Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    131s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    22/09/2023, 07:09

General

  • Target

    7c915532927d432e39840d4dffa415cdc7c391faec377c745596bf40175e2e23.exe

  • Size

    2.8MB

  • MD5

    0ef8d94eb593fcf0a46d86f81abab33f

  • SHA1

    fd5a7232e055d2963b6e2e0f185acfe24177bdf5

  • SHA256

    7c915532927d432e39840d4dffa415cdc7c391faec377c745596bf40175e2e23

  • SHA512

    dd09bcc27d851002a4f3edb3daa7c1154567ae5d57657153637421ba18bd33d4986dfccc3a49c74e3a3c413bdfb0b068dd894615e6c9aa86ccade0bde6beb155

  • SSDEEP

    49152:r6AX9jq67rEm77oT4PQlTD2G3mGF4b6KzgLwz:ncYEm77oT4m2CfF4u6gLw

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 15 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c915532927d432e39840d4dffa415cdc7c391faec377c745596bf40175e2e23.exe
    "C:\Users\Admin\AppData\Local\Temp\7c915532927d432e39840d4dffa415cdc7c391faec377c745596bf40175e2e23.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Users\Admin\AppData\Local\Temp\7c915532927d432e39840d4dffa415cdc7c391faec377c745596bf40175e2e23.exe
      "C:\Users\Admin\AppData\Local\Temp\7c915532927d432e39840d4dffa415cdc7c391faec377c745596bf40175e2e23.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2280
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 224
        3⤵
        • Program crash
        • Suspicious behavior: GetForegroundWindowSpam
        PID:2704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ose00000.exe

    Filesize

    150KB

    MD5

    fe6c35db5db51378d5630d9b2d1d7887

    SHA1

    3b76a34766c16c4f46933927b281236cdbeff998

    SHA256

    19b7e187f8bc124e688d947397f76e4188807d61dfeb29a1cf7e732f87f2167b

    SHA512

    6bee4c688fdc888e5a256e3e0879744205de2d783cd30eed9620a0140286d46058f1a1924ca4c7d195993e5834e9cd937326ccac1f5b0aadfd0e2329762a5399

  • memory/2280-2-0x0000000001300000-0x0000000001613000-memory.dmp

    Filesize

    3.1MB

  • memory/2412-0-0x0000000001300000-0x0000000001613000-memory.dmp

    Filesize

    3.1MB

  • memory/2412-1-0x0000000000D50000-0x0000000001063000-memory.dmp

    Filesize

    3.1MB

  • memory/2412-3-0x0000000001300000-0x0000000001613000-memory.dmp

    Filesize

    3.1MB

  • memory/2704-5-0x00000000009E0000-0x00000000009E1000-memory.dmp

    Filesize

    4KB

  • memory/2704-6-0x00000000009E0000-0x00000000009E1000-memory.dmp

    Filesize

    4KB

  • memory/2704-7-0x00000000009E0000-0x00000000009E1000-memory.dmp

    Filesize

    4KB