Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
178s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 11:11
Static task
static1
Behavioral task
behavioral1
Sample
19d1d56adede8ee4ce5280ad55f49e08.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
19d1d56adede8ee4ce5280ad55f49e08.exe
Resource
win10v2004-20231215-en
General
-
Target
19d1d56adede8ee4ce5280ad55f49e08.exe
-
Size
4.2MB
-
MD5
19d1d56adede8ee4ce5280ad55f49e08
-
SHA1
4cef5bd9a3d360f02c8d75a2fe89523b43b29f4f
-
SHA256
6afa48f9297d2cad590bfb3ac58cbd8337e9ece284fa387fbce658551fa588c5
-
SHA512
765a8666908e4aa445d96f7a365f070b574e68b57e6e3b2c21aca70178193307f37d3193721c3a7517b1068e5602553dcf84ea68640f2171ea95ec002e164caf
-
SSDEEP
24576:Qaf8wY3ebaG0cmKcQJxltGzmdngB8OuyruoHlIZWLJtHZoJCsEr4dS:QaKOwcowT/omyJtHZoJCsU
Malware Config
Signatures
-
NirSoft MailPassView 3 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/2604-42-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/2604-43-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/2604-46-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView -
Nirsoft 23 IoCs
resource yara_rule behavioral1/memory/3024-25-0x0000000000400000-0x0000000000418000-memory.dmp Nirsoft behavioral1/memory/3024-28-0x0000000000400000-0x0000000000418000-memory.dmp Nirsoft behavioral1/memory/2232-35-0x0000000000400000-0x0000000000425000-memory.dmp Nirsoft behavioral1/memory/2232-34-0x0000000000400000-0x0000000000425000-memory.dmp Nirsoft behavioral1/memory/2232-37-0x0000000000400000-0x0000000000425000-memory.dmp Nirsoft behavioral1/memory/2604-42-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/2604-43-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/2604-46-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/2596-50-0x0000000000400000-0x0000000000418000-memory.dmp Nirsoft behavioral1/memory/2596-51-0x0000000000400000-0x0000000000418000-memory.dmp Nirsoft behavioral1/memory/2596-54-0x0000000000400000-0x0000000000418000-memory.dmp Nirsoft behavioral1/memory/1724-59-0x0000000000400000-0x000000000043E000-memory.dmp Nirsoft behavioral1/memory/1724-62-0x0000000000400000-0x000000000043E000-memory.dmp Nirsoft behavioral1/memory/1724-61-0x0000000000400000-0x000000000043E000-memory.dmp Nirsoft behavioral1/memory/2228-67-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/2228-68-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/548-71-0x0000000000400000-0x0000000000410000-memory.dmp Nirsoft behavioral1/memory/548-73-0x0000000000400000-0x0000000000410000-memory.dmp Nirsoft behavioral1/memory/2228-70-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/548-74-0x0000000000400000-0x0000000000410000-memory.dmp Nirsoft behavioral1/memory/988-80-0x0000000000400000-0x0000000000419000-memory.dmp Nirsoft behavioral1/memory/988-83-0x0000000000400000-0x0000000000419000-memory.dmp Nirsoft behavioral1/memory/548-76-0x0000000000400000-0x0000000000410000-memory.dmp Nirsoft -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2388-14-0x0000000000400000-0x00000000005E7000-memory.dmp upx behavioral1/memory/2388-15-0x0000000000400000-0x00000000005E7000-memory.dmp upx behavioral1/memory/2388-16-0x0000000000400000-0x00000000005E7000-memory.dmp upx behavioral1/memory/2388-18-0x0000000000400000-0x00000000005E7000-memory.dmp upx behavioral1/memory/3024-21-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/3024-25-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/3024-24-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/3024-23-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/2232-31-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2232-33-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/3024-28-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/2232-35-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2232-34-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2232-37-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2604-38-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2604-40-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2604-42-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2604-43-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2388-44-0x0000000000400000-0x00000000005E7000-memory.dmp upx behavioral1/memory/2604-46-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2596-47-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/2596-49-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/2596-50-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/2596-51-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/2596-54-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/1724-56-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/1724-59-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/1724-58-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/1724-62-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/1724-61-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/2228-64-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2228-66-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2228-67-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2228-68-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2228-70-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/988-80-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral1/memory/988-83-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral1/memory/988-79-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral1/memory/988-77-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral1/memory/2388-85-0x0000000000400000-0x00000000005E7000-memory.dmp upx -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 19d1d56adede8ee4ce5280ad55f49e08.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 2288 set thread context of 2388 2288 19d1d56adede8ee4ce5280ad55f49e08.exe 28 PID 2388 set thread context of 3024 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 29 PID 2388 set thread context of 2232 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 30 PID 2388 set thread context of 2604 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 31 PID 2388 set thread context of 2596 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 32 PID 2388 set thread context of 1724 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 33 PID 2388 set thread context of 2228 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 34 PID 2388 set thread context of 548 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 35 PID 2388 set thread context of 988 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 36 -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2232 19d1d56adede8ee4ce5280ad55f49e08.exe Token: SeDebugPrivilege 2228 19d1d56adede8ee4ce5280ad55f49e08.exe Token: SeRestorePrivilege 2228 19d1d56adede8ee4ce5280ad55f49e08.exe Token: SeBackupPrivilege 2228 19d1d56adede8ee4ce5280ad55f49e08.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2388 19d1d56adede8ee4ce5280ad55f49e08.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2388 2288 19d1d56adede8ee4ce5280ad55f49e08.exe 28 PID 2288 wrote to memory of 2388 2288 19d1d56adede8ee4ce5280ad55f49e08.exe 28 PID 2288 wrote to memory of 2388 2288 19d1d56adede8ee4ce5280ad55f49e08.exe 28 PID 2288 wrote to memory of 2388 2288 19d1d56adede8ee4ce5280ad55f49e08.exe 28 PID 2288 wrote to memory of 2388 2288 19d1d56adede8ee4ce5280ad55f49e08.exe 28 PID 2288 wrote to memory of 2388 2288 19d1d56adede8ee4ce5280ad55f49e08.exe 28 PID 2288 wrote to memory of 2388 2288 19d1d56adede8ee4ce5280ad55f49e08.exe 28 PID 2288 wrote to memory of 2388 2288 19d1d56adede8ee4ce5280ad55f49e08.exe 28 PID 2388 wrote to memory of 3024 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 29 PID 2388 wrote to memory of 3024 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 29 PID 2388 wrote to memory of 3024 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 29 PID 2388 wrote to memory of 3024 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 29 PID 2388 wrote to memory of 3024 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 29 PID 2388 wrote to memory of 3024 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 29 PID 2388 wrote to memory of 3024 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 29 PID 2388 wrote to memory of 3024 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 29 PID 2388 wrote to memory of 3024 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 29 PID 2388 wrote to memory of 2232 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 30 PID 2388 wrote to memory of 2232 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 30 PID 2388 wrote to memory of 2232 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 30 PID 2388 wrote to memory of 2232 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 30 PID 2388 wrote to memory of 2232 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 30 PID 2388 wrote to memory of 2232 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 30 PID 2388 wrote to memory of 2232 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 30 PID 2388 wrote to memory of 2232 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 30 PID 2388 wrote to memory of 2232 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 30 PID 2388 wrote to memory of 2604 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 31 PID 2388 wrote to memory of 2604 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 31 PID 2388 wrote to memory of 2604 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 31 PID 2388 wrote to memory of 2604 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 31 PID 2388 wrote to memory of 2604 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 31 PID 2388 wrote to memory of 2604 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 31 PID 2388 wrote to memory of 2604 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 31 PID 2388 wrote to memory of 2604 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 31 PID 2388 wrote to memory of 2604 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 31 PID 2388 wrote to memory of 2596 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 32 PID 2388 wrote to memory of 2596 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 32 PID 2388 wrote to memory of 2596 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 32 PID 2388 wrote to memory of 2596 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 32 PID 2388 wrote to memory of 2596 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 32 PID 2388 wrote to memory of 2596 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 32 PID 2388 wrote to memory of 2596 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 32 PID 2388 wrote to memory of 2596 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 32 PID 2388 wrote to memory of 2596 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 32 PID 2388 wrote to memory of 1724 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 33 PID 2388 wrote to memory of 1724 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 33 PID 2388 wrote to memory of 1724 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 33 PID 2388 wrote to memory of 1724 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 33 PID 2388 wrote to memory of 1724 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 33 PID 2388 wrote to memory of 1724 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 33 PID 2388 wrote to memory of 1724 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 33 PID 2388 wrote to memory of 1724 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 33 PID 2388 wrote to memory of 1724 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 33 PID 2388 wrote to memory of 2228 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 34 PID 2388 wrote to memory of 2228 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 34 PID 2388 wrote to memory of 2228 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 34 PID 2388 wrote to memory of 2228 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 34 PID 2388 wrote to memory of 2228 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 34 PID 2388 wrote to memory of 2228 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 34 PID 2388 wrote to memory of 2228 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 34 PID 2388 wrote to memory of 2228 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 34 PID 2388 wrote to memory of 2228 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 34 PID 2388 wrote to memory of 548 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 35 PID 2388 wrote to memory of 548 2388 19d1d56adede8ee4ce5280ad55f49e08.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\19d1d56adede8ee4ce5280ad55f49e08.exe"C:\Users\Admin\AppData\Local\Temp\19d1d56adede8ee4ce5280ad55f49e08.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\19d1d56adede8ee4ce5280ad55f49e08.exe"C:\Users\Admin\AppData\Local\Temp\19d1d56adede8ee4ce5280ad55f49e08.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\19d1d56adede8ee4ce5280ad55f49e08.exe/stext "C:\Users\Admin\AppData\Local\Temp\offc.dat"3⤵PID:3024
-
-
C:\Users\Admin\AppData\Local\Temp\19d1d56adede8ee4ce5280ad55f49e08.exe/stext "C:\Users\Admin\AppData\Local\Temp\mess.dat"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
-
C:\Users\Admin\AppData\Local\Temp\19d1d56adede8ee4ce5280ad55f49e08.exe/stext "C:\Users\Admin\AppData\Local\Temp\mail.dat"3⤵
- Accesses Microsoft Outlook accounts
PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\19d1d56adede8ee4ce5280ad55f49e08.exe/stext "C:\Users\Admin\AppData\Local\Temp\dial.dat"3⤵PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\19d1d56adede8ee4ce5280ad55f49e08.exe/stext "C:\Users\Admin\AppData\Local\Temp\chro.dat"3⤵PID:1724
-
-
C:\Users\Admin\AppData\Local\Temp\19d1d56adede8ee4ce5280ad55f49e08.exe/stext "C:\Users\Admin\AppData\Local\Temp\iexp.dat"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
C:\Users\Admin\AppData\Local\Temp\19d1d56adede8ee4ce5280ad55f49e08.exe/stext "C:\Users\Admin\AppData\Local\Temp\ptsg.dat"3⤵PID:548
-
-
C:\Users\Admin\AppData\Local\Temp\19d1d56adede8ee4ce5280ad55f49e08.exe/stext "C:\Users\Admin\AppData\Local\Temp\ffox.dat"3⤵PID:988
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
1KB
MD550658aba8cd14b2d778afa9076f198be
SHA1cb08d884e94986c7ccb381d5feb36b54509a13f4
SHA25622a372d142251b8856672a9083b9c80d1892ae87b5fa225c920ba92989ff4d96
SHA5125c68dd75876c7d69f5231acbb2d97cce6f22f713b75686a248405446e77af103d03e808db618733717ea55bf87d01f12ca7efebddc1a4c7f8652ad95a4e4a937