Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

01/11/2023, 20:57

231101-zryfwadb3s 8

01/11/2023, 20:12

231101-yy98kscg5v 8

31/10/2023, 21:03

231031-zv82sadf91 8

31/10/2023, 18:05

231031-wpb83seb57 8

31/10/2023, 17:13

231031-vrlpvsdf34 8

31/10/2023, 16:52

231031-vdrc7add26 8

Analysis

  • max time kernel
    362s
  • max time network
    366s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    31/10/2023, 18:05

General

  • Target

    40417e937cd244b2f928150cae6fa0eff5551fdb401ea072f6ecdda67a747e17.exe

  • Size

    203KB

  • MD5

    e26bba0304f14ef96beb60376791d32c

  • SHA1

    24f6785ca2e82d1d1d61f4cb01d5e753f80445cf

  • SHA256

    40417e937cd244b2f928150cae6fa0eff5551fdb401ea072f6ecdda67a747e17

  • SHA512

    f38c594c10ec95a1b0cb3acdb1e920d8343728aa34641d773d4f7fb391cf2d6bb7d11264496b9792c7aec551ce4b1b74bbb78b1a787e6d667824fb18f988d93a

  • SSDEEP

    3072:7uoYEB8lWYjmGlCcrwMuWSiVuFbJj65dVi/gTXouvCFH:73V+hjm6Ccrpu+iB/gTY+CF

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 53 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\40417e937cd244b2f928150cae6fa0eff5551fdb401ea072f6ecdda67a747e17.exe
    "C:\Users\Admin\AppData\Local\Temp\40417e937cd244b2f928150cae6fa0eff5551fdb401ea072f6ecdda67a747e17.exe"
    1⤵
    • Drops startup file
    • Drops desktop.ini file(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3064
    • C:\Windows\system32\cmd.exe
      cmd.exe /c vssadmin delete shadows /quIet /all
      2⤵
        PID:1216
      • C:\Windows\system32\cmd.exe
        cmd.exe /c wmic shadowcopy delete
        2⤵
          PID:2404
        • C:\Windows\system32\cmd.exe
          cmd.exe /c bcdedit /set {default} recoveryenabled no
          2⤵
            PID:2768
          • C:\Windows\system32\cmd.exe
            cmd.exe / c bcdedit / set {default} bootstatuspolicy ignoreallfailures
            2⤵
              PID:2800

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads