Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
333s -
max time network
399s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 23:13
Static task
static1
Behavioral task
behavioral1
Sample
eb159346814220dd5096bff9bc09386b657c8e2878bb6b54a768f0ff294e4971.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
eb159346814220dd5096bff9bc09386b657c8e2878bb6b54a768f0ff294e4971.exe
Resource
win10v2004-20221111-en
General
-
Target
eb159346814220dd5096bff9bc09386b657c8e2878bb6b54a768f0ff294e4971.exe
-
Size
822KB
-
MD5
da94ffc5c60c9743620a6af169cb98b4
-
SHA1
bd19c740362b7da299477892eb6175f66e542f18
-
SHA256
eb159346814220dd5096bff9bc09386b657c8e2878bb6b54a768f0ff294e4971
-
SHA512
e46b796795e37429ec7b958bb7c2120392c5fc4639d7ce0b16d5d5f4915db7bfa3bc5a57e13b28df73fa51906ffd2c4bfe3a7468b4e0a444534255bdc2e3242e
-
SSDEEP
12288:ZxPnnmK8JyxCs1f0EG52rQ1Sz81DxO3jTYPvh/x68Koxi24OP7SV:Tnm6NzrnkDxOfY3K80
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4460-132-0x0000000000400000-0x0000000000644000-memory.dmp upx behavioral2/memory/4460-133-0x0000000000400000-0x0000000000644000-memory.dmp upx behavioral2/memory/4460-134-0x0000000000400000-0x0000000000644000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run eb159346814220dd5096bff9bc09386b657c8e2878bb6b54a768f0ff294e4971.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eb159346814220dd5096bff9bc09386b657c8e2878bb6b54a768f0ff294e4971.exe" eb159346814220dd5096bff9bc09386b657c8e2878bb6b54a768f0ff294e4971.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main eb159346814220dd5096bff9bc09386b657c8e2878bb6b54a768f0ff294e4971.exe Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DefaultCompressedRecord = 2480f97f735ad5ba867408e5ce87fd02e405e6e28b53929bda0603748dc49252c12c64ab327a525b7f8c88186ededd69dda92a02be47d01deba685f9a364a8ed095550c915040b979ebf66d1f618e52389cd225b47677f0b15bcb889adb3f2499e7fb08171fac6 eb159346814220dd5096bff9bc09386b657c8e2878bb6b54a768f0ff294e4971.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\RecordModifiedMax = "DLMBwm9FQ1+Ebugk5vVU5z66VELvOTL4WKw2m4pwzTPzB5Yjm5hdfew55m39FGj+zQ==" eb159346814220dd5096bff9bc09386b657c8e2878bb6b54a768f0ff294e4971.exe Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FlagsModifiedValid = 0000000000000000 eb159346814220dd5096bff9bc09386b657c8e2878bb6b54a768f0ff294e4971.exe