Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2023, 13:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
bebra.exe
Resource
win7-20230705-en
3 signatures
150 seconds
General
-
Target
bebra.exe
-
Size
13.9MB
-
MD5
8bbb5461409a619233adcb8ee3b74bce
-
SHA1
2027c2a644e2ecc9f61d98c71fdcc299e9601f08
-
SHA256
1b159462e05a7fc20d95b4d3a84254cab4324c9961eeeb51d2b0a1bf63393b7d
-
SHA512
e72ca6c4e925ca0f27d35a02d4821201d78f252f7b11d2974d718a2086e0d5410df9af58bb934fea81ebfd9af2894b347e6c9769eb2e8e6c4d75314e90874fdd
-
SSDEEP
98304:E9BmZ2hEgn3z+b9ZkkIDxE9Q/4X/gzq0PNwa:Ez02ignkIkImDX/Y
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2776 wrote to memory of 3764 2776 bebra.exe 82 PID 2776 wrote to memory of 3764 2776 bebra.exe 82 PID 3764 wrote to memory of 4324 3764 cmd.exe 83 PID 3764 wrote to memory of 4324 3764 cmd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\bebra.exe"C:\Users\Admin\AppData\Local\Temp\bebra.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\bebra.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:4324
-
-