Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    97s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    13/07/2020, 11:55

General

  • Target

    kcW8HRnu9lJ2Kk7.exe

  • Size

    428KB

  • MD5

    009d626f0527c9cb53fb1e41e2f618a2

  • SHA1

    eb728cdf10cdbb7089769249bca193c15d4b66ea

  • SHA256

    85f3f4ff256d8226555c9e7c1c346e32bd12255851d59eaa5ad645e12423519b

  • SHA512

    dee6fe0590c0d3b0823ee17b0941e23b650826bb6a54a571c732b957c935797ec66f12de974f8039a55c6812699a2b0dfae646b3c4409e79ef9bea321b3220d5

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Suspicious use of WriteProcessMemory 9 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\kcW8HRnu9lJ2Kk7.exe
    "C:\Users\Admin\AppData\Local\Temp\kcW8HRnu9lJ2Kk7.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SetThreadContext
    PID:1100
    • C:\Users\Admin\AppData\Local\Temp\kcW8HRnu9lJ2Kk7.exe
      "C:\Users\Admin\AppData\Local\Temp\kcW8HRnu9lJ2Kk7.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      PID:1660

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1660-2-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1660-4-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1660-5-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB