Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
03/05/2023, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
fe4333d113f866f464884bb210088104.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
fe4333d113f866f464884bb210088104.exe
Resource
win10v2004-20230220-en
General
-
Target
fe4333d113f866f464884bb210088104.exe
-
Size
68KB
-
MD5
fe4333d113f866f464884bb210088104
-
SHA1
416f83c1d0aa26809eebfe5446ab79db5d977cf6
-
SHA256
138bae1f48b4b21ca9959fdcf46a4776b68af3590aa2c9ff2b7d7650c5a97a76
-
SHA512
631fe174d79b4d3620748274d18615d6f0b049ad4e6002a7da4301473516f441ee549aaf3aaf9fe53fd4df68c78763826e7ba95cefcf233b8549728c12495ffc
-
SSDEEP
1536:kMozyQo9+pwSgFf076fU6OcossWjcdDvE+VOaF2c:k8axw5sdzDM8pf
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run fe4333d113f866f464884bb210088104.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run\Zero = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Zero.exe" fe4333d113f866f464884bb210088104.exe -
Drops desktop.ini file(s) 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini fe4333d113f866f464884bb210088104.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\T0FM3QNF\desktop.ini fe4333d113f866f464884bb210088104.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\292MJLCQ\desktop.ini fe4333d113f866f464884bb210088104.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\4P132BG8\desktop.ini fe4333d113f866f464884bb210088104.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\C7KQ9NAK\desktop.ini fe4333d113f866f464884bb210088104.exe