Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 12:58
Static task
static1
Behavioral task
behavioral1
Sample
Launch_this(Not_exe file).bat
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Launch_this(Not_exe file).bat
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
License.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
License.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
TrixXPloit.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
TrixXPloit.exe
Resource
win10v2004-20231215-en
General
-
Target
License.exe
-
Size
223KB
-
MD5
c4a30082317aa701d555c0cb1a3345a8
-
SHA1
cd36010d6bb2c282eae20edc14b25c61bb70e28d
-
SHA256
22b3ba3c3572cab0bd553ac397e311e85bf64ac3aa1c7f315b3a5fe19d3cd3de
-
SHA512
002a050ed15c05d82cec7da4d889e25b4ed9f17355993709443f8af9ffd0a00bf2a034f2dd0c247a001ef7f1e91bee08e291f98768dcb6a89fe666562815524b
-
SSDEEP
6144:pJfzvwSFMUOCsCnOIksBNQG2Nk8NeI/qt7:LfjwSFsCsC/B8pNSl
Malware Config
Signatures
-
Phemedrone
An information and wallet stealer written in C#.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Program crash 1 IoCs
pid pid_target Process procid_target 2480 2292 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2292 License.exe 2292 License.exe 2292 License.exe 2292 License.exe 2292 License.exe 2292 License.exe 2292 License.exe 2292 License.exe 2292 License.exe 2292 License.exe 2292 License.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2292 License.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2480 2292 License.exe 32 PID 2292 wrote to memory of 2480 2292 License.exe 32 PID 2292 wrote to memory of 2480 2292 License.exe 32 PID 2292 wrote to memory of 2480 2292 License.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\License.exe"C:\Users\Admin\AppData\Local\Temp\License.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 18722⤵
- Program crash
PID:2480
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2000