Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 05:49
Behavioral task
behavioral1
Sample
e0eb05bcb2d716e1427dfe49ded958cf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e0eb05bcb2d716e1427dfe49ded958cf.exe
Resource
win10v2004-20240226-en
General
-
Target
e0eb05bcb2d716e1427dfe49ded958cf.exe
-
Size
93KB
-
MD5
e0eb05bcb2d716e1427dfe49ded958cf
-
SHA1
68322723778f0911c8e26f2d0b15247bd7eaacfe
-
SHA256
13f1e1b464c3aacd0fd37180fdd39a0955a0f8f0420b493e6ad1080ecf692417
-
SHA512
c307bc51bc51d18b02e3861f4fd1f01e0ed49967689bb259920eaa7f6a47c39a05bb8580157ad004d261ab0e0edf6be1afa4234cef732e7b697338f0688c44cc
-
SSDEEP
1536:SKcR4mjD9r823FvEUFbgVMymnMiomSBDjMs+peMCoTwjOCImlFDXq5irtT0Vsy/U:SKcWmjRrz3yoEWyk2hBDYsvMZMjO4nG4
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2492 7Oi5cUOL8ezPkeg.exe 2844 CTS.exe -
Loads dropped DLL 2 IoCs
pid Process 2068 e0eb05bcb2d716e1427dfe49ded958cf.exe 2068 e0eb05bcb2d716e1427dfe49ded958cf.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2068-0-0x0000000000D30000-0x0000000000D47000-memory.dmp upx behavioral1/memory/2068-14-0x0000000000D30000-0x0000000000D47000-memory.dmp upx behavioral1/files/0x000c00000001445e-17.dat upx behavioral1/memory/2844-18-0x0000000000BC0000-0x0000000000BD7000-memory.dmp upx behavioral1/files/0x0009000000012247-21.dat upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" e0eb05bcb2d716e1427dfe49ded958cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe e0eb05bcb2d716e1427dfe49ded958cf.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2068 e0eb05bcb2d716e1427dfe49ded958cf.exe Token: SeDebugPrivilege 2844 CTS.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2492 2068 e0eb05bcb2d716e1427dfe49ded958cf.exe 28 PID 2068 wrote to memory of 2492 2068 e0eb05bcb2d716e1427dfe49ded958cf.exe 28 PID 2068 wrote to memory of 2492 2068 e0eb05bcb2d716e1427dfe49ded958cf.exe 28 PID 2068 wrote to memory of 2492 2068 e0eb05bcb2d716e1427dfe49ded958cf.exe 28 PID 2068 wrote to memory of 2844 2068 e0eb05bcb2d716e1427dfe49ded958cf.exe 29 PID 2068 wrote to memory of 2844 2068 e0eb05bcb2d716e1427dfe49ded958cf.exe 29 PID 2068 wrote to memory of 2844 2068 e0eb05bcb2d716e1427dfe49ded958cf.exe 29 PID 2068 wrote to memory of 2844 2068 e0eb05bcb2d716e1427dfe49ded958cf.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0eb05bcb2d716e1427dfe49ded958cf.exe"C:\Users\Admin\AppData\Local\Temp\e0eb05bcb2d716e1427dfe49ded958cf.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\7Oi5cUOL8ezPkeg.exeC:\Users\Admin\AppData\Local\Temp\7Oi5cUOL8ezPkeg.exe2⤵
- Executes dropped EXE
PID:2492
-
-
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD501e5594c7707a6a15f091f133d09b8bb
SHA157a02053191c2a4ce4cc78145f8cd4a30e118183
SHA256e9b5dc5cd5a3e33688cdb377d2b99d185bbf65914cc1b8eaf816adb4dca0375f
SHA512a4db7cc5f2c5c21aa74d4891f64fc1e5bdcac8ba0373c3759f67f30abaf7120bc42b348f47748fdbce09ea55129f71ce0cd8851b41cc8ecc349077181adfaf45
-
Filesize
29KB
MD570aa23c9229741a9b52e5ce388a883ac
SHA1b42683e21e13de3f71db26635954d992ebe7119e
SHA2569d25cc704b1c00c9d17903e25ca35c319663e997cb9da0b116790b639e9688f2
SHA512be604a2ad5ab8a3e5edb8901016a76042ba873c8d05b4ef8eec31241377ec6b2a883b51c6912dc7640581ffa624547db334683975883ae74e62808b5ae9ab0b5
-
Filesize
64KB
MD5a32a382b8a5a906e03a83b4f3e5b7a9b
SHA111e2bdd0798761f93cce363329996af6c17ed796
SHA25675f12ea2f30d9c0d872dade345f30f562e6d93847b6a509ba53beec6d0b2c346
SHA512ec87dd957be21b135212454646dcabdd7ef9442cf714e2c1f6b42b81f0c3fa3b1875bde9a8b538e8a0aa2190225649c29e9ed0f25176e7659e55e422dd4efe4c