Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 01:16
Static task
static1
Behavioral task
behavioral1
Sample
22af06c40a6972c3d05acfbf88736807.exe
Resource
win7-20231215-en
General
-
Target
22af06c40a6972c3d05acfbf88736807.exe
-
Size
513KB
-
MD5
22af06c40a6972c3d05acfbf88736807
-
SHA1
4d77cb9179339d472806f20b3036dd2187e07d9e
-
SHA256
5e779c17147a3270553c7042beef05e6946805a52adf85f8f5b9e6bf38f6984b
-
SHA512
1342ed861ed07e6b06c441d163f4c27cb534ed64e59f92867d69606e94a08656c9993a430f10ae1bcd7b10b313db81eec8b2d6b852093c794495acde9108455c
-
SSDEEP
12288:lHCKLz4cDlLqz3Nl1/DR3Br8PWEXi1gHAVR7:lj40lmdt3Br8z8gHSR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2916 csrss.exe -
Loads dropped DLL 2 IoCs
pid Process 4848 22af06c40a6972c3d05acfbf88736807.exe 4848 22af06c40a6972c3d05acfbf88736807.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4848 set thread context of 2916 4848 22af06c40a6972c3d05acfbf88736807.exe 52 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4848 wrote to memory of 2916 4848 22af06c40a6972c3d05acfbf88736807.exe 52 PID 4848 wrote to memory of 2916 4848 22af06c40a6972c3d05acfbf88736807.exe 52 PID 4848 wrote to memory of 2916 4848 22af06c40a6972c3d05acfbf88736807.exe 52 PID 4848 wrote to memory of 2916 4848 22af06c40a6972c3d05acfbf88736807.exe 52 PID 4848 wrote to memory of 2916 4848 22af06c40a6972c3d05acfbf88736807.exe 52 PID 4848 wrote to memory of 2916 4848 22af06c40a6972c3d05acfbf88736807.exe 52 PID 4848 wrote to memory of 2916 4848 22af06c40a6972c3d05acfbf88736807.exe 52 PID 4848 wrote to memory of 2916 4848 22af06c40a6972c3d05acfbf88736807.exe 52 PID 4848 wrote to memory of 2916 4848 22af06c40a6972c3d05acfbf88736807.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\22af06c40a6972c3d05acfbf88736807.exe"C:\Users\Admin\AppData\Local\Temp\22af06c40a6972c3d05acfbf88736807.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Roaming\csrss.exeC:\Users\Admin\AppData\Roaming\csrss.exe2⤵
- Executes dropped EXE
PID:2916
-