Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 06:41

General

  • Target

    2c0688de386f52eb242cf61da7506d05.exe

  • Size

    672KB

  • MD5

    2c0688de386f52eb242cf61da7506d05

  • SHA1

    acbf8fe72134a9a10a2d5d7a292dae129465581d

  • SHA256

    0f8cacda879294d585841c2af38d4cce3b0e0b81a7497b2cce2e30445249f511

  • SHA512

    ee356777906fc16dd0f93cb320d0e9bf2fc13d0cac79fa742ac12e8407d5b50e708b641d21c6d4bdc44add37de9901210845acd84e3bf366e4af030df1adb96a

  • SSDEEP

    12288:FxNPJ97R8HlyyMiFmoaO2w5fXYKtSJ8K0N0hvN9ycqrVUkJpL3KBg7P:FxNPv2HlyyMiFmoaGXBtPK0N0hvNC6KT

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c0688de386f52eb242cf61da7506d05.exe
    "C:\Users\Admin\AppData\Local\Temp\2c0688de386f52eb242cf61da7506d05.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab5FBE.tmp

    Filesize

    21KB

    MD5

    565654e48f8401143e8d5ae399df4674

    SHA1

    1919e7570ad38fb6d53017accbfb5e1245831de6

    SHA256

    085a20f4f46d404ab266ed4cec0af31582d91068374df6c2024d0c7f956ebaec

    SHA512

    f70fbede4bf391e8f32b5753e9ae21cbb146b98cf0741622dfe5779a86974368007b381d332b69a8a4c93007b07b3e07e21ad236cdee6e6c333a8b1d169390a8

  • C:\Users\Admin\AppData\Local\Temp\Tar60F9.tmp

    Filesize

    45KB

    MD5

    5878a2e76b5d1b559660c39a3353c96a

    SHA1

    dcaadeb4e74e18b6dbfd4e7ed5e0fe2ffa67e8f9

    SHA256

    f572b908de312ea360b1d0f00afd22ef45c7e84a6bcba450f88efa63300a43f3

    SHA512

    e6ee27ef6430cea92279e2f3c5902ced11f6359b8b464fd71c5f579ee580f650f339524d621bfaed0992c055571224c411ed986555bb84330f45fcf570693874

  • C:\Users\Admin\AppData\Local\Temp\truste.jpg

    Filesize

    5KB

    MD5

    1959eb33004d6107d3412e109c37b742

    SHA1

    59c3a787483e7743d5b805cd36726a0bec7e4992

    SHA256

    e60a764cd4d721c9fd261555510c51c668d112a37f2da2f0be1da6dceaa5f8ad

    SHA512

    238724a6b809d371c6ebab6057c61019e48caf7dd3245c6dca77efb5c015703a206472a9b82f778114c8dce3f10dd13fba972644b137020e4e5507053358e68e