Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
385a4b8c7e4699684b79ff240abd5989.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
385a4b8c7e4699684b79ff240abd5989.exe
Resource
win10v2004-20231215-en
General
-
Target
385a4b8c7e4699684b79ff240abd5989.exe
-
Size
208KB
-
MD5
385a4b8c7e4699684b79ff240abd5989
-
SHA1
f2be608fac98c93fa1514c43a8ddc8559399bee6
-
SHA256
a7ef292b0920d3aeb71c0225f2b2a853e791c0bfab6e4cbc6cee2822bd605ffa
-
SHA512
8e811b1292e6e00c97dc992b4112007927b4040f0e0eede0878418632b5e23bc182b90881fb6a99c3049c3c5bdb0e226eb9b8815e75af41f92557db697a28e1e
-
SSDEEP
3072:OlRotnvzgy6SOK9vcsA8gQYG81Y8ACLQASlkwVzC3iTbo4LCKonhPjXItIe7nuQ:OwJv0ySitHqAzlf44uVlIVuQ
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3016-2-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral1/memory/2052-5-0x0000000000400000-0x0000000000441000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" 385a4b8c7e4699684b79ff240abd5989.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process PID 3016 set thread context of 0 3016 385a4b8c7e4699684b79ff240abd5989.exe PID 2052 set thread context of 0 2052 385a4b8c7e4699684b79ff240abd5989.exe PID 2876 set thread context of 0 2876 385a4b8c7e4699684b79ff240abd5989.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2052 3016 385a4b8c7e4699684b79ff240abd5989.exe 28 PID 3016 wrote to memory of 2052 3016 385a4b8c7e4699684b79ff240abd5989.exe 28 PID 3016 wrote to memory of 2052 3016 385a4b8c7e4699684b79ff240abd5989.exe 28 PID 3016 wrote to memory of 2052 3016 385a4b8c7e4699684b79ff240abd5989.exe 28 PID 3016 wrote to memory of 2876 3016 385a4b8c7e4699684b79ff240abd5989.exe 30 PID 3016 wrote to memory of 2876 3016 385a4b8c7e4699684b79ff240abd5989.exe 30 PID 3016 wrote to memory of 2876 3016 385a4b8c7e4699684b79ff240abd5989.exe 30 PID 3016 wrote to memory of 2876 3016 385a4b8c7e4699684b79ff240abd5989.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\385a4b8c7e4699684b79ff240abd5989.exe"C:\Users\Admin\AppData\Local\Temp\385a4b8c7e4699684b79ff240abd5989.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\385a4b8c7e4699684b79ff240abd5989.exeC:\Users\Admin\AppData\Local\Temp\385a4b8c7e4699684b79ff240abd5989.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- Suspicious use of SetThreadContext
PID:2052
-
-
C:\Users\Admin\AppData\Local\Temp\385a4b8c7e4699684b79ff240abd5989.exeC:\Users\Admin\AppData\Local\Temp\385a4b8c7e4699684b79ff240abd5989.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- Suspicious use of SetThreadContext
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e731560ce122e3685f31162e73291481
SHA170ee9723acc06e62598bf8e6386bfbe3d7a5bba5
SHA2567d7d40b649bb7845c7f4a64edf4df3fb5062ca3dd5a8a2378ca1e5dd79b5668f
SHA512dce7244622cfcd1e9be506c6e25c0850246948ec0d6b64850af27dfe8b16faffbab3363bfa0f7e60d0c86faa6221b29183c9d691dc2d425d11d0a1ed03dd9590