Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 03:15
Behavioral task
behavioral1
Sample
024c7585c1e3277b6dc7dab3834a6ea0.exe
Resource
win7-20231215-en
General
-
Target
024c7585c1e3277b6dc7dab3834a6ea0.exe
-
Size
6.6MB
-
MD5
024c7585c1e3277b6dc7dab3834a6ea0
-
SHA1
86509a2c9dfe913df0da4ba83b52204cc8d997cd
-
SHA256
719cdc77bc92f2db975ac8190b2b0b4f6bb5d476cdeb4ced2f7e22a0bf48e471
-
SHA512
c10463bce37d0171b3bd5625155626b5d36a0189d0eec2cce20da3ad556ba92d80d698d7afdc910da832925700ac0a161f6785e7fecb33201ff91722e966b06e
-
SSDEEP
196608:DYkZKDnd9e+q2WWmQNLBBGZlrljNctVUwieq:JZsd9vqZQxBBG5jeTL
Malware Config
Signatures
-
Loads dropped DLL 14 IoCs
pid Process 2836 024c7585c1e3277b6dc7dab3834a6ea0.exe 2836 024c7585c1e3277b6dc7dab3834a6ea0.exe 2836 024c7585c1e3277b6dc7dab3834a6ea0.exe 2836 024c7585c1e3277b6dc7dab3834a6ea0.exe 2836 024c7585c1e3277b6dc7dab3834a6ea0.exe 2836 024c7585c1e3277b6dc7dab3834a6ea0.exe 2836 024c7585c1e3277b6dc7dab3834a6ea0.exe 2836 024c7585c1e3277b6dc7dab3834a6ea0.exe 2836 024c7585c1e3277b6dc7dab3834a6ea0.exe 2836 024c7585c1e3277b6dc7dab3834a6ea0.exe 2836 024c7585c1e3277b6dc7dab3834a6ea0.exe 2836 024c7585c1e3277b6dc7dab3834a6ea0.exe 2836 024c7585c1e3277b6dc7dab3834a6ea0.exe 2836 024c7585c1e3277b6dc7dab3834a6ea0.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org 3 api.ipify.org -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: 35 2836 024c7585c1e3277b6dc7dab3834a6ea0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2836 2756 024c7585c1e3277b6dc7dab3834a6ea0.exe 28 PID 2756 wrote to memory of 2836 2756 024c7585c1e3277b6dc7dab3834a6ea0.exe 28 PID 2756 wrote to memory of 2836 2756 024c7585c1e3277b6dc7dab3834a6ea0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\024c7585c1e3277b6dc7dab3834a6ea0.exe"C:\Users\Admin\AppData\Local\Temp\024c7585c1e3277b6dc7dab3834a6ea0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\024c7585c1e3277b6dc7dab3834a6ea0.exe"C:\Users\Admin\AppData\Local\Temp\024c7585c1e3277b6dc7dab3834a6ea0.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD50e675d4a7a5b7ccd69013386793f68eb
SHA16e5821ddd8fea6681bda4448816f39984a33596b
SHA256bf5ff4603557c9959acec995653d052d9054ad4826df967974efd2f377c723d1
SHA512cae69a90f92936febde67dacd6ce77647cb3b3ed82bb66463cd9047e90723f633aa2fc365489de09fecdc510be15808c183b12e6236b0893af19633f6a670e66
-
Filesize
87KB
MD5429ad9f0d7240a1eb9c108b2d7c1382f
SHA1f54e1c1d31f5dd6698e47750daf48b9291b9ea69
SHA256d2571d3a553ea586fb1e5695dd9745caef9f0e30ac5b876d1307678360674f38
SHA512bae51da3560e0a720d45f0741f9992fe0729ead0112a614dba961c50cd6f82ddbdcf7b47aeda4f1093f6654f6db77d767ccddd59d34d2143df54121e9d486760
-
Filesize
38KB
MD5d61618c28373d7bbdf1dec7ec2b2b1c1
SHA151f4bab84620752aedf7d71dcccb577ed518e9fd
SHA25633c4d06c91166db9ece6e6ad6b9fa1344316f995f7db268bf1b7f9c08ed3e6fb
SHA512ca7ca581c8d8d67f43e7858d7b4859fec1228fd1ba6e63711d508c1ab3477a071d40090fdae6ec0c8d1445e15fbb2fc60154e32e03f8398056388f1148f920de
-
Filesize
251KB
MD55e7a6b749a05dd934ee4471411420053
SHA1fcd1e54011b98928edbb3820a5838568b9573453
SHA2564dcd803319e24ba8c8e3d5ce2e02c209bd14a9ab07a540d6e3ae52f69d01e742
SHA512ce4c5456308adbef0a9d44064aae67b2bb2a913881405ae2e69127eb7ab00a09882fa5304d80d5b3728942b0ab56d1c99132666b6c0ea8809a21396aeaadd8a2
-
Filesize
74KB
MD57c5c5e6e4ed888dd26c7aa063bb9f88e
SHA1a7a3694739b27c3d34beb1a9730fc3dcbae6744a
SHA2562bb4e5d711fe521e2c9a80f04d2f745f58561dc35f169e06ea17aabf27d334fe
SHA5129c49c3fe740464f649a0379bdc6bc474cce6a1331f87d2ba2ab489c4545ad7cb311c757af59e8174bb3c87af438a5d47621bd9b2b4750abe128d189d14d80065
-
Filesize
84KB
MD5553f11c6b37e39b09cfd700815df38c2
SHA1b14916bb054e6503efee63d7b0cfc6e43f5cccfc
SHA25634d101de287a6d1986c9c768ab7839b5cdda0dacd3848481c2aab83e4142b876
SHA512445d0311a70cc1e9387219468359834e9274db978a227a910539316fab505783de246b26b0517baeb14b9656bedc5434f0be3ea881b9c2a8382a4dea4ecb64aa
-
Filesize
120KB
MD5a3c9649e68206c25eff2d09a0bd323f0
SHA10f485f37ac3960da624b80667410061efe1f888d
SHA256b9100db5d225c4103f781a6ea4074ce76387467c3a4bba2ac5bfc65870ab6123
SHA512aeef27bf73cb7dd96b06c3403fc74c108a8a7d80aa25db35a4b1a96b8931aef63b3037a9a51075ead1e5ad1c001d6afe6f3c3e19af30344177fd562751b00d63
-
Filesize
758KB
MD5ae3aa43745fe70445f7d20a14b18b58d
SHA1d5a00866debf8bf15c0ac289dbf9264b53acdd93
SHA2564db3898f339adbb7ec4098c89d8b6edafc09dc12dca1679b2ea1672dade33572
SHA512255d69410eca1ff7962a4c2c1ba563f23bc777ec026e7a153bf780bf41a966c7b9505dbceec30bec93e6a2e0b7ebed9f488b3104ce46a5f30bc9af7fd7d27d66
-
Filesize
253KB
MD53dcd08b803fbb28231e18b5d1eef4258
SHA1b81ea40b943cd8a0c341f3a13e5bc05090b5a72a
SHA256de2fa17c4d8ae68dc204a1b6b58b7a7a12569367cfeb8a3a4e1f377c73e83e9e
SHA5129cc7106e921fbcf8c56745b38051a5a56154c600e3c553f2e64d93ec988c88b17f6d49698bdc18e3aa57ae96a79ee2c08c584c7c4c91cc6ea72db3dca6ccc2f5
-
Filesize
2.4MB
MD58c75bca5ea3bea4d63f52369e3694d01
SHA1a0c0fd3d9e5688d75386094979171dbde2ce583a
SHA2568513e629cd85a984e4a30dfe4b3b7502ab87c8bc920825c11035718cb0211ea0
SHA5126d80d26d91b704d50ff3ad74f76d6b1afe98af3d7a18e43011dbe3809adc305b0e382c10868328eb82c9f8b4c77bca1522bdc023c7c8712057b65f6579c9dff5
-
Filesize
511KB
MD50205c08024bf4bb892b9f31d751531a0
SHA160875676bc6f2494f052769aa7d644ef4a28c5e5
SHA256ebe7ffc7eb0b79e29bfc4e408ea27e9b633584dd7bc8e0b5ffc46af19263844b
SHA51245da0c128bfb706cb0340ad40fbc691696f3483a0235faaac864dea4580b57e36aa5b4b55a60322081d2d2e2df788c550fd43c317582a9b6a2d66712df215bd0
-
Filesize
3.6MB
MD528f9065753cc9436305485567ce894b0
SHA136ebb3188a787b63fb17bd01a847511c7b15e88e
SHA2566f2f87b74aea483a0636fc5c480b294a8103b427a3daf450c1e237c2a2271b1a
SHA512c3bbc50afb4a0b625aff28650befd126481018bd0b1b9a56c107e3792641679c7d1bfc8be6c9d0760fff6853f8f114b62490cd3567b06abc76ab7db3f244ab54
-
Filesize
26KB
MD51650617f3378c5bd469906ae1256a54c
SHA1dd89ffd426b6820fd79631e4c99760cb485d3a67
SHA2565724cea789a2ebc148ce277ce042e27432603db2ec64e80b13d37bcb775aee98
SHA51289ecbbf156e2be066c7d4e3e0ecd08c2704b6a796079517c91cf4aa6682040ba07460596aaddc5550c6ec588979dfec010fed4b87e049000caceed26e8f86ffe
-
Filesize
1.1MB
MD505b940cff93d1f624507a1b0f436dc2f
SHA1ec56591a1d698d592433fe00e3091101c0b3b55b
SHA256496861a700f2879cf8ae710a6e3eedfcefc3ef6f05936ad1ea928aa1c3919abb
SHA5124959a68881882c356c2997458a235da80e0f3f0b9bc9fc739967f5c79d78af41d8c5e9af4f8d6fa772f0bd1d5df0a3057ebf492dcc1fa5fa9488019e60b1babf
-
Filesize
1.0MB
MD52b2156a32b7ef46906517ae49a599c16
SHA1892134a20f118d9326da6c1b98c01f31d771a5d1
SHA2562c5f5abf982e8b4bb5e28d217a5e437907acfb7a7e9ee96cd9fa64c4ba304418
SHA512d6aa25cdfca13db260110b3f34a3d731b325efcaccde5ec36b4f88406841b4ec9c9ab88ad54944eba476772bfd69c3975d9cb1a92994b0ae8e56278353214100
-
Filesize
27KB
MD53f536949d0fcae286b08f6a90d4c5198
SHA104877dff7e8c994e4875a1b85b7388684b97da25
SHA256613c0fc66b1f2f8dccb47f24f1578137a99c5a62550719f0402f13337ad5c60a
SHA512cd59a4a2d839dec513b912e33bd92281a0fdfe0a210ae972cce8b77347e000bb87c8074d8b8cbfeba75158f2b8f3d0669f778fccec0dec936f055616cedbbb4c