Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 17:57
Static task
static1
Behavioral task
behavioral1
Sample
3ab010513c45199eb874a9daa5a22ebd.exe
Resource
win7-20231215-en
General
-
Target
3ab010513c45199eb874a9daa5a22ebd.exe
-
Size
1.6MB
-
MD5
3ab010513c45199eb874a9daa5a22ebd
-
SHA1
cc2f2376daad7149c928f8337dcada7c69ff279a
-
SHA256
e48755b7b59f5e3c2675d2de1c8b0333931cc8d642585aa4af06c18209538569
-
SHA512
fafcd8b6fbb2dcc7b114db19387234ebbc30a1b6c3bda9959371d113cb8960efec7a0dec14a0ff17ec43c1ae0a3f3b8d868cbd8a3341a8f5e880baf45717dcb7
-
SSDEEP
49152:f/fwUdoP8/QnXQLqs4CEgHhAWkf6tvk4TXXra:fwUdd/0ALq+O6tch
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3920 3ab010513c45199eb874a9daa5a22ebd.exe 3920 3ab010513c45199eb874a9daa5a22ebd.exe 3920 3ab010513c45199eb874a9daa5a22ebd.exe 3920 3ab010513c45199eb874a9daa5a22ebd.exe 2060 3ab010513c45199eb874a9daa5a22ebd.exe 2060 3ab010513c45199eb874a9daa5a22ebd.exe 2060 3ab010513c45199eb874a9daa5a22ebd.exe 2060 3ab010513c45199eb874a9daa5a22ebd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2060 3ab010513c45199eb874a9daa5a22ebd.exe 2060 3ab010513c45199eb874a9daa5a22ebd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3920 wrote to memory of 2060 3920 3ab010513c45199eb874a9daa5a22ebd.exe 17 PID 3920 wrote to memory of 2060 3920 3ab010513c45199eb874a9daa5a22ebd.exe 17 PID 3920 wrote to memory of 2060 3920 3ab010513c45199eb874a9daa5a22ebd.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ab010513c45199eb874a9daa5a22ebd.exe"C:\Users\Admin\AppData\Local\Temp\3ab010513c45199eb874a9daa5a22ebd.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\3ab010513c45199eb874a9daa5a22ebd.exe"C:\Users\Admin\AppData\Local\Temp\3ab010513c45199eb874a9daa5a22ebd.exe" /wrapper /dir="C:\Users\Admin\AppData\Local\Temp\pkg_1630122090"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD5c94d1e011e86788feaa18f88eb9c3fd8
SHA1e33ef37626380637320af83b494edc4e0ea88e96
SHA256c2d1c09d239baa93fc5844ec7cf43613f83a112dacd1156daf79ae8a957161a4
SHA5126f23867cd78e219b10b340550b0d6687760d085548363911017be7c4ba1d0872d0f1128bb428889d420a5fb52e1533a2a287134604fdb25602bb04cb7afc6cf7