Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/01/2024, 14:38
Static task
static1
Behavioral task
behavioral1
Sample
1eba93412d726c87aa094a3c44d9268a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1eba93412d726c87aa094a3c44d9268a.exe
Resource
win10v2004-20231215-en
General
-
Target
1eba93412d726c87aa094a3c44d9268a.exe
-
Size
176KB
-
MD5
1eba93412d726c87aa094a3c44d9268a
-
SHA1
f3ff7dd4573fdbcb2825a7fcad934b5c5235b431
-
SHA256
e66efbe405be933bb8a27d4b4beb8632bf395cb810ebd2f56b915edbee619a37
-
SHA512
d8e8b325b5869c75356de1e012daf440e8ffbf23b038a40cf97fdf84ce12a18854d720c4a2aa2a0074ef06b2d1c5015460588670127c1bf1419e2b23b71d0246
-
SSDEEP
3072:upMlNPPG3GRfo8RKjhzGBqOYcYZlDd8FdymUvuFWVAsiLYmFsL5+/aGw8R2KGU:upYNOWRg8UtGbY/iFdLUvuFuBoRGW2
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" 1eba93412d726c87aa094a3c44d9268a.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3064-13-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/1428-72-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2128-73-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2128-75-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2128-139-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2128-178-0x0000000000400000-0x000000000048E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2128 wrote to memory of 3064 2128 1eba93412d726c87aa094a3c44d9268a.exe 18 PID 2128 wrote to memory of 3064 2128 1eba93412d726c87aa094a3c44d9268a.exe 18 PID 2128 wrote to memory of 3064 2128 1eba93412d726c87aa094a3c44d9268a.exe 18 PID 2128 wrote to memory of 3064 2128 1eba93412d726c87aa094a3c44d9268a.exe 18 PID 2128 wrote to memory of 1428 2128 1eba93412d726c87aa094a3c44d9268a.exe 30 PID 2128 wrote to memory of 1428 2128 1eba93412d726c87aa094a3c44d9268a.exe 30 PID 2128 wrote to memory of 1428 2128 1eba93412d726c87aa094a3c44d9268a.exe 30 PID 2128 wrote to memory of 1428 2128 1eba93412d726c87aa094a3c44d9268a.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1eba93412d726c87aa094a3c44d9268a.exe"C:\Users\Admin\AppData\Local\Temp\1eba93412d726c87aa094a3c44d9268a.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\1eba93412d726c87aa094a3c44d9268a.exeC:\Users\Admin\AppData\Local\Temp\1eba93412d726c87aa094a3c44d9268a.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:3064
-
-
C:\Users\Admin\AppData\Local\Temp\1eba93412d726c87aa094a3c44d9268a.exeC:\Users\Admin\AppData\Local\Temp\1eba93412d726c87aa094a3c44d9268a.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:1428
-