Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe
Resource
win7-20240221-en
General
-
Target
c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe
-
Size
4.3MB
-
MD5
8d8675dff13dba84e138116f55547a21
-
SHA1
3539639720aed34e60f0bd5b96c69734aba621fe
-
SHA256
c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d
-
SHA512
ebfabc6b2adad4d9718bf2b215b352e500c69ad6820b96b92eba7a9af881889daa9dd8674872c58564b2557b3ede87096ae98ddf834645759d02961c7f63c5ed
-
SSDEEP
98304:t+ckBkz8nmXHxP6t2y8n52X3CjxIIHdyquqmX3vHvXLNvsMkykJ:D4kzImXHxSt2y8noCjxIuDufHvXLNvD4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2612 c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe -
Loads dropped DLL 4 IoCs
pid Process 2472 c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe 2664 c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe 2472 c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe 2612 c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe File opened (read-only) \??\F: c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2472 c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2664 2472 c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe 28 PID 2472 wrote to memory of 2664 2472 c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe 28 PID 2472 wrote to memory of 2664 2472 c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe 28 PID 2472 wrote to memory of 2664 2472 c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe 28 PID 2472 wrote to memory of 2664 2472 c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe 28 PID 2472 wrote to memory of 2664 2472 c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe 28 PID 2472 wrote to memory of 2664 2472 c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe 28 PID 2472 wrote to memory of 2612 2472 c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe 29 PID 2472 wrote to memory of 2612 2472 c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe 29 PID 2472 wrote to memory of 2612 2472 c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe 29 PID 2472 wrote to memory of 2612 2472 c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe 29 PID 2472 wrote to memory of 2612 2472 c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe 29 PID 2472 wrote to memory of 2612 2472 c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe 29 PID 2472 wrote to memory of 2612 2472 c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe"C:\Users\Admin\AppData\Local\Temp\c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exeC:\Users\Admin\AppData\Local\Temp\c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=82.0.4227.23 --initial-client-data=0x190,0x194,0x198,0x164,0x19c,0x7465a558,0x7465a568,0x7465a5742⤵
- Loads dropped DLL
PID:2664
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe" --version2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c18ac994c43134d64c94a6fb0b00ecca
SHA1c3dcd149a8f90afd4239165cb5b733ce4491b7ea
SHA25656b4c5def303e143cee72a59a9c3e5d8223488c4c3d1a78264ad71d7006c47b2
SHA512907ba74b3b858b7cc212c0db7caf0a8680d24382479282bec236fc0b8a4780253782e6e9a147b804833185a2a95b081b90208d87422bcdebb5a24f1bbc36cab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5758654aece5e3ec5045921322d30cbfa
SHA11b67f6406f4bc7cc59494d2473fac0b384ab4a6a
SHA256ed4da8572eee33e5b25250b9693cb698770d8299cdcec69e60be9ff99429a779
SHA512a71c00bf42331eca35a72097337d08f9d06e4f4992b1c46cbd5369a2c664386f4aa06a23fad96274bce80af55656290fa950d087f72815b743ca68790a98d01b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55271261c08e2c636975afba73df97887
SHA1b1acd1f3b81e76e5f89fdaa850a988ed74664d38
SHA2567cb707a1c5b1487c058c59fe318b4ebaf1210f84a3945c52f7e8e60e727b09ec
SHA512203bd82c1113b8d04ccb21476a390ea952fed2dc333de2006ea5b59cec39164c2ba0014c6dbb038eeb3b466c3e77041868c15875cd06df1e0222a9bd3e412b34
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d.exe
Filesize4.3MB
MD58d8675dff13dba84e138116f55547a21
SHA13539639720aed34e60f0bd5b96c69734aba621fe
SHA256c7dab771fbf5d6edbcdb1b892331340ad8b27d307b547e87e0fc83016df7196d
SHA512ebfabc6b2adad4d9718bf2b215b352e500c69ad6820b96b92eba7a9af881889daa9dd8674872c58564b2557b3ede87096ae98ddf834645759d02961c7f63c5ed
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
40B
MD52b21a8c1657351d7bac829bf1389739e
SHA14ea375540aa3855e50b564ad7e567d228696f6c7
SHA2567ac82c69bdbe76975501aaa9f885d558b96cffc8954738dd6962ef79203f5cfd
SHA51200fe1a0f9db9d7bb316720f61f90d97cdf251ab7a117a6999b64552b96b3c241229478e66f9952ebe231004c16ea7080dbdf2323f5794701eac97720bd8cd267
-
Filesize
3.8MB
MD5d91e0edd63915b7aeda7e6b1f2fe9a4b
SHA1fc0220c7af8299a9a724c2c1a3137133588ee2a3
SHA256934f9c39ec9ad174176e5ceb672fcc5a2051083c823cdef3bc0820189ce30570
SHA51276e5f240dc522ffd4f902e3549bc81443cc5011f52cf022ea147108f56d6152a8acb4e15721e60a2c5938a1411c79fc3a179352834a66be08764bfa3c9f57fcf
-
Filesize
3.1MB
MD50dc4724010a2a37bb20042635aa45473
SHA13106fa3fabff8967ee713a1f43afc841e567689e
SHA256aa7f7eddd51343b7a6fa402973350fb605446bd2e3bf83ae49ad59931f842f91
SHA51237ce5ef5091409487a2aa1ad1bf08743dbb5e33468136d69aa9df9f14afc1e4a0227da0149bbb6dea2a25644fc5843ff16021edb7d9f9aa51b30497fb293797d