Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    23/11/2023, 12:14

General

  • Target

    a2dcec21960e32bc4383f36d028e6bff32124885ef44f859a205ea6d82bf032f.exe

  • Size

    1.1MB

  • MD5

    db1c8043dca75f50b4589b2ee68d7eaf

  • SHA1

    ab089a8ad244b33cca1c5b48e67e5e7d87f6aa49

  • SHA256

    a2dcec21960e32bc4383f36d028e6bff32124885ef44f859a205ea6d82bf032f

  • SHA512

    bddf87d023c01c8bc445d5ed4b7d7fbb33f7e616c08f67049bb93a5e6053a3aff1018d410a5ece2c7d56862c73c1e14f040e19e618e3819d5c63256fa21c56a1

  • SSDEEP

    24576:vq1kYgbWSenN7ueOP6OXYK5097OLp8mUMS/lphj4coCPHbRYLgD:k2uN7uzPLd8mUz/lXUcoSuy

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2dcec21960e32bc4383f36d028e6bff32124885ef44f859a205ea6d82bf032f.exe
    "C:\Users\Admin\AppData\Local\Temp\a2dcec21960e32bc4383f36d028e6bff32124885ef44f859a205ea6d82bf032f.exe"
    1⤵
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\CyberLink\CBE\D8D760AC-ACA2-493e-9623-61E9D47DE89C\a2dcec21960e32bc4383f36d028e6bff32124885ef44f859a205ea6d82bf032f.exe_v2\UNO.ini

    Filesize

    7B

    MD5

    be9d6efbd8632e482c64618f00a701fa

    SHA1

    cc7c0702a34305282ba77d4eb88db1fa0bbed850

    SHA256

    d94fd0c7e43df0a03014a44d79653c0845adb29e6222ca47718c46af90847b84

    SHA512

    c59eee3a838ec35f447c28a701289f3f35ea5ec08d0c38df54482b39a2219598074d49fc162b1ef46d9e20c336221f53bc86de7163183193001b466ff36dd5c8

  • C:\ProgramData\CyberLink\CBE\D8D760AC-ACA2-493e-9623-61E9D47DE89C\a2dcec21960e32bc4383f36d028e6bff32124885ef44f859a205ea6d82bf032f.exe_v2\cf760247-4483-4bae-9f95-009fe5219808.json

    Filesize

    891B

    MD5

    2bf14e99e5d737fcf80c59367308f373

    SHA1

    3cf8bba43e787c183125b38e62fc0c20bc7afcf0

    SHA256

    b266195678ef746e83c84e276e9d7ae8b9f95dc8e0be1569d7d9eefa8944dc55

    SHA512

    bd636aff52a92f195c508635135c2a87489984018ac026b240b00aff9d1395c77222ccf2cd5809c7f385195897b2712c7bf4198f9758c2232378b0d108db8703

  • C:\Users\Admin\AppData\Local\Temp\aca4a293-5c39-4231-9a14-a1b5c712e037.json

    Filesize

    2B

    MD5

    99914b932bd37a50b983c5e7c90ae93b

    SHA1

    bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

    SHA256

    44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

    SHA512

    27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd