Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
27s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
11/04/2023, 22:24
Behavioral task
behavioral1
Sample
faa6a1909265a4d4688519a638678ae935d3731e3a3101c445d9ebe6752db787.exe
Resource
win7-20230220-en
3 signatures
300 seconds
General
-
Target
faa6a1909265a4d4688519a638678ae935d3731e3a3101c445d9ebe6752db787.exe
-
Size
4.3MB
-
MD5
c4cc397e003e1078c1f78c99f73707f3
-
SHA1
7907a749fcb6dda2eaf00ef4a18d8c93ab2dce0f
-
SHA256
faa6a1909265a4d4688519a638678ae935d3731e3a3101c445d9ebe6752db787
-
SHA512
805dfdf49aa9cdc1617f9fb82b92fafce4328721b1d3f11be73e42e54e140b1502e7bd7752b315912266159b73026ad9608f7fae0d30ff6570e1156471c2a2b0
-
SSDEEP
98304:H5v3YyJ46MKme4H2EbjKWA+FuwlvJIuQAvzjvp7J+/qbzCbscYtr:H5v3nJoDrbjKWA+Fu0KzA3+SCYc6r
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1988-54-0x00000000012D0000-0x0000000002134000-memory.dmp upx -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1988 wrote to memory of 1940 1988 faa6a1909265a4d4688519a638678ae935d3731e3a3101c445d9ebe6752db787.exe 28 PID 1988 wrote to memory of 1940 1988 faa6a1909265a4d4688519a638678ae935d3731e3a3101c445d9ebe6752db787.exe 28 PID 1988 wrote to memory of 1940 1988 faa6a1909265a4d4688519a638678ae935d3731e3a3101c445d9ebe6752db787.exe 28 PID 1940 wrote to memory of 1440 1940 cmd.exe 30 PID 1940 wrote to memory of 1440 1940 cmd.exe 30 PID 1940 wrote to memory of 1440 1940 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\faa6a1909265a4d4688519a638678ae935d3731e3a3101c445d9ebe6752db787.exe"C:\Users\Admin\AppData\Local\Temp\faa6a1909265a4d4688519a638678ae935d3731e3a3101c445d9ebe6752db787.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\faa6a1909265a4d4688519a638678ae935d3731e3a3101c445d9ebe6752db787.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1440
-
-