Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
157s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 02:39
Static task
static1
Behavioral task
behavioral1
Sample
00752627e0866f2f590aceca6298bab0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
00752627e0866f2f590aceca6298bab0.exe
Resource
win10v2004-20231215-en
General
-
Target
00752627e0866f2f590aceca6298bab0.exe
-
Size
118KB
-
MD5
00752627e0866f2f590aceca6298bab0
-
SHA1
007da1ca04ff88ecff5548df363b332b4d15c7bc
-
SHA256
9d71d494c98bcea9b4ded922d3876f8780fa4b927c88a9b781e327a8dadb27a1
-
SHA512
abcb44d1b9ced1cff0ba025f5722d0447cf34600788d15dcddccf0353991ff15252e6809f8ab36f4ebb321e8bc79203b6f0764516ebf968ebfa4cb47a05adce2
-
SSDEEP
3072:GvT/DTOjEoaYQGsXbUT1yGmjkMrVtk30e1xREo:oTrTOx1QGMIyy30
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2916-2-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2656-3-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2916-7-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2776-9-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2916-159-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2656 2916 00752627e0866f2f590aceca6298bab0.exe 28 PID 2916 wrote to memory of 2656 2916 00752627e0866f2f590aceca6298bab0.exe 28 PID 2916 wrote to memory of 2656 2916 00752627e0866f2f590aceca6298bab0.exe 28 PID 2916 wrote to memory of 2656 2916 00752627e0866f2f590aceca6298bab0.exe 28 PID 2916 wrote to memory of 2776 2916 00752627e0866f2f590aceca6298bab0.exe 32 PID 2916 wrote to memory of 2776 2916 00752627e0866f2f590aceca6298bab0.exe 32 PID 2916 wrote to memory of 2776 2916 00752627e0866f2f590aceca6298bab0.exe 32 PID 2916 wrote to memory of 2776 2916 00752627e0866f2f590aceca6298bab0.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\00752627e0866f2f590aceca6298bab0.exe"C:\Users\Admin\AppData\Local\Temp\00752627e0866f2f590aceca6298bab0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\00752627e0866f2f590aceca6298bab0.exeC:\Users\Admin\AppData\Local\Temp\00752627e0866f2f590aceca6298bab0.exe startC:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:2656
-
-
C:\Users\Admin\AppData\Local\Temp\00752627e0866f2f590aceca6298bab0.exeC:\Users\Admin\AppData\Local\Temp\00752627e0866f2f590aceca6298bab0.exe startC:\Users\Admin\AppData\Roaming\Microsoft\Windows\shell.exe%C:\Users\Admin\AppData\Roaming\Microsoft\Windows2⤵PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396B
MD545d70145bfeb65beb7e6546f47d264a4
SHA1f241e4626e521eb797a3b970d88d3263f4543b3e
SHA2565af6df223354fa81feb85ba2ad63b25c525530cabee9de73d7f2a4560bdd9ad2
SHA5125038d08f9c591cbdc0e92bce612181acf301f5e2e5aa8f1f3f479da31afd42a59886319c4e5dd6841874b4dda7f6adcdd8d3b007f41a49df43f03ddd7c9ce1e3
-
Filesize
792B
MD58db803c7e80eedfdb9b1cf152b1db9b1
SHA1ef976fbdc5324128d371c51136879e1df0b044a0
SHA25682248a5f9c43567adcf31a4cdbdc2fe40f9d14d4e9e24e52e2d67bd91d8cf2cd
SHA512874357cca88a44e100613be5bcb7e702741cc8c326cbf89473c0af72d602c56278d0e29a0a661bc4c98580b17a7a5166ca14daa850afa78ca26de9551e0fbb14
-
Filesize
1KB
MD5ed962029936774dd909334030ff7a7ff
SHA1780db8932ccceb8671ad132dd3816e5bd8b11bd1
SHA256e5591b933d7cf8494e233b7664ecaa4a0d152b507e69b3fcb42734674db4e8e3
SHA5122d0ebbae8147e7e6649f5ce7b23c01807c17aedc6ecf94404761ceda88037388e8f01307df74477034223042cde4f75294f36267fc2864dc38be22637282f043