Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
63s -
max time network
54s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
26/05/2023, 17:23
Static task
static1
Behavioral task
behavioral1
Sample
a1ce7b26712e1db177d86fa87d09c354.exe
Resource
win7-20230220-en
General
-
Target
a1ce7b26712e1db177d86fa87d09c354.exe
-
Size
827KB
-
MD5
a1ce7b26712e1db177d86fa87d09c354
-
SHA1
23d567e5ee4d4bf882f5d4ebe54643eecd921ef4
-
SHA256
b6b0ac3d7e4ef3a97fb470b38e53f3d8114b736b60408d9828cd5f81e2d7cf0e
-
SHA512
e5d5c4770131274c28dab0adbac3ed84395aca30a8c15f7004cd4d28ae503c507dacb432dcce65b2f004711837b3cd7a26766b028957aa3a8bc2d99f9dd849d4
-
SSDEEP
12288:IKY7z5GoJiGaq5auxKSjipNvJDK2WSqcIVr4vo1euUTyH2BQMyEp0mpefJ3Lww:G5GoR5amjipNvFK2LXG3VrEuqqJ8w
Malware Config
Extracted
gurcu
https://api.telegram.org/bot5948365373:AAHGoShKq2YoPLHuMrakRbVNthbMABFYHUc/sendMessage?chat_id=-1001620069625
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1732 set thread context of 784 1732 a1ce7b26712e1db177d86fa87d09c354.exe 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 784 a1ce7b26712e1db177d86fa87d09c354.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1732 wrote to memory of 784 1732 a1ce7b26712e1db177d86fa87d09c354.exe 28 PID 1732 wrote to memory of 784 1732 a1ce7b26712e1db177d86fa87d09c354.exe 28 PID 1732 wrote to memory of 784 1732 a1ce7b26712e1db177d86fa87d09c354.exe 28 PID 1732 wrote to memory of 784 1732 a1ce7b26712e1db177d86fa87d09c354.exe 28 PID 1732 wrote to memory of 784 1732 a1ce7b26712e1db177d86fa87d09c354.exe 28 PID 1732 wrote to memory of 784 1732 a1ce7b26712e1db177d86fa87d09c354.exe 28 PID 1732 wrote to memory of 784 1732 a1ce7b26712e1db177d86fa87d09c354.exe 28 PID 1732 wrote to memory of 784 1732 a1ce7b26712e1db177d86fa87d09c354.exe 28 PID 1732 wrote to memory of 784 1732 a1ce7b26712e1db177d86fa87d09c354.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1ce7b26712e1db177d86fa87d09c354.exe"C:\Users\Admin\AppData\Local\Temp\a1ce7b26712e1db177d86fa87d09c354.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\a1ce7b26712e1db177d86fa87d09c354.exe"C:\Users\Admin\AppData\Local\Temp\a1ce7b26712e1db177d86fa87d09c354.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:784
-