Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
123s -
max time network
122s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
13/07/2020, 11:42
Static task
static1
Behavioral task
behavioral1
Sample
img_0933.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
img_0933.exe
Resource
win10
General
-
Target
img_0933.exe
-
Size
1.4MB
-
MD5
f8d0bab3e3367fbd94c1f82eb33714e7
-
SHA1
e457ae2ad469dd932300a02a4e3b9c03010d5e31
-
SHA256
cc6b0848a3a848c9ee7ce3f63d1e3f95393f6593140e2aab400146c06e593793
-
SHA512
0064460f534399a26e4dd2e29804c3f8b7cd3d8b97808a9ae713c6e7eed0facd621ed3d98f3dad1b655ed051e069fbb9e513b1d51d0ccf61bfde30f668c65784
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1500 img_0933.exe Token: SeDebugPrivilege 1124 .exe Token: SeDebugPrivilege 1952 RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1500 img_0933.exe 1500 img_0933.exe 1500 img_0933.exe 1124 .exe 1124 .exe 1124 .exe 1952 RegAsm.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1500 wrote to memory of 1696 1500 img_0933.exe 24 PID 1500 wrote to memory of 1696 1500 img_0933.exe 24 PID 1500 wrote to memory of 1696 1500 img_0933.exe 24 PID 1500 wrote to memory of 1696 1500 img_0933.exe 24 PID 1696 wrote to memory of 1784 1696 cmd.exe 26 PID 1696 wrote to memory of 1784 1696 cmd.exe 26 PID 1696 wrote to memory of 1784 1696 cmd.exe 26 PID 1696 wrote to memory of 1784 1696 cmd.exe 26 PID 1500 wrote to memory of 1124 1500 img_0933.exe 30 PID 1500 wrote to memory of 1124 1500 img_0933.exe 30 PID 1500 wrote to memory of 1124 1500 img_0933.exe 30 PID 1500 wrote to memory of 1124 1500 img_0933.exe 30 PID 1124 wrote to memory of 1952 1124 .exe 31 PID 1124 wrote to memory of 1952 1124 .exe 31 PID 1124 wrote to memory of 1952 1124 .exe 31 PID 1124 wrote to memory of 1952 1124 .exe 31 PID 1124 wrote to memory of 1952 1124 .exe 31 PID 1124 wrote to memory of 1952 1124 .exe 31 PID 1124 wrote to memory of 1952 1124 .exe 31 PID 1124 wrote to memory of 1952 1124 .exe 31 PID 1124 wrote to memory of 1952 1124 .exe 31 PID 1124 wrote to memory of 1952 1124 .exe 31 PID 1124 wrote to memory of 1952 1124 .exe 31 PID 1124 wrote to memory of 1952 1124 .exe 31 -
Executes dropped EXE 2 IoCs
pid Process 1124 .exe 1952 RegAsm.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org -
Loads dropped DLL 3 IoCs
pid Process 1500 img_0933.exe 1124 .exe 1952 RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1124 set thread context of 1952 1124 .exe 31 -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Windows\CurrentVersion\Run\admin = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\Desktop\\.exe" reg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
Processes
-
C:\Users\Admin\AppData\Local\Temp\img_0933.exe"C:\Users\Admin\AppData\Local\Temp\img_0933.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Loads dropped DLL
PID:1500 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v admin /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\Desktop\.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v admin /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\Desktop\.exe"3⤵
- Adds Run entry to start application
PID:1784
-
-
-
C:\Users\Admin\Desktop\.exe"C:\Users\Admin\Desktop\.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
- Loads dropped DLL
PID:1952
-
-