Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 18:51 UTC

General

  • Target

    35c69ab07ba4fd97cb23a0351d7293b6.exe

  • Size

    1.0MB

  • MD5

    35c69ab07ba4fd97cb23a0351d7293b6

  • SHA1

    65c3a14d30364f80ebda6cd1b83c6f9633291c35

  • SHA256

    f6d38b7dda48f70fabd8cf49cfb5191ef8bb4f351629c06ec102630d852da81c

  • SHA512

    072d19611df7a7807a4edff57befe8568132925b493cc7484684b59ef7cee31649eca13adafd3023f0a444241af6e571325880760b534990dfbac6a71bba1a70

  • SSDEEP

    24576:GE6pfUKdYS7gd1OAWUN3YWpLfoYZc4Up3GR6reDPdNyE:GE6pfUHSM1Oz20Gc+TdN

Malware Config

Signatures

  • Detects Echelon Stealer payload 2 IoCs
  • Echelon

    Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35c69ab07ba4fd97cb23a0351d7293b6.exe
    "C:\Users\Admin\AppData\Local\Temp\35c69ab07ba4fd97cb23a0351d7293b6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Users\Admin\AppData\Local\Temp\Crypt.exe
      "C:\Users\Admin\AppData\Local\Temp\Crypt.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3024
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 3024 -s 1232
        3⤵
          PID:1128

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Crypt.exe

      Filesize

      1.0MB

      MD5

      0088abee944713ab183c41f3a2b07ea8

      SHA1

      ea027d6de4b2feebfb35b4ebde88cdaab6d6e744

      SHA256

      8ce4be0ab67c82e4f9023bbea4228430e56ef9ac133d377d75ecf2be75045111

      SHA512

      98c88b5f4d4b30f922fbd219da691842649e7aa39eeac65a8b21ad0bdd9437ace260bdf744910690b3d004fda16f1f267f78c307741526e8ba6bde3558f4c64d

    • memory/1444-12-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

      Filesize

      9.9MB

    • memory/1444-3-0x0000000000140000-0x0000000000150000-memory.dmp

      Filesize

      64KB

    • memory/1444-2-0x0000000000140000-0x0000000000150000-memory.dmp

      Filesize

      64KB

    • memory/1444-4-0x000000001A8A0000-0x000000001A920000-memory.dmp

      Filesize

      512KB

    • memory/1444-1-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

      Filesize

      9.9MB

    • memory/1444-0-0x00000000002F0000-0x00000000004F0000-memory.dmp

      Filesize

      2.0MB

    • memory/3024-11-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

      Filesize

      9.9MB

    • memory/3024-10-0x0000000001220000-0x00000000013E6000-memory.dmp

      Filesize

      1.8MB

    • memory/3024-13-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/3024-14-0x000000001B640000-0x000000001B6C0000-memory.dmp

      Filesize

      512KB

    • memory/3024-15-0x00000000004C0000-0x0000000000536000-memory.dmp

      Filesize

      472KB

    • memory/3024-19-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

      Filesize

      9.9MB

    • memory/3024-35-0x000000001B640000-0x000000001B6C0000-memory.dmp

      Filesize

      512KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.