Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 09:43
Static task
static1
Behavioral task
behavioral1
Sample
807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exe
Resource
win7-20220812-en
General
-
Target
807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exe
-
Size
188KB
-
MD5
cce4c9d9f8b457bc429c85cede98b5c5
-
SHA1
599c5c121b0f72e82a9f8e520f158e9fbde6bfea
-
SHA256
807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac
-
SHA512
e66e840483877fc0cca23b17e3bf15b55ca91f0ddc5d73bd67f2fe6c23ac5a10565ba96d4a7c03eb24229955bdf818fcc69fbcebd9c7c0f7b2dbc6ce43d14279
-
SSDEEP
3072:SyG7WgmJAk2QhaD0/rvB8Ozupfjj85T3lxROc3bZxrI/I2G7GOrQYDi0binvt:Scp1asrZ8sArj8jCoZmI2sGcbhw
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4252-132-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/2320-135-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/4252-137-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/4564-140-0x0000000000400000-0x0000000000452000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4252 wrote to memory of 2320 4252 807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exe 82 PID 4252 wrote to memory of 2320 4252 807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exe 82 PID 4252 wrote to memory of 2320 4252 807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exe 82 PID 4252 wrote to memory of 4564 4252 807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exe 83 PID 4252 wrote to memory of 4564 4252 807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exe 83 PID 4252 wrote to memory of 4564 4252 807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exe"C:\Users\Admin\AppData\Local\Temp\807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exeC:\Users\Admin\AppData\Local\Temp\807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exe startC:\Program Files (x86)\Internet Explorer\D3F9\EC6.exe%C:\Program Files (x86)\Internet Explorer\D3F92⤵PID:2320
-
-
C:\Users\Admin\AppData\Local\Temp\807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exeC:\Users\Admin\AppData\Local\Temp\807a6aafd48cc683fc6f0ff0d0d5b8008c69ec5c6337ad702c308c17afa356ac.exe startC:\Users\Admin\AppData\Roaming\97AA4\D2ED3.exe%C:\Users\Admin\AppData\Roaming\97AA42⤵PID:4564
-