Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 05:16
Static task
static1
Behavioral task
behavioral1
Sample
7bda7dbb069e9a3ec7f39401807a2404b8e51185a24c960bd9a6a3fd4496e449.exe
Resource
win7-20220812-en
General
-
Target
7bda7dbb069e9a3ec7f39401807a2404b8e51185a24c960bd9a6a3fd4496e449.exe
-
Size
973KB
-
MD5
f50b7da8c6bb2e820a30d17d48afb113
-
SHA1
9b782a61b1155566bea604789eeab2cb9dec53ab
-
SHA256
7bda7dbb069e9a3ec7f39401807a2404b8e51185a24c960bd9a6a3fd4496e449
-
SHA512
726deb76bbf8f32f716fe2c601a4137d13dfb1b4fdf02f3ac4eb2db3c3fff57e6e17d3d0de1a5985b2f7d34c3638c112dccf4b6f84000a23d02f41cd1a35e955
-
SSDEEP
24576:K+wU+0GRJBMyaosJdRnPUKGh6qltQpoRGbkZMA0uSrrk7wH5:IR0GRJ5RsBPUKGhtQugkZOQa5
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2564 7bda7dbb069e9a3ec7f39401807a2404b8e51185a24c960bd9a6a3fd4496e449.exe 2564 7bda7dbb069e9a3ec7f39401807a2404b8e51185a24c960bd9a6a3fd4496e449.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2564 7bda7dbb069e9a3ec7f39401807a2404b8e51185a24c960bd9a6a3fd4496e449.exe 2564 7bda7dbb069e9a3ec7f39401807a2404b8e51185a24c960bd9a6a3fd4496e449.exe 2564 7bda7dbb069e9a3ec7f39401807a2404b8e51185a24c960bd9a6a3fd4496e449.exe 2564 7bda7dbb069e9a3ec7f39401807a2404b8e51185a24c960bd9a6a3fd4496e449.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7bda7dbb069e9a3ec7f39401807a2404b8e51185a24c960bd9a6a3fd4496e449.exe"C:\Users\Admin\AppData\Local\Temp\7bda7dbb069e9a3ec7f39401807a2404b8e51185a24c960bd9a6a3fd4496e449.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2564