Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
386s -
max time network
470s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 02:41
Static task
static1
Behavioral task
behavioral1
Sample
f7c96192bdf6b51bb46588a6601196253a5abce083eb8afff793f523dca8f578.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f7c96192bdf6b51bb46588a6601196253a5abce083eb8afff793f523dca8f578.exe
Resource
win10v2004-20221111-en
General
-
Target
f7c96192bdf6b51bb46588a6601196253a5abce083eb8afff793f523dca8f578.exe
-
Size
1.1MB
-
MD5
065ab35507815599b533bc5fb5c8843d
-
SHA1
5ea0410472228936a8574cb900d2ec9b9417e13d
-
SHA256
f7c96192bdf6b51bb46588a6601196253a5abce083eb8afff793f523dca8f578
-
SHA512
4866063ea24915de842d844b8b0c802bdb875d6f4d271deb155be074ed8179c676d3063f05f6152a47a19b026cdd8ad9847f3f64ee47946c13b1af5deeebda6f
-
SSDEEP
24576:YSrIg9yu8nidH4wz4ToE1w9Hq8p8yyX/40QfAjGBd:Nr1enw4m4z1/8p8y+/408Bd
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2064-133-0x0000000000400000-0x0000000000671000-memory.dmp upx behavioral2/memory/2064-135-0x0000000000400000-0x0000000000671000-memory.dmp upx behavioral2/memory/2064-136-0x0000000000400000-0x0000000000671000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run f7c96192bdf6b51bb46588a6601196253a5abce083eb8afff793f523dca8f578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f7c96192bdf6b51bb46588a6601196253a5abce083eb8afff793f523dca8f578.exe" f7c96192bdf6b51bb46588a6601196253a5abce083eb8afff793f523dca8f578.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FlagsModifiedValid = 0000000000000000 f7c96192bdf6b51bb46588a6601196253a5abce083eb8afff793f523dca8f578.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main f7c96192bdf6b51bb46588a6601196253a5abce083eb8afff793f523dca8f578.exe Set value (data) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DefaultCompressedRecord = f180f97f73092afbe69367b668b45646898fb672e7ab6be7eefffd02d05e8ec84801daa63bc99d62cfb3d506c5bb7a41a1418325b93d475c046199da7e032a27069809612702ea950bd4d3406d782ed495cf40c667677f8bc3a4f2a8478df8d60e5ea3908a21d6 f7c96192bdf6b51bb46588a6601196253a5abce083eb8afff793f523dca8f578.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\RecordModifiedMax = "DDwduNdqjtaUalRWaSzwUZU49GipD2x6OUbSRA3WRjPxgTqqjX3JedupfQCQAtLVxw==" f7c96192bdf6b51bb46588a6601196253a5abce083eb8afff793f523dca8f578.exe