629.exe 1500 SecuriteInfo.com.Win32.Heri.7826.11629.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1500 wrote to memory of 644 1500 SecuriteInfo.com.Win32.Heri.7826.11629.exe 24 PID 1500 wrote to memory of 644 1500 SecuriteInfo.com.Win32.Heri.7826.11629.exe 24 PID 1500 wrote to memory of 644 1500 SecuriteInfo.com.Win32.Heri.7826.11629.exe 24 PID 1500 wrote to memory of 644 1500 SecuriteInfo.com.Win32.Heri.7826.11629.exe 24 PID 1500 wrote to memory of 1644 1500 SecuriteInfo.com.Win32.Heri.7826.11629.exe 25 PID 1500 wrote to memory of 1644 1500 SecuriteInfo.com.Win32.Heri.7826.11629.exe 25 PID 1500 wrote to memory of 1644 1500 SecuriteInfo.com.Win32.Heri.7826.11629.exe 25 PID 1500 wrote to memory of 1644 1500 SecuriteInfo.com.Win32.Heri.7826.11629.exe 25 -
Executes dropped EXE 2 IoCs
pid Process 644 jfiag_gg.exe 1644 jfiag_gg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Heri.7826.11629.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Heri.7826.11629.exe"1⤵
- Adds Run entry to start application
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\jfiag_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fjgha23_fa.txt2⤵
- Executes dropped EXE
PID:644
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fjgha23_fa.txt2⤵
- Executes dropped EXE
PID:1644
-