Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
121s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
13/07/2020, 11:54
Static task
static1
Behavioral task
behavioral1
Sample
IMG__295541.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
IMG__295541.exe
Resource
win10
General
-
Target
IMG__295541.exe
-
Size
1.3MB
-
MD5
5f0dcd355fed551839938d7add9f40e6
-
SHA1
e628bc47384fe3f5af640e06f31f3c2e9f14d689
-
SHA256
677906173148035544d96ed87acd962194baf88a2c5c6a33e2ad94a850a81835
-
SHA512
2004e67ad4f77d9d4d1ae389d6bece2d69fd66a5ed5b0603215477bbef0856c4e32979a3b96ad728a18430d3d4fe9a66ea2517871cbab7e970d48ff638ccf93e
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 240 IMG__295541.exe 240 IMG__295541.exe 240 IMG__295541.exe 568 .exe 568 .exe 568 .exe 1576 RegAsm.exe -
Executes dropped EXE 2 IoCs
pid Process 568 .exe 1576 RegAsm.exe -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org -
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 240 IMG__295541.exe Token: SeDebugPrivilege 568 .exe Token: SeDebugPrivilege 1576 RegAsm.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 240 wrote to memory of 1892 240 IMG__295541.exe 26 PID 240 wrote to memory of 1892 240 IMG__295541.exe 26 PID 240 wrote to memory of 1892 240 IMG__295541.exe 26 PID 240 wrote to memory of 1892 240 IMG__295541.exe 26 PID 1892 wrote to memory of 1756 1892 cmd.exe 28 PID 1892 wrote to memory of 1756 1892 cmd.exe 28 PID 1892 wrote to memory of 1756 1892 cmd.exe 28 PID 1892 wrote to memory of 1756 1892 cmd.exe 28 PID 240 wrote to memory of 568 240 IMG__295541.exe 30 PID 240 wrote to memory of 568 240 IMG__295541.exe 30 PID 240 wrote to memory of 568 240 IMG__295541.exe 30 PID 240 wrote to memory of 568 240 IMG__295541.exe 30 PID 568 wrote to memory of 1576 568 .exe 31 PID 568 wrote to memory of 1576 568 .exe 31 PID 568 wrote to memory of 1576 568 .exe 31 PID 568 wrote to memory of 1576 568 .exe 31 PID 568 wrote to memory of 1576 568 .exe 31 PID 568 wrote to memory of 1576 568 .exe 31 PID 568 wrote to memory of 1576 568 .exe 31 PID 568 wrote to memory of 1576 568 .exe 31 PID 568 wrote to memory of 1576 568 .exe 31 PID 568 wrote to memory of 1576 568 .exe 31 PID 568 wrote to memory of 1576 568 .exe 31 PID 568 wrote to memory of 1576 568 .exe 31 -
Loads dropped DLL 3 IoCs
pid Process 240 IMG__295541.exe 568 .exe 1576 RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 568 set thread context of 1576 568 .exe 31 -
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Windows\CurrentVersion\Run\admin = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\Desktop\\.exe" reg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\IMG__295541.exe"C:\Users\Admin\AppData\Local\Temp\IMG__295541.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- Loads dropped DLL
PID:240 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v admin /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\Desktop\.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v admin /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\Desktop\.exe"3⤵
- Adds Run entry to start application
PID:1756
-
-
-
C:\Users\Admin\Desktop\.exe"C:\Users\Admin\Desktop\.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:568 -
C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Loads dropped DLL
PID:1576
-
-