Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 18:39

General

  • Target

    351cd13225c4058ad6bd276481954841.exe

  • Size

    556KB

  • MD5

    351cd13225c4058ad6bd276481954841

  • SHA1

    3c3da47651ea3a0024a3eafd17c5d0ab52ac0b7b

  • SHA256

    8e123b3b7ef8e4b1be8813030cdba044ebe62bed12d388651bd462a68f7dc1a0

  • SHA512

    267dfc289d7bac4dd8b1f0ef1f295c26a467350760007ab0bb3eb6e3ca27e7ec8b372f3ac68ec0cb32ceb0eedf0e96ee1746229a8010f933c38cc74571ec7b52

  • SSDEEP

    12288:qJJogLJ/lht9Yr2Jt47VZRg8bN2+vgKRWZINQdqvM8MSGxA:oJjd7ysglgCN2+4KQZVdqnMSGxA

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\351cd13225c4058ad6bd276481954841.exe
    "C:\Users\Admin\AppData\Local\Temp\351cd13225c4058ad6bd276481954841.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2612
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\249.bat
      2⤵
        PID:2820

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\249.bat

      Filesize

      175B

      MD5

      981372e6f0dea3df0be4e71c0f21f5da

      SHA1

      bd0f6ebb237278f7b74e28ed248e52153c612f0c

      SHA256

      243b94232ee4274a0566eebf14ffa748ddeab915d8e9233ebe0cd35d27e4a408

      SHA512

      ac919a63944d8691f970aba32f9e26dcfbbb33751db2f4b0a2461227ac1b19096425f9fa4cbba733a992e78c30e30a2e3fc72f955482e00222f941779819e76a

    • C:\Users\Admin\AppData\Local\Temp\63413.exe

      Filesize

      556KB

      MD5

      351cd13225c4058ad6bd276481954841

      SHA1

      3c3da47651ea3a0024a3eafd17c5d0ab52ac0b7b

      SHA256

      8e123b3b7ef8e4b1be8813030cdba044ebe62bed12d388651bd462a68f7dc1a0

      SHA512

      267dfc289d7bac4dd8b1f0ef1f295c26a467350760007ab0bb3eb6e3ca27e7ec8b372f3ac68ec0cb32ceb0eedf0e96ee1746229a8010f933c38cc74571ec7b52

    • memory/2612-0-0x0000000010000000-0x0000000010128000-memory.dmp

      Filesize

      1.2MB