Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
100s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 06:30
Static task
static1
Behavioral task
behavioral1
Sample
c04bd9cb313c537fc1f9dd07e1f18d76d29f5ec60216be1abede232a4e34ad4c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c04bd9cb313c537fc1f9dd07e1f18d76d29f5ec60216be1abede232a4e34ad4c.exe
Resource
win10v2004-20220812-en
General
-
Target
c04bd9cb313c537fc1f9dd07e1f18d76d29f5ec60216be1abede232a4e34ad4c.exe
-
Size
136KB
-
MD5
80f05cd8c9d4b621e0d2dd8a83f8051f
-
SHA1
4a6eedc936a079d16b746f5436916db6b86a4209
-
SHA256
c04bd9cb313c537fc1f9dd07e1f18d76d29f5ec60216be1abede232a4e34ad4c
-
SHA512
ed0f2e90b166fa4cf757f234cdf978263d76b4b12c6ba0d0f3c4fd4aba078940f0aabad46b998ad6fb4622468890f70eaf66a907e10b70ae67634056f5c0dbe9
-
SSDEEP
3072:ole+/KYkGQWSX5QAdMomGdP3xxS1m0FRbZSqpqcSx2ANeZZS5:onFkBJQuMomGdfPgb1qt3wS5
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" c04bd9cb313c537fc1f9dd07e1f18d76d29f5ec60216be1abede232a4e34ad4c.exe -
resource yara_rule behavioral1/memory/2040-59-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral1/memory/328-57-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral1/memory/2040-61-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral1/memory/1780-65-0x0000000000400000-0x0000000000459000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2040 wrote to memory of 328 2040 c04bd9cb313c537fc1f9dd07e1f18d76d29f5ec60216be1abede232a4e34ad4c.exe 28 PID 2040 wrote to memory of 328 2040 c04bd9cb313c537fc1f9dd07e1f18d76d29f5ec60216be1abede232a4e34ad4c.exe 28 PID 2040 wrote to memory of 328 2040 c04bd9cb313c537fc1f9dd07e1f18d76d29f5ec60216be1abede232a4e34ad4c.exe 28 PID 2040 wrote to memory of 328 2040 c04bd9cb313c537fc1f9dd07e1f18d76d29f5ec60216be1abede232a4e34ad4c.exe 28 PID 2040 wrote to memory of 1780 2040 c04bd9cb313c537fc1f9dd07e1f18d76d29f5ec60216be1abede232a4e34ad4c.exe 30 PID 2040 wrote to memory of 1780 2040 c04bd9cb313c537fc1f9dd07e1f18d76d29f5ec60216be1abede232a4e34ad4c.exe 30 PID 2040 wrote to memory of 1780 2040 c04bd9cb313c537fc1f9dd07e1f18d76d29f5ec60216be1abede232a4e34ad4c.exe 30 PID 2040 wrote to memory of 1780 2040 c04bd9cb313c537fc1f9dd07e1f18d76d29f5ec60216be1abede232a4e34ad4c.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c04bd9cb313c537fc1f9dd07e1f18d76d29f5ec60216be1abede232a4e34ad4c.exe"C:\Users\Admin\AppData\Local\Temp\c04bd9cb313c537fc1f9dd07e1f18d76d29f5ec60216be1abede232a4e34ad4c.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\c04bd9cb313c537fc1f9dd07e1f18d76d29f5ec60216be1abede232a4e34ad4c.exeC:\Users\Admin\AppData\Local\Temp\c04bd9cb313c537fc1f9dd07e1f18d76d29f5ec60216be1abede232a4e34ad4c.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:328
-
-
C:\Users\Admin\AppData\Local\Temp\c04bd9cb313c537fc1f9dd07e1f18d76d29f5ec60216be1abede232a4e34ad4c.exeC:\Users\Admin\AppData\Local\Temp\c04bd9cb313c537fc1f9dd07e1f18d76d29f5ec60216be1abede232a4e34ad4c.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:1780
-