Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
124s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 11:33
Static task
static1
Behavioral task
behavioral1
Sample
f3d430aeb052def46ddd27ee34f4ebbb8d6dd5a0199cf44af4821a620288f573.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f3d430aeb052def46ddd27ee34f4ebbb8d6dd5a0199cf44af4821a620288f573.exe
Resource
win10v2004-20220812-en
General
-
Target
f3d430aeb052def46ddd27ee34f4ebbb8d6dd5a0199cf44af4821a620288f573.exe
-
Size
175KB
-
MD5
4dad1ae06de3ffcb010f6c2e616b7b11
-
SHA1
71f516aa4ff5cb5e28bbc38e165901a3a92b5660
-
SHA256
f3d430aeb052def46ddd27ee34f4ebbb8d6dd5a0199cf44af4821a620288f573
-
SHA512
ac5cce71a565f5da0f614bdcd85e1d62ac9df71aa569b39fac3f376fb44a9f3d3f68db82a52ce06e9bdd0f8c114023b322a9c989dbf5ce99d866514c455cb87f
-
SSDEEP
3072:tdLVt3Qc4AW9Ue5SItWEpZsTc3NwrSb/Fd25tWPrVcw9TksCUf2X0lKbX68BeN+h:/v3QICScZScdjFdyW5tTZCUf2X0UxeNU
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" f3d430aeb052def46ddd27ee34f4ebbb8d6dd5a0199cf44af4821a620288f573.exe -
resource yara_rule behavioral1/memory/1120-55-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1216-59-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1120-61-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1692-66-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1120 wrote to memory of 1216 1120 f3d430aeb052def46ddd27ee34f4ebbb8d6dd5a0199cf44af4821a620288f573.exe 28 PID 1120 wrote to memory of 1216 1120 f3d430aeb052def46ddd27ee34f4ebbb8d6dd5a0199cf44af4821a620288f573.exe 28 PID 1120 wrote to memory of 1216 1120 f3d430aeb052def46ddd27ee34f4ebbb8d6dd5a0199cf44af4821a620288f573.exe 28 PID 1120 wrote to memory of 1216 1120 f3d430aeb052def46ddd27ee34f4ebbb8d6dd5a0199cf44af4821a620288f573.exe 28 PID 1120 wrote to memory of 1692 1120 f3d430aeb052def46ddd27ee34f4ebbb8d6dd5a0199cf44af4821a620288f573.exe 30 PID 1120 wrote to memory of 1692 1120 f3d430aeb052def46ddd27ee34f4ebbb8d6dd5a0199cf44af4821a620288f573.exe 30 PID 1120 wrote to memory of 1692 1120 f3d430aeb052def46ddd27ee34f4ebbb8d6dd5a0199cf44af4821a620288f573.exe 30 PID 1120 wrote to memory of 1692 1120 f3d430aeb052def46ddd27ee34f4ebbb8d6dd5a0199cf44af4821a620288f573.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3d430aeb052def46ddd27ee34f4ebbb8d6dd5a0199cf44af4821a620288f573.exe"C:\Users\Admin\AppData\Local\Temp\f3d430aeb052def46ddd27ee34f4ebbb8d6dd5a0199cf44af4821a620288f573.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\f3d430aeb052def46ddd27ee34f4ebbb8d6dd5a0199cf44af4821a620288f573.exeC:\Users\Admin\AppData\Local\Temp\f3d430aeb052def46ddd27ee34f4ebbb8d6dd5a0199cf44af4821a620288f573.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:1216
-
-
C:\Users\Admin\AppData\Local\Temp\f3d430aeb052def46ddd27ee34f4ebbb8d6dd5a0199cf44af4821a620288f573.exeC:\Users\Admin\AppData\Local\Temp\f3d430aeb052def46ddd27ee34f4ebbb8d6dd5a0199cf44af4821a620288f573.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:1692
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696B
MD5dc9fc2e6debf5e67dae0fd7db8cce1e6
SHA153da2dcdf5c7a0dba71e6362f7f988ca9a722166
SHA256d1e2b9f070d134290ccbc10a8f9b772bbbf4f20652bca4ae82638a48706f2ae7
SHA512bc7335d14d356627cdbecc07379384321751489dffe342516cee7aaf5950dae2b256761a8c1d2f3dbe3d37e1263e928eb578e5f499fead9826111d89d747a688