Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
23/10/2023, 04:50
Behavioral task
behavioral1
Sample
46eeeb92ae6f5d02ec4fd4104a8b3666407568a0afcb5ded90f6add9dbd94e6e.exe
Resource
win7-20230831-en
7 signatures
300 seconds
General
-
Target
46eeeb92ae6f5d02ec4fd4104a8b3666407568a0afcb5ded90f6add9dbd94e6e.exe
-
Size
4.4MB
-
MD5
0b70a8cb2a2a14f0e3eb10f14456377b
-
SHA1
33b4f2568b86f3b7b33a8e4582fbb65c0a0a595f
-
SHA256
46eeeb92ae6f5d02ec4fd4104a8b3666407568a0afcb5ded90f6add9dbd94e6e
-
SHA512
55501039f953e60c5ec0be2d52a29fbf117ae0238325113df5cc9433456e5fd44420b45bdc108a91c99bd873decfb069c372032d37547693942ad25722d611de
-
SSDEEP
98304:n8+i0yMBXD5V/9NNtoDc0xFl1sLYV4QJP1ogKF:nLYMBz5DtoDcOjubQJNs
Malware Config
Signatures
-
xoCreatorStealer 1 IoCs
xoCreatorStealer.
resource yara_rule behavioral1/memory/1996-1-0x0000000000C20000-0x0000000001ABD000-memory.dmp xocreatorStealer -
Deletes itself 1 IoCs
pid Process 2400 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1996-0-0x0000000000C20000-0x0000000001ABD000-memory.dmp upx behavioral1/memory/1996-1-0x0000000000C20000-0x0000000001ABD000-memory.dmp upx -
Kills process with taskkill 1 IoCs
pid Process 2216 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2216 taskkill.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2216 1996 46eeeb92ae6f5d02ec4fd4104a8b3666407568a0afcb5ded90f6add9dbd94e6e.exe 28 PID 1996 wrote to memory of 2216 1996 46eeeb92ae6f5d02ec4fd4104a8b3666407568a0afcb5ded90f6add9dbd94e6e.exe 28 PID 1996 wrote to memory of 2216 1996 46eeeb92ae6f5d02ec4fd4104a8b3666407568a0afcb5ded90f6add9dbd94e6e.exe 28 PID 1996 wrote to memory of 2400 1996 46eeeb92ae6f5d02ec4fd4104a8b3666407568a0afcb5ded90f6add9dbd94e6e.exe 31 PID 1996 wrote to memory of 2400 1996 46eeeb92ae6f5d02ec4fd4104a8b3666407568a0afcb5ded90f6add9dbd94e6e.exe 31 PID 1996 wrote to memory of 2400 1996 46eeeb92ae6f5d02ec4fd4104a8b3666407568a0afcb5ded90f6add9dbd94e6e.exe 31 PID 2400 wrote to memory of 1148 2400 cmd.exe 33 PID 2400 wrote to memory of 1148 2400 cmd.exe 33 PID 2400 wrote to memory of 1148 2400 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\46eeeb92ae6f5d02ec4fd4104a8b3666407568a0afcb5ded90f6add9dbd94e6e.exe"C:\Users\Admin\AppData\Local\Temp\46eeeb92ae6f5d02ec4fd4104a8b3666407568a0afcb5ded90f6add9dbd94e6e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\system32\taskkill.exetaskkill /im chrome.exe /T /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\46eeeb92ae6f5d02ec4fd4104a8b3666407568a0afcb5ded90f6add9dbd94e6e.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1148
-
-