Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
51s -
max time network
177s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
11/04/2023, 22:24
Behavioral task
behavioral1
Sample
faa6a1909265a4d4688519a638678ae935d3731e3a3101c445d9ebe6752db787.exe
Resource
win7-20230220-en
3 signatures
300 seconds
General
-
Target
faa6a1909265a4d4688519a638678ae935d3731e3a3101c445d9ebe6752db787.exe
-
Size
4.3MB
-
MD5
c4cc397e003e1078c1f78c99f73707f3
-
SHA1
7907a749fcb6dda2eaf00ef4a18d8c93ab2dce0f
-
SHA256
faa6a1909265a4d4688519a638678ae935d3731e3a3101c445d9ebe6752db787
-
SHA512
805dfdf49aa9cdc1617f9fb82b92fafce4328721b1d3f11be73e42e54e140b1502e7bd7752b315912266159b73026ad9608f7fae0d30ff6570e1156471c2a2b0
-
SSDEEP
98304:H5v3YyJ46MKme4H2EbjKWA+FuwlvJIuQAvzjvp7J+/qbzCbscYtr:H5v3nJoDrbjKWA+Fu0KzA3+SCYc6r
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3752-121-0x0000000001210000-0x0000000002074000-memory.dmp upx behavioral2/memory/3752-122-0x0000000001210000-0x0000000002074000-memory.dmp upx -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3752 wrote to memory of 3668 3752 faa6a1909265a4d4688519a638678ae935d3731e3a3101c445d9ebe6752db787.exe 66 PID 3752 wrote to memory of 3668 3752 faa6a1909265a4d4688519a638678ae935d3731e3a3101c445d9ebe6752db787.exe 66 PID 3668 wrote to memory of 4224 3668 cmd.exe 68 PID 3668 wrote to memory of 4224 3668 cmd.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\faa6a1909265a4d4688519a638678ae935d3731e3a3101c445d9ebe6752db787.exe"C:\Users\Admin\AppData\Local\Temp\faa6a1909265a4d4688519a638678ae935d3731e3a3101c445d9ebe6752db787.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\faa6a1909265a4d4688519a638678ae935d3731e3a3101c445d9ebe6752db787.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:4224
-
-