Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe
Resource
win10v2004-20220812-en
General
-
Target
7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe
-
Size
1.0MB
-
MD5
9309177b01ac4ec099c2cf61204e4590
-
SHA1
40c04a70a54d75d8ec82d49135806151d800f4bd
-
SHA256
7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef
-
SHA512
7f353c98fdf489e0189bf5da1e51d17de0e581f64c638c0e725e116aa711ffe18ed5bed63b0fa5ac4eed747a277dcadf2bf2cd2093ef2334e985f967ad249c56
-
SSDEEP
24576:cjFdqfL4ZiJgP+FgEFhbCQTJvQKKOP79UDqI/F1v8NziDM:cLqz4Z8jSyCQpQKKW7929IZ
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1500-140-0x0000000000400000-0x0000000000645000-memory.dmp upx behavioral2/memory/1500-141-0x0000000000400000-0x0000000000645000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe" 7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4908 set thread context of 1500 4908 7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe 86 -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FlagsModifiedValid = 0000000000000000 7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main 7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DefaultCompressedRecord = c880f97f7314740bcf9c483e5c966e6f96975a118801ab8196ed798a54c1d4bd9ea7d19837bec9f09b436de303bd5e17a9ed44a74ad2c19a02f0be0dffcf950dca04274baa389e836f11c9617032a3f3880cf59f02677f30efee03c9183539398d43e0c87fd3fb 7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\RecordModifiedMax = "DLJHS5CMmK/GnR4CI4Ve8PY9gBQQxKJZDQoTpXj871pbWxZuAGL2sjr0sR3MnOzRhg==" 7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4908 7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe 4908 7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4908 7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4908 wrote to memory of 5012 4908 7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe 84 PID 4908 wrote to memory of 5012 4908 7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe 84 PID 4908 wrote to memory of 5012 4908 7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe 84 PID 4908 wrote to memory of 1504 4908 7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe 85 PID 4908 wrote to memory of 1504 4908 7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe 85 PID 4908 wrote to memory of 1504 4908 7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe 85 PID 4908 wrote to memory of 1500 4908 7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe 86 PID 4908 wrote to memory of 1500 4908 7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe 86 PID 4908 wrote to memory of 1500 4908 7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe 86 PID 4908 wrote to memory of 1500 4908 7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe 86 PID 4908 wrote to memory of 1500 4908 7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe 86 PID 4908 wrote to memory of 1500 4908 7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe 86 PID 4908 wrote to memory of 1500 4908 7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe 86 PID 4908 wrote to memory of 1500 4908 7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe 86 PID 4908 wrote to memory of 1500 4908 7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe"C:\Users\Admin\AppData\Local\Temp\7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe"C:\Users\Admin\AppData\Local\Temp\7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe"2⤵PID:5012
-
-
C:\Users\Admin\AppData\Local\Temp\7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe"C:\Users\Admin\AppData\Local\Temp\7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe"2⤵PID:1504
-
-
C:\Users\Admin\AppData\Local\Temp\7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe"C:\Users\Admin\AppData\Local\Temp\7b23f9ae7f1188d36ac9c8f37fb1abd138f7863ca937d503457faaed01b106ef.exe"2⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
PID:1500
-