Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 13:48
Behavioral task
behavioral1
Sample
741678243e8de7d5fceb4c528c7729a4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
741678243e8de7d5fceb4c528c7729a4.exe
Resource
win10v2004-20231215-en
General
-
Target
741678243e8de7d5fceb4c528c7729a4.exe
-
Size
658KB
-
MD5
741678243e8de7d5fceb4c528c7729a4
-
SHA1
e0f25294e9f186446a33be9d6ed8a70fa0e0c3ea
-
SHA256
cb61e2480b7039ecf79d15045030fe70154e32840a6d5935008ce50613924255
-
SHA512
3600e795d276c106e2f258607c6d91ec4646ac7d1d220aff43302ae4a91d004bf30a2e6e9378ba4965717e799f410d5aec1443b972338beb3bd816bf91561525
-
SSDEEP
12288:NPKLyqrd0orat/uZFMd849eFx/Ti4I4z2pRwX4GUnu:NSLN0oratGZFHvBTVI4z2EVF
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2352-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2500-86-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2500-87-0x0000000004B90000-0x0000000004BAE000-memory.dmp upx behavioral1/memory/2352-103-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 741678243e8de7d5fceb4c528c7729a4.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: 741678243e8de7d5fceb4c528c7729a4.exe File opened (read-only) \??\J: 741678243e8de7d5fceb4c528c7729a4.exe File opened (read-only) \??\O: 741678243e8de7d5fceb4c528c7729a4.exe File opened (read-only) \??\U: 741678243e8de7d5fceb4c528c7729a4.exe File opened (read-only) \??\X: 741678243e8de7d5fceb4c528c7729a4.exe File opened (read-only) \??\H: 741678243e8de7d5fceb4c528c7729a4.exe File opened (read-only) \??\M: 741678243e8de7d5fceb4c528c7729a4.exe File opened (read-only) \??\R: 741678243e8de7d5fceb4c528c7729a4.exe File opened (read-only) \??\V: 741678243e8de7d5fceb4c528c7729a4.exe File opened (read-only) \??\W: 741678243e8de7d5fceb4c528c7729a4.exe File opened (read-only) \??\E: 741678243e8de7d5fceb4c528c7729a4.exe File opened (read-only) \??\K: 741678243e8de7d5fceb4c528c7729a4.exe File opened (read-only) \??\N: 741678243e8de7d5fceb4c528c7729a4.exe File opened (read-only) \??\S: 741678243e8de7d5fceb4c528c7729a4.exe File opened (read-only) \??\Z: 741678243e8de7d5fceb4c528c7729a4.exe File opened (read-only) \??\Q: 741678243e8de7d5fceb4c528c7729a4.exe File opened (read-only) \??\T: 741678243e8de7d5fceb4c528c7729a4.exe File opened (read-only) \??\Y: 741678243e8de7d5fceb4c528c7729a4.exe File opened (read-only) \??\A: 741678243e8de7d5fceb4c528c7729a4.exe File opened (read-only) \??\B: 741678243e8de7d5fceb4c528c7729a4.exe File opened (read-only) \??\G: 741678243e8de7d5fceb4c528c7729a4.exe File opened (read-only) \??\L: 741678243e8de7d5fceb4c528c7729a4.exe File opened (read-only) \??\P: 741678243e8de7d5fceb4c528c7729a4.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files (x86)\Google\Temp\black animal sperm sleeping castration .zip.exe 741678243e8de7d5fceb4c528c7729a4.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\bukkake [milf] feet (Jenna,Sylvia).rar.exe 741678243e8de7d5fceb4c528c7729a4.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\black fetish beast uncut glans .rar.exe 741678243e8de7d5fceb4c528c7729a4.exe File created C:\Program Files\Windows Journal\Templates\brasilian action hardcore [free] feet balls .mpg.exe 741678243e8de7d5fceb4c528c7729a4.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\american animal beast full movie femdom .mpg.exe 741678243e8de7d5fceb4c528c7729a4.exe File created C:\Program Files (x86)\Common Files\microsoft shared\lingerie masturbation ìï .avi.exe 741678243e8de7d5fceb4c528c7729a4.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\italian cum xxx voyeur .zip.exe 741678243e8de7d5fceb4c528c7729a4.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\tyrkish horse gay hot (!) sweet (Anniston,Tatjana).rar.exe 741678243e8de7d5fceb4c528c7729a4.exe File created C:\Program Files\Common Files\Microsoft Shared\trambling public latex .avi.exe 741678243e8de7d5fceb4c528c7729a4.exe File created C:\Program Files\DVD Maker\Shared\japanese action trambling lesbian (Sarah).zip.exe 741678243e8de7d5fceb4c528c7729a4.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\tyrkish cum sperm [bangbus] glans boots .mpeg.exe 741678243e8de7d5fceb4c528c7729a4.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\swedish fetish horse public shoes (Sonja,Samantha).mpg.exe 741678243e8de7d5fceb4c528c7729a4.exe File created C:\Program Files (x86)\Google\Update\Download\brasilian porn lesbian public ejaculation .rar.exe 741678243e8de7d5fceb4c528c7729a4.exe File created C:\Program Files (x86)\Microsoft Office\Templates\horse several models titts leather .avi.exe 741678243e8de7d5fceb4c528c7729a4.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\hardcore several models hole .zip.exe 741678243e8de7d5fceb4c528c7729a4.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\mssrv.exe 741678243e8de7d5fceb4c528c7729a4.exe File created C:\Windows\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\hardcore public feet .zip.exe 741678243e8de7d5fceb4c528c7729a4.exe File created C:\Windows\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\japanese handjob horse licking .rar.exe 741678243e8de7d5fceb4c528c7729a4.exe File created C:\Windows\assembly\GAC_32\Microsoft.SharePoint.BusinessData.Administration.Client\bukkake big mistress (Sandy,Melissa).zip.exe 741678243e8de7d5fceb4c528c7729a4.exe File created C:\Windows\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\indian handjob xxx full movie (Curtney).zip.exe 741678243e8de7d5fceb4c528c7729a4.exe File created C:\Windows\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\hardcore several models ash .avi.exe 741678243e8de7d5fceb4c528c7729a4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\741678243e8de7d5fceb4c528c7729a4.exe"C:\Users\Admin\AppData\Local\Temp\741678243e8de7d5fceb4c528c7729a4.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\741678243e8de7d5fceb4c528c7729a4.exe"C:\Users\Admin\AppData\Local\Temp\741678243e8de7d5fceb4c528c7729a4.exe"2⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\741678243e8de7d5fceb4c528c7729a4.exe"C:\Users\Admin\AppData\Local\Temp\741678243e8de7d5fceb4c528c7729a4.exe"3⤵PID:3056
-
-