Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 18:01
Static task
static1
Behavioral task
behavioral1
Sample
a3b8cc19c8ee6f1b6b17228366ce7fa186689048ccba4bdff14f445a74b0c51d.exe
Resource
win7-20221111-en
General
-
Target
a3b8cc19c8ee6f1b6b17228366ce7fa186689048ccba4bdff14f445a74b0c51d.exe
-
Size
92KB
-
MD5
594994c8fc6eda82a44d89fb389102fb
-
SHA1
5c423155b28d00a4d9ca61d239857cd40c4cc931
-
SHA256
a3b8cc19c8ee6f1b6b17228366ce7fa186689048ccba4bdff14f445a74b0c51d
-
SHA512
39a7c29e2a626f6e7a3262e77cfdc85f2a04a36ce1500ce1854cbebf48a725fe0e020ad7c2be979e8c82dad605a34e0c105ca937433cbec7d3688f8a7bd64c3b
-
SSDEEP
1536:kDGe2DKV7GcAJ4cRpa/Tb66JNULlSZ5h6T714g8RAdg8huqQNWOTUr3ABi:Be2DCGcY4cRpa/T+3LlU5MmgjFEVWOg3
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3b8cc19c8ee6f1b6b17228366ce7fa186689048ccba4bdff14f445a74b0c51d.exe"C:\Users\Admin\AppData\Local\Temp\a3b8cc19c8ee6f1b6b17228366ce7fa186689048ccba4bdff14f445a74b0c51d.exe"1⤵PID:1624
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:3084