Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
156s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 21:13
Static task
static1
Behavioral task
behavioral1
Sample
f883df7955bc91ac717fafbfbfb071e4.exe
Resource
win7-20231215-en
General
-
Target
f883df7955bc91ac717fafbfbfb071e4.exe
-
Size
1.2MB
-
MD5
f883df7955bc91ac717fafbfbfb071e4
-
SHA1
c2740074ba90763054db4032925d0828060d6b5e
-
SHA256
790019291f03e723bd5b061142c7511938bacaeb782875a5ddfc91cd9c2ee179
-
SHA512
0caecb5f6ac085e385e7617d4dd1a329819617aa05809c6168f387bf08a1830ea0ad5ea299bedffcb9b4282b3df1e466a7fe4f8a38afff80abd63aea0e8bc71d
-
SSDEEP
24576:Sp6QlVvkMxKht99iIp/puHMWZnaXnxN99uKq5tAVZnY0rUvVDDaE:U6cBkM0riWpuHM2aXxnIBPU8h
Malware Config
Extracted
44caliber
https://discordapp.com/api/webhooks/869534850812637194/fQ9SG1wbGT8eouo6vEUs5wADugNDHDhRWKq5RBk6gLjlDi9xEUaR3leD9AhGscQ-u377
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2480 f883df7955bc91ac717fafbfbfb071e4.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2760 2480 WerFault.exe 15 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2480 f883df7955bc91ac717fafbfbfb071e4.exe 2480 f883df7955bc91ac717fafbfbfb071e4.exe 2480 f883df7955bc91ac717fafbfbfb071e4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2480 f883df7955bc91ac717fafbfbfb071e4.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2480 f883df7955bc91ac717fafbfbfb071e4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2760 2480 f883df7955bc91ac717fafbfbfb071e4.exe 28 PID 2480 wrote to memory of 2760 2480 f883df7955bc91ac717fafbfbfb071e4.exe 28 PID 2480 wrote to memory of 2760 2480 f883df7955bc91ac717fafbfbfb071e4.exe 28 PID 2480 wrote to memory of 2760 2480 f883df7955bc91ac717fafbfbfb071e4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f883df7955bc91ac717fafbfbfb071e4.exe"C:\Users\Admin\AppData\Local\Temp\f883df7955bc91ac717fafbfbfb071e4.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 8922⤵
- Program crash
PID:2760
-