Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 03:22
Static task
static1
Behavioral task
behavioral1
Sample
02c03f3d2982ecdd7dde16212b7533bf.exe
Resource
win7-20231215-en
General
-
Target
02c03f3d2982ecdd7dde16212b7533bf.exe
-
Size
1.2MB
-
MD5
02c03f3d2982ecdd7dde16212b7533bf
-
SHA1
9e6f922920775f9a8b36177489a5de3c59c9d21f
-
SHA256
123a2f45b582c82b36c29c054f378f7559cb346a9090de9caf0ebe577f8a1664
-
SHA512
9a843f985e217147b273edc1a06bef58976645a0f7c8ea23609196deb8d3e94e66af09cb7c151dbf9d8e4ec4253f6bb9f7b69a3c1b8fa17fe199c56cbb2291f5
-
SSDEEP
24576:vjQqIWuXi6kgaINVZdkQaAUuEgYdBO+hkmDZs82kOUF4+mfM2neKvYV58QGOjbvo:souXiTcNLefAUvVb3ZLOU+PeKvYV9DmZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4632 tmppack.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3440 02c03f3d2982ecdd7dde16212b7533bf.exe 3440 02c03f3d2982ecdd7dde16212b7533bf.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3440 wrote to memory of 4632 3440 02c03f3d2982ecdd7dde16212b7533bf.exe 77 PID 3440 wrote to memory of 4632 3440 02c03f3d2982ecdd7dde16212b7533bf.exe 77 PID 3440 wrote to memory of 4632 3440 02c03f3d2982ecdd7dde16212b7533bf.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\02c03f3d2982ecdd7dde16212b7533bf.exe"C:\Users\Admin\AppData\Local\Temp\02c03f3d2982ecdd7dde16212b7533bf.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\SWCDAYEUOIN\tmppack.exe-y2⤵
- Executes dropped EXE
PID:4632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5cf6451e42fc3d5cacaab23dfb286e9dd
SHA1320cb0371ed48b15dfd4839d0c2d0a1a1be60e38
SHA2564b25cde8520cb7cdc9b6a50e95b95746ab9233b5c956ff24cdd74a0150eaefc7
SHA512aa40b291a4c40767e802952f892f67304b13199aef27267ab130f9842306dea47d3bde986c5fe7abc67847b89bc937066b79c2a097f7dedd7be6423dbe0d8565
-
Filesize
41KB
MD519cafe521085d306aa66d256bce120c6
SHA1a41ae63f80dc451fb68a34f64aa86867f2cdbd6e
SHA256ce22b3fa0bb7ad842657737c51a287caea2623019fcefbea4906462f49e31894
SHA512936e0ca8f2accfaba11dc190e89ae3d19e2ba0963824e87c24ab7e1cc006cc7232163c90924a1e93abe7d602b64b4b5543544e114d9059ea56b6f28535c8527d
-
Filesize
7KB
MD5668db86f85ca867db6c1171b3c2830e5
SHA145f1459e83c6d1aad99f03f724e4086b51e08e13
SHA2564be63b1a3b61ce143740eb0f1adbe44cda00b8a7a76a068e933fbaf40e91e5b0
SHA5129c290624368c68d31bd2e80a28ecdb7e048a34bb20d2b1d05c7ab8f9179b61ba4a66ba6d43e1833b16a3fea807fb9c3a39659e67ea538a938e612109fcb4e45a
-
Filesize
473KB
MD5a3e6234bd198f6ea0da3a7140f4dae96
SHA164d54e5d34278078a519f9fa23695fc21a0e4f6f
SHA2567beb08b278da8b6cca995989463be42785d3cfefbe5bc307e0950c15ef2c8207
SHA512abacd1c0da0aa36309fd226a0459b9db16874aa49809144a3cb8f80c2123ab954a8de524e499f5a474b394d4de310db32695b6ac36754c2fb14d0223135ca447
-
Filesize
316KB
MD5b1b648cfa849e2292dceb6dc44b368ea
SHA1c734fd9c621de76f239ae5301940f7325d8a72ee
SHA256319af37524c39986671bfeaa22d6e51831f418d02d6995e7309f1dc8cfcf782b
SHA512ae010f695bd4f79fbbd94d090cfff8c20547fe6f175ab034c9f71876a38c385e2deffdb066bb46f558fc7ea5ef6c271ee4c1f3edd1872bd8d9603cb3ac507790
-
Filesize
557KB
MD5445346ce52c4b847b6c84d7ca834f690
SHA11a6af974faa7ddcb37098ddd6b36ab305c44adaf
SHA2569627ae735bc41450897daa8107c648540f5ca1b5de23c3ab0f48897551a53ca2
SHA512b8f4a258523fdbcc3a0f705ecb61d7478003bb2a48eb1615f16bc276e203310a01554b186791d4542ccd7906ad95d3c9d5a27ceb069e650de1f393d6aef0f43e