Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 04:45
Static task
static1
Behavioral task
behavioral1
Sample
05997d03ca275d18ee9883b88f4bd582.exe
Resource
win7-20240221-en
General
-
Target
05997d03ca275d18ee9883b88f4bd582.exe
-
Size
589KB
-
MD5
05997d03ca275d18ee9883b88f4bd582
-
SHA1
cf5b137ef9f3d72319f9d5709161cb0e5704e312
-
SHA256
aa2b979afbf80db4a614a92678d0a5d2b42369ca25013dcd2671d1780898e666
-
SHA512
a5195f3647dd82a7f89885ddaa462459f4ba91cfff8f5e7661d92f6f077a0ae634cdd6cd0306150ed118e6936e2c4c1fb37ef484db6c04326ad50b6d1edebd3e
-
SSDEEP
12288:rRUzrqpyhrqNIi1PQmI836s2TSSbNrAng1c8hgx:QxiJQmV6XTSSbNrAng1cKgx
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe 05997d03ca275d18ee9883b88f4bd582.exe -
Executes dropped EXE 1 IoCs
pid Process 2836 qemu-ga.exe -
Loads dropped DLL 1 IoCs
pid Process 2036 05997d03ca275d18ee9883b88f4bd582.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2036 05997d03ca275d18ee9883b88f4bd582.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2036 05997d03ca275d18ee9883b88f4bd582.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2836 2036 05997d03ca275d18ee9883b88f4bd582.exe 29 PID 2036 wrote to memory of 2836 2036 05997d03ca275d18ee9883b88f4bd582.exe 29 PID 2036 wrote to memory of 2836 2036 05997d03ca275d18ee9883b88f4bd582.exe 29 PID 2036 wrote to memory of 2836 2036 05997d03ca275d18ee9883b88f4bd582.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\05997d03ca275d18ee9883b88f4bd582.exe"C:\Users\Admin\AppData\Local\Temp\05997d03ca275d18ee9883b88f4bd582.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"2⤵
- Executes dropped EXE
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5a5ce3aba68bdb438e98b1d0c70a3d95c
SHA1013f5aa9057bf0b3c0c24824de9d075434501354
SHA2569b860be98a046ea97a7f67b006e0b1bc9ab7731dd2a0f3a9fd3d710f6c43278a
SHA5127446f1256873b51a59b9d2d3498cef5a41dbce55864c2a5fb8cb7d25f7d6e6d8ea249d551a45b75d99b1ad0d6fb4b5e4544e5ca77bcd627717d6598b5f566a79