Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 12:57
Behavioral task
behavioral1
Sample
937cec6ba28d84bab591c410379e993a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
937cec6ba28d84bab591c410379e993a.exe
Resource
win10v2004-20231215-en
General
-
Target
937cec6ba28d84bab591c410379e993a.exe
-
Size
36KB
-
MD5
937cec6ba28d84bab591c410379e993a
-
SHA1
b021453c6667b9b02326112852d2afe84952cbb7
-
SHA256
08e5bc6344f4e5876cb829aac4c431c062fb50e3ffd439e116738e8f11db6474
-
SHA512
66f77c4ab0e65daedc64b0a179bc0cee005706f65192bfb9eb164442c396c07b679414a2746a94a3ffdf4639f1c9038ee345ad75ddc13d209d4c59d1ae28bced
-
SSDEEP
768:X8Q2ZDX3LKew369lp2z3Sd4baFXLjwP/Tgj93b8NIom46+It:s9Z3KcR4mjD9r8226+o
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2476 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2444-3-0x0000000000F10000-0x0000000000F27000-memory.dmp upx behavioral1/memory/2444-8-0x0000000000F10000-0x0000000000F27000-memory.dmp upx behavioral1/files/0x000b000000014313-7.dat upx behavioral1/memory/2476-13-0x0000000000A70000-0x0000000000A87000-memory.dmp upx behavioral1/files/0x000b000000014227-15.dat upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" 937cec6ba28d84bab591c410379e993a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe 937cec6ba28d84bab591c410379e993a.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2444 937cec6ba28d84bab591c410379e993a.exe Token: SeDebugPrivilege 2476 CTS.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2476 2444 937cec6ba28d84bab591c410379e993a.exe 28 PID 2444 wrote to memory of 2476 2444 937cec6ba28d84bab591c410379e993a.exe 28 PID 2444 wrote to memory of 2476 2444 937cec6ba28d84bab591c410379e993a.exe 28 PID 2444 wrote to memory of 2476 2444 937cec6ba28d84bab591c410379e993a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\937cec6ba28d84bab591c410379e993a.exe"C:\Users\Admin\AppData\Local\Temp\937cec6ba28d84bab591c410379e993a.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD59fe1e83b993c1fb4efda04dbc2eed8b0
SHA14495d6e838d72db0d6ec4aa476461ed63da7047e
SHA256dfb1186cab9790b9a1574a816afc3f6a811ddc80297ecf6d155dbc39aa98992a
SHA5124e79eeb82624ec2636abd688f081115923c92e3e7b64df0fc932526456d61f01f47dc50d1d0dfbb74c21b15008c15ce02fe873c8e9b59be1c3a853141f0da36c
-
Filesize
36KB
MD5d23b958b292229b9c4449af4799e5199
SHA14edca4f5650a46b49f38cdc3da76df63be05d00a
SHA256590c7a8236b0a29ae55e001361e3365bcaaeefe732d6061da12175343026e50a
SHA5121e758b59e2b89c8313027d609949eeadc4a40ebe9c27de72bf16be4f0a5e8dafceb787d92e1324f217059bd83363368718d4bbf88841fbb50cd11d3113177c56