Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 14:51
Static task
static1
Behavioral task
behavioral1
Sample
e1ee7bbff6a3ff65d451b951f09aeb35.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e1ee7bbff6a3ff65d451b951f09aeb35.exe
Resource
win10v2004-20240226-en
General
-
Target
e1ee7bbff6a3ff65d451b951f09aeb35.exe
-
Size
188KB
-
MD5
e1ee7bbff6a3ff65d451b951f09aeb35
-
SHA1
d9b0878c20eaa3f4985f522e1c27285dc9de4395
-
SHA256
e4cef569972dad8288b97638e8f1a616de6b49983bfd2cde7031b9125ea9657d
-
SHA512
ff8613824fda0fc1d4cd5d60667870e48740f7b5695250a02e9d4c3427a610c8fbfdad3f72e21b6070fde89f59c4eca6744de6c7aca76a0520bce49f734ce2b0
-
SSDEEP
3072:OlZJjtGkjt8FF0Xsh+ZcoqaiiD6DtzjwEoHDHwXC001HqkN0Qv7Fo:OlfzjtWqhcLaT6xjkjQXZsoq7Fo
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" e1ee7bbff6a3ff65d451b951f09aeb35.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1688-1-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2628-8-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1688-65-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/564-72-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1688-74-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1688-156-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1688-194-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2628 1688 e1ee7bbff6a3ff65d451b951f09aeb35.exe 28 PID 1688 wrote to memory of 2628 1688 e1ee7bbff6a3ff65d451b951f09aeb35.exe 28 PID 1688 wrote to memory of 2628 1688 e1ee7bbff6a3ff65d451b951f09aeb35.exe 28 PID 1688 wrote to memory of 2628 1688 e1ee7bbff6a3ff65d451b951f09aeb35.exe 28 PID 1688 wrote to memory of 564 1688 e1ee7bbff6a3ff65d451b951f09aeb35.exe 30 PID 1688 wrote to memory of 564 1688 e1ee7bbff6a3ff65d451b951f09aeb35.exe 30 PID 1688 wrote to memory of 564 1688 e1ee7bbff6a3ff65d451b951f09aeb35.exe 30 PID 1688 wrote to memory of 564 1688 e1ee7bbff6a3ff65d451b951f09aeb35.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1ee7bbff6a3ff65d451b951f09aeb35.exe"C:\Users\Admin\AppData\Local\Temp\e1ee7bbff6a3ff65d451b951f09aeb35.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\e1ee7bbff6a3ff65d451b951f09aeb35.exeC:\Users\Admin\AppData\Local\Temp\e1ee7bbff6a3ff65d451b951f09aeb35.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:2628
-
-
C:\Users\Admin\AppData\Local\Temp\e1ee7bbff6a3ff65d451b951f09aeb35.exeC:\Users\Admin\AppData\Local\Temp\e1ee7bbff6a3ff65d451b951f09aeb35.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58de0461532d6dfef109957c71e0287d3
SHA1236d59f96a33f3ff9b67de48ee348a60c3b5b188
SHA256c2c804f187891fdea530e338ba28f1db33f10001f502e224055d619e3306a2b9
SHA51288436aaa4d88d3c1d77c323341f89e466cb5d701398309c20b72d7fe93fc6f58f278de14cb85fc674156de5aac0810632056ceeb75db155616c6fb7860e2c25e
-
Filesize
600B
MD5b505c019d0205b240ba79b35b3f71797
SHA1611cee9ba07d76b16779c0a525af125d441f6f31
SHA256f5d3ba13fce4af28ea8179e702020e46b95bb46ebefd6081b042803f5e71187f
SHA512132cf9acf8f4d8fdd486fa1571573cfb358439dadd8e632c8470fe404af1febc333f73a39764c6e3f8a5703b84cd4ec82d808dbf0d03e2c72327eaacf89be53b
-
Filesize
996B
MD5c32999cda6a17713d06cb7eac7f93d1d
SHA1f064d50184cf6a65b86146658f534325336db36d
SHA256814a02da7ed3fb886e4a2bc60f215736d36c8ef5b940a9f567833c0ff7f6c2a2
SHA512b394e0a9f801aba41c10ba46788defa74004f47f09185c94b00896415b8b7e8860ce9c69b20eb0730821aa31a1616384c2ce03a63e7e6f1f1ae6317837d5c605