Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2023, 17:46

General

  • Target

    DOCUMENTOS DE ENTREGA_html.exe

  • Size

    674KB

  • MD5

    81949c85d77f76164cb360626ac65f64

  • SHA1

    64371e3863e8ceeb40eacdfdf6a695106b275753

  • SHA256

    79c75f759d9a8443bdf2bbde5741af34b30e4c94bfa15ccf42dcb58f851e9a47

  • SHA512

    cabf793c5e31dbfe6f295ec0860acf70c29c4c63f2f4a9770e3e1b103e72e20efe8a90ad1812d74ac1d490f3a8cb10d831252a8a205d091255031e3ad3963e24

  • SSDEEP

    12288:Lg7JXmSOlBvtD1IyEj6xn2G8ch9oOLDFEBhUvYkKltDfNWR:Lg7cSOTJ1gj6pmOKgvY9D

Score
7/10

Malware Config

Signatures

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DOCUMENTOS DE ENTREGA_html.exe
    "C:\Users\Admin\AppData\Local\Temp\DOCUMENTOS DE ENTREGA_html.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Users\Admin\AppData\Local\Temp\DOCUMENTOS DE ENTREGA_html.exe
      "C:\Users\Admin\AppData\Local\Temp\DOCUMENTOS DE ENTREGA_html.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2244-76-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2244-77-0x0000000074320000-0x0000000074A0E000-memory.dmp

    Filesize

    6.9MB

  • memory/2244-81-0x0000000004810000-0x0000000004850000-memory.dmp

    Filesize

    256KB

  • memory/2244-80-0x0000000074320000-0x0000000074A0E000-memory.dmp

    Filesize

    6.9MB

  • memory/2244-78-0x0000000004810000-0x0000000004850000-memory.dmp

    Filesize

    256KB

  • memory/2244-70-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2244-74-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2244-72-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2244-62-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2244-64-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2244-66-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2244-68-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2340-55-0x0000000001010000-0x00000000010BE000-memory.dmp

    Filesize

    696KB

  • memory/2340-61-0x0000000007FD0000-0x000000000804E000-memory.dmp

    Filesize

    504KB

  • memory/2340-60-0x00000000004E0000-0x00000000004EA000-memory.dmp

    Filesize

    40KB

  • memory/2340-54-0x0000000074320000-0x0000000074A0E000-memory.dmp

    Filesize

    6.9MB

  • memory/2340-59-0x0000000004DD0000-0x0000000004E10000-memory.dmp

    Filesize

    256KB

  • memory/2340-79-0x0000000074320000-0x0000000074A0E000-memory.dmp

    Filesize

    6.9MB

  • memory/2340-58-0x00000000004B0000-0x00000000004C0000-memory.dmp

    Filesize

    64KB

  • memory/2340-57-0x0000000074320000-0x0000000074A0E000-memory.dmp

    Filesize

    6.9MB

  • memory/2340-56-0x0000000004DD0000-0x0000000004E10000-memory.dmp

    Filesize

    256KB