Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    23/09/2023, 19:19

General

  • Target

    c34111844b4966557dcba6e80b4a175e4c63eeb319266f545b71f9e5894df60d_JC.exe

  • Size

    427KB

  • MD5

    776aba268b8e954b840024c49c146581

  • SHA1

    1b52bcc85b507748b68b543628ee6deba0bacc94

  • SHA256

    c34111844b4966557dcba6e80b4a175e4c63eeb319266f545b71f9e5894df60d

  • SHA512

    b0cb191592bbab0ca910d75ef0d53a844af988792045e4dd71688647da76ffba4d03c4d7a66506ab97c7e7434ca8c16b07248503dd524e7f5fb67be0384a4fdc

  • SSDEEP

    6144:fCrXra59R65KTy46aQ3QAs1nv3nODp4IgU7MQFDUDkz2Qsy:fCrbavGSy4fIQJcDC3UoQFDykv

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c34111844b4966557dcba6e80b4a175e4c63eeb319266f545b71f9e5894df60d_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\c34111844b4966557dcba6e80b4a175e4c63eeb319266f545b71f9e5894df60d_JC.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2076-1-0x0000000000870000-0x0000000000970000-memory.dmp

    Filesize

    1024KB

  • memory/2076-2-0x0000000000220000-0x0000000000270000-memory.dmp

    Filesize

    320KB

  • memory/2076-3-0x0000000000400000-0x0000000000739000-memory.dmp

    Filesize

    3.2MB

  • memory/2076-5-0x0000000074890000-0x0000000074F7E000-memory.dmp

    Filesize

    6.9MB

  • memory/2076-4-0x0000000002350000-0x00000000023B6000-memory.dmp

    Filesize

    408KB

  • memory/2076-6-0x0000000004D20000-0x0000000004D60000-memory.dmp

    Filesize

    256KB

  • memory/2076-7-0x0000000004D20000-0x0000000004D60000-memory.dmp

    Filesize

    256KB

  • memory/2076-8-0x00000000023B0000-0x0000000002412000-memory.dmp

    Filesize

    392KB

  • memory/2076-9-0x0000000004D20000-0x0000000004D60000-memory.dmp

    Filesize

    256KB

  • memory/2076-10-0x0000000000870000-0x0000000000970000-memory.dmp

    Filesize

    1024KB

  • memory/2076-11-0x0000000000220000-0x0000000000270000-memory.dmp

    Filesize

    320KB

  • memory/2076-12-0x0000000000400000-0x0000000000739000-memory.dmp

    Filesize

    3.2MB

  • memory/2076-13-0x0000000000870000-0x0000000000970000-memory.dmp

    Filesize

    1024KB

  • memory/2076-14-0x0000000074890000-0x0000000074F7E000-memory.dmp

    Filesize

    6.9MB