Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2022, 13:31

General

  • Target

    3f4def059e60cfc2c67be8f57c2439c39ea52b4323e2f8f6e94f1aad0cf2ac32.exe

  • Size

    832KB

  • MD5

    072d3063ccb4acd43eae736dca914e90

  • SHA1

    5f49185c5bf623cb4392ee31d9cb923127e98c83

  • SHA256

    3f4def059e60cfc2c67be8f57c2439c39ea52b4323e2f8f6e94f1aad0cf2ac32

  • SHA512

    f2034509c25c9cffbc5f6a731d555ed769cace6d02390ee0805df4503b788e48356223f3ea6b582364221b420b3f79f4d025473cc1b5669738e2743ec03dd836

  • SSDEEP

    12288:PZaUTU4DskUqfls5Dq+SivfsVq2VquOjEqLN1rT8vMdI/vFdjkCuAraX:PZaUNRUqxrefs3wu07yHnBuArY

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f4def059e60cfc2c67be8f57c2439c39ea52b4323e2f8f6e94f1aad0cf2ac32.exe
    "C:\Users\Admin\AppData\Local\Temp\3f4def059e60cfc2c67be8f57c2439c39ea52b4323e2f8f6e94f1aad0cf2ac32.exe"
    1⤵
    • Adds Run key to start application
    PID:1960

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1960-54-0x0000000000400000-0x000000000063E000-memory.dmp

    Filesize

    2.2MB

  • memory/1960-55-0x0000000000400000-0x000000000063E000-memory.dmp

    Filesize

    2.2MB

  • memory/1960-56-0x0000000075451000-0x0000000075453000-memory.dmp

    Filesize

    8KB

  • memory/1960-57-0x0000000000400000-0x000000000063E000-memory.dmp

    Filesize

    2.2MB

  • memory/1960-58-0x0000000000400000-0x000000000063E000-memory.dmp

    Filesize

    2.2MB