Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 03:45
Static task
static1
Behavioral task
behavioral1
Sample
42ab80bea83ca28028ff6c0683112767.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
42ab80bea83ca28028ff6c0683112767.exe
Resource
win10v2004-20231215-en
General
-
Target
42ab80bea83ca28028ff6c0683112767.exe
-
Size
146KB
-
MD5
42ab80bea83ca28028ff6c0683112767
-
SHA1
5e6be4f5429c6af51f374d71ef6f6b8e5d770369
-
SHA256
13b3c0dfc85647f81e74d6e6d9540fdc103719cdc1c1d76238938667509d10c6
-
SHA512
292f9573246efa185783c66e2eb07b8e82dac47a822bb8f83d7ca01aba1e0742655bd8c0fcaade11230716766b7b309037fd6fb0a392e629f072282729d83bf0
-
SSDEEP
3072:wOpXym/FMyEGyg1qq5xQfJrcji3ZSgMFdnmufnWXJN/:1YGyW5+fJQutMFdPOD/
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2360-1-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/2128-5-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/2360-9-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/1376-78-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/1376-80-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/2360-81-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/2128-169-0x0000000000580000-0x0000000000680000-memory.dmp upx behavioral1/memory/2360-170-0x0000000000400000-0x0000000000436000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" 42ab80bea83ca28028ff6c0683112767.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2128 2360 42ab80bea83ca28028ff6c0683112767.exe 28 PID 2360 wrote to memory of 2128 2360 42ab80bea83ca28028ff6c0683112767.exe 28 PID 2360 wrote to memory of 2128 2360 42ab80bea83ca28028ff6c0683112767.exe 28 PID 2360 wrote to memory of 2128 2360 42ab80bea83ca28028ff6c0683112767.exe 28 PID 2360 wrote to memory of 1376 2360 42ab80bea83ca28028ff6c0683112767.exe 30 PID 2360 wrote to memory of 1376 2360 42ab80bea83ca28028ff6c0683112767.exe 30 PID 2360 wrote to memory of 1376 2360 42ab80bea83ca28028ff6c0683112767.exe 30 PID 2360 wrote to memory of 1376 2360 42ab80bea83ca28028ff6c0683112767.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\42ab80bea83ca28028ff6c0683112767.exe"C:\Users\Admin\AppData\Local\Temp\42ab80bea83ca28028ff6c0683112767.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\42ab80bea83ca28028ff6c0683112767.exeC:\Users\Admin\AppData\Local\Temp\42ab80bea83ca28028ff6c0683112767.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:2128
-
-
C:\Users\Admin\AppData\Local\Temp\42ab80bea83ca28028ff6c0683112767.exeC:\Users\Admin\AppData\Local\Temp\42ab80bea83ca28028ff6c0683112767.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:1376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300B
MD550cc1b1d42d71c09db11ddd640fa79e0
SHA15b90be323be998ee447973418d1acb2329541d7a
SHA256d1bb41fe01e5b7e349b2c967154bd48581e690a6904ff8a43e13791fe47aac79
SHA512d6dc87cd3bf8f3ac21a79cc58cd0594dedc2990291ee8bfa80768e179e3307e02f040552c1ea1eb8482377fda7f919debffc761e953d33c0834f9bf176011e9c
-
Filesize
1KB
MD5122cc0dce5aad47bc0c603a5d7f773b2
SHA1ba479005917b02fb2a05c70f780f19ca3c1357a7
SHA256eff68ea10f16a380cc8f2429957a88a107f44aa261593b5e593c53a9b3d214cf
SHA51286b419cf4a9a53a824dee6ef6b6100126c17e472651cabc4ebffd1996c5b5201893dbeef2866a3a1e3177b2e2899065218bbf7020b9ed83ee396c0411b047940
-
Filesize
696B
MD5cbcb3d546bfecdec202adc43aa92c13f
SHA1501e15238e56c0231af904f60ba563484fb982b0
SHA256be1c036414cc7101d036c91758caa2e30bb24d00c57eb60bf171b275ce5fafa6
SHA512eb13019002073cb27f1015f22f9b59271e020a44ad5621846dc562ff0d5529a96159c7ed2f03a80c5d26d38beca06341d0dc97c0706ba856fe8884a20b0dbc47