Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
245s -
max time network
293s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 23:42
Static task
static1
Behavioral task
behavioral1
Sample
45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe
Resource
win7-20230831-en
General
-
Target
45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe
-
Size
2.0MB
-
MD5
462b88fdf36e363b356fc0d5b5d0456d
-
SHA1
b3ac3b6d92220a31653bf6a5cbc93f0f18b32755
-
SHA256
45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0
-
SHA512
ac4a3c9ba3293f19ad1e120bbb86804282a427edce295da6e5bb502430ee03e613cb544774ad229c64955870c177ca7fb51c7f097547b5087d61257a1094f6a1
-
SSDEEP
49152:9/fsZwJcdfuZz5XGH4a+ySc7MSbiW14LJRGboyW/ssO:xfglAjGp+ySYMKiW14LJRMocsO
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe File opened (read-only) \??\H: 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe File opened (read-only) \??\O: 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe File opened (read-only) \??\X: 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe File opened (read-only) \??\A: 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe File opened (read-only) \??\J: 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe File opened (read-only) \??\M: 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe File opened (read-only) \??\P: 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe File opened (read-only) \??\Q: 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe File opened (read-only) \??\S: 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe File opened (read-only) \??\W: 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe File opened (read-only) \??\B: 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe File opened (read-only) \??\E: 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe File opened (read-only) \??\N: 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe File opened (read-only) \??\R: 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe File opened (read-only) \??\U: 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe File opened (read-only) \??\Y: 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe File opened (read-only) \??\Z: 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe File opened (read-only) \??\I: 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe File opened (read-only) \??\K: 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe File opened (read-only) \??\L: 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe File opened (read-only) \??\T: 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe File opened (read-only) \??\V: 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 32 IoCs
pid Process 2908 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 2908 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 2908 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2908 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe Token: SeDebugPrivilege 2908 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe Token: SeDebugPrivilege 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe Token: SeDebugPrivilege 3004 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2908 wrote to memory of 3004 2908 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 26 PID 2908 wrote to memory of 3004 2908 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 26 PID 2908 wrote to memory of 3004 2908 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 26 PID 2908 wrote to memory of 3004 2908 45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe"C:\Users\Admin\AppData\Local\Temp\45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe"C:\Users\Admin\AppData\Local\Temp\45c37f102bd2a51aabdaa5760862f6325f6d5bb3acc7ba607a1a7eb9509aaec0.exe" Admin2⤵
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:3004
-