Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 09:20
Static task
static1
Behavioral task
behavioral1
Sample
1433214838524ccdac23a9139c169cdd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1433214838524ccdac23a9139c169cdd.exe
Resource
win10v2004-20231222-en
General
-
Target
1433214838524ccdac23a9139c169cdd.exe
-
Size
156KB
-
MD5
1433214838524ccdac23a9139c169cdd
-
SHA1
7831f5c8e05d233f29456a48d8690c7e49f77f23
-
SHA256
e8d7eb1532d41c0b920a8c3d01bff63f23619c4e04a80de22ba27f7b18437fb8
-
SHA512
2ccc394896f398e5ff111591428ec1ec74352094e3933895deeacb651c1960a71b8ffbcac2ec072bb3a5887b4a4328ecdac63f0e6f69b71cc4a26cdffa3f5284
-
SSDEEP
3072:GLXTYjj9L4obnXm/j/Dq03eYeUB1GQE3pxBnAsudd639SvO3t5:WX8aaXm/7Dq2pBjE3pzwdsaOH
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1812-7-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2240-77-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/3056-86-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2240-88-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2240-90-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2240-161-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/3056-162-0x0000000000570000-0x0000000000670000-memory.dmp upx behavioral1/memory/2240-163-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2240-165-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2240-194-0x0000000000400000-0x0000000000442000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" 1433214838524ccdac23a9139c169cdd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1812 2240 1433214838524ccdac23a9139c169cdd.exe 28 PID 2240 wrote to memory of 1812 2240 1433214838524ccdac23a9139c169cdd.exe 28 PID 2240 wrote to memory of 1812 2240 1433214838524ccdac23a9139c169cdd.exe 28 PID 2240 wrote to memory of 1812 2240 1433214838524ccdac23a9139c169cdd.exe 28 PID 2240 wrote to memory of 3056 2240 1433214838524ccdac23a9139c169cdd.exe 30 PID 2240 wrote to memory of 3056 2240 1433214838524ccdac23a9139c169cdd.exe 30 PID 2240 wrote to memory of 3056 2240 1433214838524ccdac23a9139c169cdd.exe 30 PID 2240 wrote to memory of 3056 2240 1433214838524ccdac23a9139c169cdd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1433214838524ccdac23a9139c169cdd.exe"C:\Users\Admin\AppData\Local\Temp\1433214838524ccdac23a9139c169cdd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\1433214838524ccdac23a9139c169cdd.exeC:\Users\Admin\AppData\Local\Temp\1433214838524ccdac23a9139c169cdd.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:1812
-
-
C:\Users\Admin\AppData\Local\Temp\1433214838524ccdac23a9139c169cdd.exeC:\Users\Admin\AppData\Local\Temp\1433214838524ccdac23a9139c169cdd.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
297B
MD5391a2842117881efb91731c1c45cf493
SHA1c829cd607f96f8f852d468c9441467028d542859
SHA256683e08b405ad9e70ef4552b141309c3a927e1f403b7f222f8e93b25d88c56347
SHA5128de0b711c77bb2e0626c4cbe8ab9e8ee5a2d03f198367c7a316f13718e4c8b1cf6c6a3089e940ee4f9ca2470e996df88bdcf088cead4f1ed186e7e580be5fa34
-
Filesize
897B
MD5a76bace9aad8a2f4d8f6a58f8e1d47de
SHA1b6b9a445169c2c5ad96c01d5f483868cfdbb37b4
SHA25678b461ef05e3145cd632da36bdbb132e04383db8f53d6e9b3c677c6e93dc376b
SHA512efd071f16c13ddc359e3cdf951dd4acbd103b9e6811564048f23e3f7d18601e95db4b05d18f851074cf7b968b4ac2f9bb8e3d73152cb152ba975b278e880fd40
-
Filesize
1KB
MD536ac6881106c1f5d7759b835234d8916
SHA117e7cabbdbed448f60424a90d70b06ebe797f86e
SHA2562b869ef235db6a0226b98cbfd6c328a1ddc8eb78f27356a98496eb6300ff5c08
SHA512414050386249ec14a9a58ced63fea5fee25ef9907177b36acb6947e1a45d99818d726d9aac73334a0b79ead79b129540ea2f695833bd4868ca1900a17b432799