Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 04:38
Static task
static1
Behavioral task
behavioral1
Sample
0ebefc9744bef5d707e1dfd9d30bfd95.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0ebefc9744bef5d707e1dfd9d30bfd95.exe
Resource
win10v2004-20231222-en
General
-
Target
0ebefc9744bef5d707e1dfd9d30bfd95.exe
-
Size
216KB
-
MD5
0ebefc9744bef5d707e1dfd9d30bfd95
-
SHA1
ee869c40160ecd1e92a0e9b7f95b15f4c45e3e01
-
SHA256
cfe90e9b4dd78483cf11b9f68e978907f1bf5602e73e0fd3368340d409d4310e
-
SHA512
9737128af00fa418410c30ff4753290b1e021344710ee802fba2ce5b189b06f6808d680e4e6bbad0ac5ccebabee33db42f1eeb5d0f4f0510708fdb004854747f
-
SSDEEP
6144:5WmY0snba+a6uxpc89pKf/Yt69v4ytGmc:5WmzsUxi4KfSuv4qGmc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2780 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2068-1-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/2068-2-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/2068-4-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/2068-5-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/2068-6-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/2068-8-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/2068-9-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/2068-10-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/2068-11-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/2068-13-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/2068-14-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/2068-15-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/2068-19-0x0000000000400000-0x000000000049F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\WSYSS = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0ebefc9744bef5d707e1dfd9d30bfd95.exe /cs:1 " 0ebefc9744bef5d707e1dfd9d30bfd95.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\WSYSS = "\"C:\\ProgramData\\9cb25d9\\WinSysSuite.exe\" /s" 0ebefc9744bef5d707e1dfd9d30bfd95.exe -
Checks for any installed AV software in registry 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Eset\Nod\ 0ebefc9744bef5d707e1dfd9d30bfd95.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2852 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2852 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2852 2068 0ebefc9744bef5d707e1dfd9d30bfd95.exe 28 PID 2068 wrote to memory of 2852 2068 0ebefc9744bef5d707e1dfd9d30bfd95.exe 28 PID 2068 wrote to memory of 2852 2068 0ebefc9744bef5d707e1dfd9d30bfd95.exe 28 PID 2068 wrote to memory of 2852 2068 0ebefc9744bef5d707e1dfd9d30bfd95.exe 28 PID 2068 wrote to memory of 2780 2068 0ebefc9744bef5d707e1dfd9d30bfd95.exe 35 PID 2068 wrote to memory of 2780 2068 0ebefc9744bef5d707e1dfd9d30bfd95.exe 35 PID 2068 wrote to memory of 2780 2068 0ebefc9744bef5d707e1dfd9d30bfd95.exe 35 PID 2068 wrote to memory of 2780 2068 0ebefc9744bef5d707e1dfd9d30bfd95.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ebefc9744bef5d707e1dfd9d30bfd95.exe"C:\Users\Admin\AppData\Local\Temp\0ebefc9744bef5d707e1dfd9d30bfd95.exe"1⤵
- Adds Run key to start application
- Checks for any installed AV software in registry
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /F /IM MSASCui* /IM avg* /IM ash* /IM McSA*2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\del.bat" >> NUL2⤵
- Deletes itself
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
183B
MD5b54b202cac79ac3d446cbe206760d715
SHA18eea707656f85636f52a1da27a8d5663bf281c96
SHA2567679ba8f6052542010671670cbe73c469c318942b26be220015ccfd18f26c9c3
SHA51211029137f6aa32ba95adf9b614b0012546811cd9dc4d6662f2264787c83eb105a604b1a0e8bca86661f911657cdd5d8d574146174e3b34d57b53aa6a5451407b