Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

14/10/2022, 17:56

221014-wh41hseaal 7

14/10/2022, 17:48

221014-wdxewadhg3 8

14/10/2022, 17:34

221014-v5h6wsdhfn 8

Analysis

  • max time kernel
    902s
  • max time network
    913s
  • platform
    windows7_x64
  • resource
    win7-20220901-it
  • resource tags

    arch:x64arch:x86image:win7-20220901-itlocale:it-itos:windows7-x64systemwindows
  • submitted
    14/10/2022, 17:56

General

  • Target

    Setup.exe

  • Size

    376.9MB

  • MD5

    2f9db86c1f07387ba6b0168d62ed2950

  • SHA1

    37ffc85149a8bdb31044c82c775ce329421ff77c

  • SHA256

    cfb9b1ded6e26c2ae213126dbe5301394754b076acf7d9b033794c79c4eeb8b2

  • SHA512

    9f5a3aa0447e09409306b36b0b41dbafe9e08c0112d0a43e6194c57830b5e023271d66010130b99d58cad8f352006dc63e82567e9697eef35cd6e0fdf526ac35

  • SSDEEP

    196608:3IERCPHzGscu98PPz6qC+pTDGwud0AvEO:4ERaHzGEgOqH/GwTEEO

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1276

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1276-54-0x0000000075731000-0x0000000075733000-memory.dmp

    Filesize

    8KB

  • memory/1276-55-0x00000000010A0000-0x0000000001BD7000-memory.dmp

    Filesize

    11.2MB

  • memory/1276-56-0x00000000747F0000-0x0000000074D9B000-memory.dmp

    Filesize

    5.7MB

  • memory/1276-57-0x00000000010A0000-0x0000000001BD7000-memory.dmp

    Filesize

    11.2MB

  • memory/1276-58-0x00000000747F0000-0x0000000074D9B000-memory.dmp

    Filesize

    5.7MB