Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10/05/2023, 22:18
Behavioral task
behavioral1
Sample
95f9019ef64af7b668c7814f7177053a1948096c43a812422f0d73d2c412813f.exe
Resource
win7-20230220-en
4 signatures
300 seconds
General
-
Target
95f9019ef64af7b668c7814f7177053a1948096c43a812422f0d73d2c412813f.exe
-
Size
4.3MB
-
MD5
322707c1d2cd4b8fb56ad3f6dd354f05
-
SHA1
1b77bf7e5c5c1dd86d88944d2d55cde60c53a1cf
-
SHA256
95f9019ef64af7b668c7814f7177053a1948096c43a812422f0d73d2c412813f
-
SHA512
59e5554bc4933cf9a703baa46f862591cfcec445f634186fe437683441e9f1a29f92608723025dfb4c6f4d05b12371fe06abfc27ffd53083553084e491d9fc8f
-
SSDEEP
98304:ty0CwDjPo99XD8oHXXV6GAQNpH7MNfM4CBVwlEU/9he2UD0aSYndf:NCuo998aXXV6GAQYdM4CBKV/9hHUcof
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1248 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/824-54-0x0000000000860000-0x00000000016BE000-memory.dmp upx -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 824 wrote to memory of 1248 824 95f9019ef64af7b668c7814f7177053a1948096c43a812422f0d73d2c412813f.exe 28 PID 824 wrote to memory of 1248 824 95f9019ef64af7b668c7814f7177053a1948096c43a812422f0d73d2c412813f.exe 28 PID 824 wrote to memory of 1248 824 95f9019ef64af7b668c7814f7177053a1948096c43a812422f0d73d2c412813f.exe 28 PID 1248 wrote to memory of 776 1248 cmd.exe 30 PID 1248 wrote to memory of 776 1248 cmd.exe 30 PID 1248 wrote to memory of 776 1248 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\95f9019ef64af7b668c7814f7177053a1948096c43a812422f0d73d2c412813f.exe"C:\Users\Admin\AppData\Local\Temp\95f9019ef64af7b668c7814f7177053a1948096c43a812422f0d73d2c412813f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\95f9019ef64af7b668c7814f7177053a1948096c43a812422f0d73d2c412813f.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:776
-
-