Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 00:32
Static task
static1
Behavioral task
behavioral1
Sample
44d416f8ebfbbe4fb52b4444d7e24ec6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
44d416f8ebfbbe4fb52b4444d7e24ec6.exe
Resource
win10v2004-20231222-en
General
-
Target
44d416f8ebfbbe4fb52b4444d7e24ec6.exe
-
Size
162KB
-
MD5
44d416f8ebfbbe4fb52b4444d7e24ec6
-
SHA1
2e8f8748faebcbcb76ceb92a13cb3f9c8537efb7
-
SHA256
ac32a850727f2695d70cfd49f96eac07f7c95dedb3c2e57108bbcbe433cf0c74
-
SHA512
2635e1e87ae28c2e6d67f40b3183ea4ab93fa577570cb5a0547e09200210edce9da3033cec180ace7104117caacf22fa37c88e8bf7c92f6c34b1d4d94246e1e0
-
SSDEEP
3072:PvF2KGJb1yTHHJq0oKI7i5sdFKhfh/ZVY5Fphz808I1BAfgfmhrVQpzqx:V2DB1yTHXem5EEhfKQ0L1BLfm9VQpzqx
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2620-1-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/2668-5-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/2668-6-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/2620-14-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/1424-77-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/2620-78-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/2620-168-0x0000000000400000-0x000000000043D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" 44d416f8ebfbbe4fb52b4444d7e24ec6.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2620 wrote to memory of 2668 2620 44d416f8ebfbbe4fb52b4444d7e24ec6.exe 28 PID 2620 wrote to memory of 2668 2620 44d416f8ebfbbe4fb52b4444d7e24ec6.exe 28 PID 2620 wrote to memory of 2668 2620 44d416f8ebfbbe4fb52b4444d7e24ec6.exe 28 PID 2620 wrote to memory of 2668 2620 44d416f8ebfbbe4fb52b4444d7e24ec6.exe 28 PID 2620 wrote to memory of 1424 2620 44d416f8ebfbbe4fb52b4444d7e24ec6.exe 30 PID 2620 wrote to memory of 1424 2620 44d416f8ebfbbe4fb52b4444d7e24ec6.exe 30 PID 2620 wrote to memory of 1424 2620 44d416f8ebfbbe4fb52b4444d7e24ec6.exe 30 PID 2620 wrote to memory of 1424 2620 44d416f8ebfbbe4fb52b4444d7e24ec6.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\44d416f8ebfbbe4fb52b4444d7e24ec6.exe"C:\Users\Admin\AppData\Local\Temp\44d416f8ebfbbe4fb52b4444d7e24ec6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\44d416f8ebfbbe4fb52b4444d7e24ec6.exeC:\Users\Admin\AppData\Local\Temp\44d416f8ebfbbe4fb52b4444d7e24ec6.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:2668
-
-
C:\Users\Admin\AppData\Local\Temp\44d416f8ebfbbe4fb52b4444d7e24ec6.exeC:\Users\Admin\AppData\Local\Temp\44d416f8ebfbbe4fb52b4444d7e24ec6.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:1424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52b4882e86c6045e6325f7c4ff0d9caf8
SHA148d1ca8fa8ccfa20ffe8986c46f7ae7558c8ada0
SHA256939a977d7d32950a51014eb06f5a5f23e1dddb22553699d1d05bd22d2071461d
SHA5127408dd9b948fed85b536a68df00c281657295ad1054a796f581b77e0b8675a1a6b21c67f5633383a0ca450db3ea2492f364a7f25c634541d544548b7b9670cd8
-
Filesize
600B
MD55a765f79278d57d42c3f33fc9b06881a
SHA14d8f2c07d81af52150672e531709ff262bc44f99
SHA2561adf9e410a21f79fe1459a8612790da7fd4fd2716b3f4df75e5a2164bb2a8183
SHA5126d9bc4938b76bd3cf20fd37fccba478cff3e61b182f04d467c195b76a4ca97c73d0a91b7cd00617ab89f7fc312d1455a26d570ff0a113e54a1e6cdb098e59278
-
Filesize
996B
MD5f826dde7a0fe7576456e4a2d5ec1a3e2
SHA1883b151dba09caa0cbb67288584145612bf54f57
SHA2562cc11b598149311aa79dee2a2425044061673debc1efbded52625416b8a3cda6
SHA5120d9321aa912516ab53d0bd85b8a3a39d9abbca8861fef8fd46bd23ff9edb5bbdf17de29b680295940e01bb4cb744d5fb15f2cf67e5c6a1af5fc355ca80393ef4