Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
2746aa7831621f0dce2148415022860e.exe
Resource
win7-20231129-en
General
-
Target
2746aa7831621f0dce2148415022860e.exe
-
Size
452KB
-
MD5
2746aa7831621f0dce2148415022860e
-
SHA1
1c8f521558f45893f4215674d0027f32fa59e363
-
SHA256
3c302a6d52007f7620ce50166c14c18b3b5832e24943aaac17584014af2dbcb3
-
SHA512
b20bcb1a7ef1438f4175af0d7b3ad24c2036edc40232f5bdfeb097205109266e2bee6c926e1595d56b3de58d83f68d5018b42ecde0371ce9f2e322651726bba0
-
SSDEEP
6144:/ITHTM5+3tCi+mO4lX2Ca1W7GHQOB00aT1389DT6QYKlCL4xIrGP2UDAencEr9D5:/IDsKCD4t2l11HEjGnLpGGZcCcErB
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2220 set thread context of 1668 2220 2746aa7831621f0dce2148415022860e.exe 28 -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1668 2220 2746aa7831621f0dce2148415022860e.exe 28 PID 2220 wrote to memory of 1668 2220 2746aa7831621f0dce2148415022860e.exe 28 PID 2220 wrote to memory of 1668 2220 2746aa7831621f0dce2148415022860e.exe 28 PID 2220 wrote to memory of 1668 2220 2746aa7831621f0dce2148415022860e.exe 28 PID 2220 wrote to memory of 1668 2220 2746aa7831621f0dce2148415022860e.exe 28 PID 2220 wrote to memory of 1668 2220 2746aa7831621f0dce2148415022860e.exe 28 PID 2220 wrote to memory of 1668 2220 2746aa7831621f0dce2148415022860e.exe 28 PID 2220 wrote to memory of 1668 2220 2746aa7831621f0dce2148415022860e.exe 28 PID 2220 wrote to memory of 1668 2220 2746aa7831621f0dce2148415022860e.exe 28 PID 2220 wrote to memory of 1668 2220 2746aa7831621f0dce2148415022860e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2746aa7831621f0dce2148415022860e.exe"C:\Users\Admin\AppData\Local\Temp\2746aa7831621f0dce2148415022860e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\2746aa7831621f0dce2148415022860e.exe"C:\Users\Admin\AppData\Local\Temp\2746aa7831621f0dce2148415022860e.exe"2⤵PID:1668
-