Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
183s -
max time network
190s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 14:44
Static task
static1
Behavioral task
behavioral1
Sample
d96b1775159c9bba8bd18fa8669bd8302bb9c289d57d97513c3b10ccaa1cee24.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d96b1775159c9bba8bd18fa8669bd8302bb9c289d57d97513c3b10ccaa1cee24.exe
Resource
win10v2004-20221111-en
General
-
Target
d96b1775159c9bba8bd18fa8669bd8302bb9c289d57d97513c3b10ccaa1cee24.exe
-
Size
183KB
-
MD5
89221b377f3447021809cd095db8da26
-
SHA1
d2dc59833f533b5123133c2ab4ae850ac13096ed
-
SHA256
d96b1775159c9bba8bd18fa8669bd8302bb9c289d57d97513c3b10ccaa1cee24
-
SHA512
4b071476fa8e7ab55b5f4e7711de7f13faaa80e120756b43f4450dbc62f422a50db863e60be9261abf573f77bed05e8fc2c960cf70537162a0ff38907f6c9703
-
SSDEEP
3072:dvrFQRtJaQvJsjne6kK8UBMNwd42/B9+U5JYunh06NIj+gZL2qCVxhDjgV5Dzg/:VFUJaQvJ7zDwR/H+U5f06NI+gh2tVxWI
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" d96b1775159c9bba8bd18fa8669bd8302bb9c289d57d97513c3b10ccaa1cee24.exe -
resource yara_rule behavioral1/memory/1420-55-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1240-59-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1420-61-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1664-65-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1420 wrote to memory of 1240 1420 d96b1775159c9bba8bd18fa8669bd8302bb9c289d57d97513c3b10ccaa1cee24.exe 28 PID 1420 wrote to memory of 1240 1420 d96b1775159c9bba8bd18fa8669bd8302bb9c289d57d97513c3b10ccaa1cee24.exe 28 PID 1420 wrote to memory of 1240 1420 d96b1775159c9bba8bd18fa8669bd8302bb9c289d57d97513c3b10ccaa1cee24.exe 28 PID 1420 wrote to memory of 1240 1420 d96b1775159c9bba8bd18fa8669bd8302bb9c289d57d97513c3b10ccaa1cee24.exe 28 PID 1420 wrote to memory of 1664 1420 d96b1775159c9bba8bd18fa8669bd8302bb9c289d57d97513c3b10ccaa1cee24.exe 30 PID 1420 wrote to memory of 1664 1420 d96b1775159c9bba8bd18fa8669bd8302bb9c289d57d97513c3b10ccaa1cee24.exe 30 PID 1420 wrote to memory of 1664 1420 d96b1775159c9bba8bd18fa8669bd8302bb9c289d57d97513c3b10ccaa1cee24.exe 30 PID 1420 wrote to memory of 1664 1420 d96b1775159c9bba8bd18fa8669bd8302bb9c289d57d97513c3b10ccaa1cee24.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d96b1775159c9bba8bd18fa8669bd8302bb9c289d57d97513c3b10ccaa1cee24.exe"C:\Users\Admin\AppData\Local\Temp\d96b1775159c9bba8bd18fa8669bd8302bb9c289d57d97513c3b10ccaa1cee24.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\d96b1775159c9bba8bd18fa8669bd8302bb9c289d57d97513c3b10ccaa1cee24.exeC:\Users\Admin\AppData\Local\Temp\d96b1775159c9bba8bd18fa8669bd8302bb9c289d57d97513c3b10ccaa1cee24.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:1240
-
-
C:\Users\Admin\AppData\Local\Temp\d96b1775159c9bba8bd18fa8669bd8302bb9c289d57d97513c3b10ccaa1cee24.exeC:\Users\Admin\AppData\Local\Temp\d96b1775159c9bba8bd18fa8669bd8302bb9c289d57d97513c3b10ccaa1cee24.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:1664
-