Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 16:04
Static task
static1
Behavioral task
behavioral1
Sample
80435c956343c13c8eb6252c7229692f.exe
Resource
win7-20231215-en
General
-
Target
80435c956343c13c8eb6252c7229692f.exe
-
Size
224KB
-
MD5
80435c956343c13c8eb6252c7229692f
-
SHA1
471c6efa52c9dec5a0a3e12936b81d225eaf4bd3
-
SHA256
f8f32ceb8188585cd9db161a8a96353cd72df8971195f3f9769ef87fbfc286fd
-
SHA512
cce97de05d646d1a20e48dc34ef240cee1975d62683ea1cd19f742d43fcd299b0e5c0c94b95b46e4312665076f7e1ca7003badc644840192889f5d12e5bc9d5f
-
SSDEEP
6144:7FCZksD0tc4/sjUAx8sHZJcT9CU63Qyw:4kOj4/sjUAx8oZECtpw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1712 s.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\windows\s.exe 80435c956343c13c8eb6252c7229692f.exe File opened for modification C:\windows\s.exe 80435c956343c13c8eb6252c7229692f.exe File created C:\windows\systemos1.exe s.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4704 1712 WerFault.exe 98 -
Runs net.exe
-
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4812 wrote to memory of 3268 4812 80435c956343c13c8eb6252c7229692f.exe 84 PID 4812 wrote to memory of 3268 4812 80435c956343c13c8eb6252c7229692f.exe 84 PID 4812 wrote to memory of 3268 4812 80435c956343c13c8eb6252c7229692f.exe 84 PID 3268 wrote to memory of 1972 3268 net.exe 87 PID 3268 wrote to memory of 1972 3268 net.exe 87 PID 3268 wrote to memory of 1972 3268 net.exe 87 PID 4812 wrote to memory of 1712 4812 80435c956343c13c8eb6252c7229692f.exe 98 PID 4812 wrote to memory of 1712 4812 80435c956343c13c8eb6252c7229692f.exe 98 PID 4812 wrote to memory of 1712 4812 80435c956343c13c8eb6252c7229692f.exe 98 PID 1712 wrote to memory of 1236 1712 s.exe 99 PID 1712 wrote to memory of 1236 1712 s.exe 99 PID 1712 wrote to memory of 1236 1712 s.exe 99 PID 1236 wrote to memory of 3048 1236 net.exe 101 PID 1236 wrote to memory of 3048 1236 net.exe 101 PID 1236 wrote to memory of 3048 1236 net.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\80435c956343c13c8eb6252c7229692f.exe"C:\Users\Admin\AppData\Local\Temp\80435c956343c13c8eb6252c7229692f.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess2⤵
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess3⤵PID:1972
-
-
-
C:\windows\s.exeC:\windows\s.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:3048
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1712 -s 16403⤵
- Program crash
PID:4704
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1712 -ip 17121⤵PID:4184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD580435c956343c13c8eb6252c7229692f
SHA1471c6efa52c9dec5a0a3e12936b81d225eaf4bd3
SHA256f8f32ceb8188585cd9db161a8a96353cd72df8971195f3f9769ef87fbfc286fd
SHA512cce97de05d646d1a20e48dc34ef240cee1975d62683ea1cd19f742d43fcd299b0e5c0c94b95b46e4312665076f7e1ca7003badc644840192889f5d12e5bc9d5f
-
Filesize
2KB
MD58bfcf44eb468bd8d016c0a378f5ce3b6
SHA111afc64a4248bf6856fc4f8481d6b62f50f86143
SHA25604aa3b55acb1d205869dda64310cd684169666980c1fc4f41d7364ee58a7f973
SHA5123e445d11ba096b13fca27dd4a7cd620eff4a31f90163f91002128baf96ad95bf58f4dd7143ca59789701aacc55fd9d68400e6bff350e1781696cdf0a95754ea8