Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 03:11
Static task
static1
Behavioral task
behavioral1
Sample
021b0cbf226901c3dff865badac14606.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
021b0cbf226901c3dff865badac14606.exe
Resource
win10v2004-20231215-en
General
-
Target
021b0cbf226901c3dff865badac14606.exe
-
Size
121KB
-
MD5
021b0cbf226901c3dff865badac14606
-
SHA1
de36ae59c8f71b7d7391d52ea2343a1f960908ee
-
SHA256
7dfeebeb24919749a64ea866080c81d0ab607b42dd27e28a709cef984265c908
-
SHA512
87354c23fad1d1cccdb028e6e656a18cd9417e7e4fbbe4da1297c200e7710b2f0b2a79073ca42252a27861a3af949cf63ffd1a4497b0a9c6d331035fa44334cc
-
SSDEEP
3072:/o5GoZYquZIPJCr743kerpmYExqHXhT5RnaY8Is7fCVz9VWokC:/oryZICr743keXnHEIqfCz4ok
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\shell.exe" 021b0cbf226901c3dff865badac14606.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2876-7-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2356-2-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2356-13-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2672-11-0x0000000000400000-0x0000000000476000-memory.dmp upx -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2876 2356 021b0cbf226901c3dff865badac14606.exe 18 PID 2356 wrote to memory of 2876 2356 021b0cbf226901c3dff865badac14606.exe 18 PID 2356 wrote to memory of 2876 2356 021b0cbf226901c3dff865badac14606.exe 18 PID 2356 wrote to memory of 2876 2356 021b0cbf226901c3dff865badac14606.exe 18 PID 2356 wrote to memory of 2672 2356 021b0cbf226901c3dff865badac14606.exe 30 PID 2356 wrote to memory of 2672 2356 021b0cbf226901c3dff865badac14606.exe 30 PID 2356 wrote to memory of 2672 2356 021b0cbf226901c3dff865badac14606.exe 30 PID 2356 wrote to memory of 2672 2356 021b0cbf226901c3dff865badac14606.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\021b0cbf226901c3dff865badac14606.exe"C:\Users\Admin\AppData\Local\Temp\021b0cbf226901c3dff865badac14606.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\021b0cbf226901c3dff865badac14606.exeC:\Users\Admin\AppData\Local\Temp\021b0cbf226901c3dff865badac14606.exe startC:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\021b0cbf226901c3dff865badac14606.exeC:\Users\Admin\AppData\Local\Temp\021b0cbf226901c3dff865badac14606.exe startC:\Users\Admin\AppData\Local\Temp\dwm.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
792B
MD5a0c106036303fc521b0e55effa608257
SHA18dece7c63011fc75b3d2694c974c29053df06662
SHA256df43c2385ddb6b2cb1dca9c8bb3a3c22d2bbeaeec7abc7d31fd6451144acbc1a
SHA51220b6540d802de061fe048feebd055f52c1c2a0c25bb06d8bb08bc9310735dc839531af64e7d3d441323f1afac6d830c190112525aa6af880fe9ade7a7ce68e47