Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
105s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 01:44
Behavioral task
behavioral1
Sample
0f81ae4aea58e4e1b41ecea483aae71f4971cbe8a91c193af1be9f3c61c19745.exe
Resource
win7-20231215-en
General
-
Target
0f81ae4aea58e4e1b41ecea483aae71f4971cbe8a91c193af1be9f3c61c19745.exe
-
Size
389KB
-
MD5
217dabe66334d80f1007999b68998761
-
SHA1
4c8258e225388ca0f7ec4294f30c54fb2aa406c9
-
SHA256
0f81ae4aea58e4e1b41ecea483aae71f4971cbe8a91c193af1be9f3c61c19745
-
SHA512
7115aa7f430e34149f39a04924421421ee7e3c713d8a72ce6f25b9438d5309af26cb5deeb1aee2337ea904e97923618869ff6abfe49a82e06c7680ca436a5089
-
SSDEEP
12288:jvHOmh9159ZWAnMmchmqe2Mpb6pDFJGHWaIAxYMIrvSLi1:rZ15FnvcUqe2Ob6pDyHFIYZIrQY
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2968-0-0x0000000000850000-0x00000000008B1000-memory.dmp upx behavioral1/memory/2968-97-0x0000000000850000-0x00000000008B1000-memory.dmp upx -
Drops file in Program Files directory 6 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\nsi1E3F.tmp setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\nsi1E3E.tmp\ setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\nsi1E3C.tmp setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\nsi1E3D.tmp setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\nsi1E3C.tmp\ setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\nsi1E3E.tmp setup-stub.exe -
Executes dropped EXE 1 IoCs
pid Process 1684 setup-stub.exe -
Loads dropped DLL 6 IoCs
pid Process 2968 0f81ae4aea58e4e1b41ecea483aae71f4971cbe8a91c193af1be9f3c61c19745.exe 1684 setup-stub.exe 1684 setup-stub.exe 1684 setup-stub.exe 1684 setup-stub.exe 1684 setup-stub.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2968 wrote to memory of 1684 2968 0f81ae4aea58e4e1b41ecea483aae71f4971cbe8a91c193af1be9f3c61c19745.exe 14 PID 2968 wrote to memory of 1684 2968 0f81ae4aea58e4e1b41ecea483aae71f4971cbe8a91c193af1be9f3c61c19745.exe 14 PID 2968 wrote to memory of 1684 2968 0f81ae4aea58e4e1b41ecea483aae71f4971cbe8a91c193af1be9f3c61c19745.exe 14 PID 2968 wrote to memory of 1684 2968 0f81ae4aea58e4e1b41ecea483aae71f4971cbe8a91c193af1be9f3c61c19745.exe 14 PID 2968 wrote to memory of 1684 2968 0f81ae4aea58e4e1b41ecea483aae71f4971cbe8a91c193af1be9f3c61c19745.exe 14 PID 2968 wrote to memory of 1684 2968 0f81ae4aea58e4e1b41ecea483aae71f4971cbe8a91c193af1be9f3c61c19745.exe 14 PID 2968 wrote to memory of 1684 2968 0f81ae4aea58e4e1b41ecea483aae71f4971cbe8a91c193af1be9f3c61c19745.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\7zS89BD9336\setup-stub.exe.\setup-stub.exe1⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
PID:1684
-
C:\Users\Admin\AppData\Local\Temp\0f81ae4aea58e4e1b41ecea483aae71f4971cbe8a91c193af1be9f3c61c19745.exe"C:\Users\Admin\AppData\Local\Temp\0f81ae4aea58e4e1b41ecea483aae71f4971cbe8a91c193af1be9f3c61c19745.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2968