Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows10_x64 -
resource
win10 -
submitted
11/07/2020, 11:45
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.Heri.7826.11629.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.Heri.7826.11629.exe
Resource
win10
General
-
Target
SecuriteInfo.com.Win32.Heri.7826.11629.exe
-
Size
375KB
-
MD5
4c2bb13e90e3472478d25c657e26fde2
-
SHA1
0bb0197a5ee48af6c4efdaa435ff73b43bf478f6
-
SHA256
cbf644b3dc49a4148301cb941e3b693615a3e2b61169fc62a23fe59184297a1f
-
SHA512
fa42e264359dbfea8d314a1952b1e44bcae2d9e056c3dea23441d6094409faa2e826b1757692bdc7813a73757ef84daf69e4b7b82de6befac6ebda24e5c9a4cb
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3692 jfiag_gg.exe 3692 jfiag_gg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run entry to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\kissq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kissq.exe" SecuriteInfo.com.Win32.Heri.7826.11629.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 720 wrote to memory of 1888 720 SecuriteInfo.com.Win32.Heri.7826.11629.exe 67 PID 720 wrote to memory of 1888 720 SecuriteInfo.com.Win32.Heri.7826.11629.exe 67 PID 720 wrote to memory of 1888 720 SecuriteInfo.com.Win32.Heri.7826.11629.exe 67 PID 720 wrote to memory of 3692 720 SecuriteInfo.com.Win32.Heri.7826.11629.exe 68 PID 720 wrote to memory of 3692 720 SecuriteInfo.com.Win32.Heri.7826.11629.exe 68 PID 720 wrote to memory of 3692 720 SecuriteInfo.com.Win32.Heri.7826.11629.exe 68 -
Executes dropped EXE 2 IoCs
pid Process 1888 jfiag_gg.exe 3692 jfiag_gg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Heri.7826.11629.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Heri.7826.11629.exe"1⤵
- Adds Run entry to start application
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Users\Admin\AppData\Local\Temp\jfiag_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fjgha23_fa.txt2⤵
- Executes dropped EXE
PID:1888
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fjgha23_fa.txt2⤵
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
PID:3692
-