Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
158s -
max time network
175s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 06:30
Static task
static1
Behavioral task
behavioral1
Sample
c2a2fcf04e42cc3aa1d32cbcbbdad1f0c52e421690ffe0db4db35789cd2d3b62.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c2a2fcf04e42cc3aa1d32cbcbbdad1f0c52e421690ffe0db4db35789cd2d3b62.exe
Resource
win10v2004-20220812-en
General
-
Target
c2a2fcf04e42cc3aa1d32cbcbbdad1f0c52e421690ffe0db4db35789cd2d3b62.exe
-
Size
165KB
-
MD5
669110614ddb55c7fe76ed066c2d83c9
-
SHA1
18e03e42063d5a5ba34c5dc099ce48fc21e855b1
-
SHA256
c2a2fcf04e42cc3aa1d32cbcbbdad1f0c52e421690ffe0db4db35789cd2d3b62
-
SHA512
eb219b7d4f3d91c9bd0915aaa4df861411a0d443552339f452fd75189df03dc0b75f4cc13bfa67cbe8ae8ed3bbe224c427fe110ad27793db876c66117367ac98
-
SSDEEP
3072:ReGlO/laYP9Af/iyXYi/lEcZQcis1ejEBid076EHPsmL5LCTm0u974KBrxxzYNv:ReGlWQYPByIiWhNKLBTjt5eK393Brxx6
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" c2a2fcf04e42cc3aa1d32cbcbbdad1f0c52e421690ffe0db4db35789cd2d3b62.exe -
resource yara_rule behavioral1/memory/1992-55-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/764-59-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/1992-61-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/1956-65-0x0000000000400000-0x000000000048A000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1992 wrote to memory of 764 1992 c2a2fcf04e42cc3aa1d32cbcbbdad1f0c52e421690ffe0db4db35789cd2d3b62.exe 28 PID 1992 wrote to memory of 764 1992 c2a2fcf04e42cc3aa1d32cbcbbdad1f0c52e421690ffe0db4db35789cd2d3b62.exe 28 PID 1992 wrote to memory of 764 1992 c2a2fcf04e42cc3aa1d32cbcbbdad1f0c52e421690ffe0db4db35789cd2d3b62.exe 28 PID 1992 wrote to memory of 764 1992 c2a2fcf04e42cc3aa1d32cbcbbdad1f0c52e421690ffe0db4db35789cd2d3b62.exe 28 PID 1992 wrote to memory of 1956 1992 c2a2fcf04e42cc3aa1d32cbcbbdad1f0c52e421690ffe0db4db35789cd2d3b62.exe 30 PID 1992 wrote to memory of 1956 1992 c2a2fcf04e42cc3aa1d32cbcbbdad1f0c52e421690ffe0db4db35789cd2d3b62.exe 30 PID 1992 wrote to memory of 1956 1992 c2a2fcf04e42cc3aa1d32cbcbbdad1f0c52e421690ffe0db4db35789cd2d3b62.exe 30 PID 1992 wrote to memory of 1956 1992 c2a2fcf04e42cc3aa1d32cbcbbdad1f0c52e421690ffe0db4db35789cd2d3b62.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2a2fcf04e42cc3aa1d32cbcbbdad1f0c52e421690ffe0db4db35789cd2d3b62.exe"C:\Users\Admin\AppData\Local\Temp\c2a2fcf04e42cc3aa1d32cbcbbdad1f0c52e421690ffe0db4db35789cd2d3b62.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\c2a2fcf04e42cc3aa1d32cbcbbdad1f0c52e421690ffe0db4db35789cd2d3b62.exeC:\Users\Admin\AppData\Local\Temp\c2a2fcf04e42cc3aa1d32cbcbbdad1f0c52e421690ffe0db4db35789cd2d3b62.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:764
-
-
C:\Users\Admin\AppData\Local\Temp\c2a2fcf04e42cc3aa1d32cbcbbdad1f0c52e421690ffe0db4db35789cd2d3b62.exeC:\Users\Admin\AppData\Local\Temp\c2a2fcf04e42cc3aa1d32cbcbbdad1f0c52e421690ffe0db4db35789cd2d3b62.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:1956
-