Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 02:24 UTC
Static task
static1
Behavioral task
behavioral1
Sample
f082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd.exe
Resource
win7-20240221-en
General
-
Target
f082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd.exe
-
Size
20.4MB
-
MD5
a665aa5d659fe996cf654cebb1e73fa4
-
SHA1
59ff218a45bd07f8dcb01f817a33f96aebb71494
-
SHA256
f082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd
-
SHA512
8b30189d505b0ac64855d5d2cfbae7dfa8054cf90f6cc03c5428c535fe3e5f85f0fbdc3db3a2d91289b5dd247499075089883c41ed603604a275b20ed456542f
-
SSDEEP
393216:edjtBby8b52AALjVabxtndRX7hbggeP7rq7NcpRHbloVMbyktxFFN:exthwAALxa3ndR7hsg8Rd2kt5N
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1944 f082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd.tmp -
Loads dropped DLL 6 IoCs
pid Process 2028 f082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd.exe 1944 f082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd.tmp 1944 f082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd.tmp 1944 f082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd.tmp 1944 f082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd.tmp 1944 f082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1944 f082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd.tmp 1944 f082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd.tmp 1944 f082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd.tmp 1944 f082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1944 f082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1944 2028 f082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd.exe 27 PID 2028 wrote to memory of 1944 2028 f082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd.exe 27 PID 2028 wrote to memory of 1944 2028 f082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd.exe 27 PID 2028 wrote to memory of 1944 2028 f082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd.exe 27 PID 2028 wrote to memory of 1944 2028 f082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd.exe 27 PID 2028 wrote to memory of 1944 2028 f082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd.exe 27 PID 2028 wrote to memory of 1944 2028 f082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\f082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd.exe"C:\Users\Admin\AppData\Local\Temp\f082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\is-JRBNH.tmp\f082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd.tmp"C:\Users\Admin\AppData\Local\Temp\is-JRBNH.tmp\f082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd.tmp" /SL5="$5015E,20903158,158720,C:\Users\Admin\AppData\Local\Temp\f082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:1944
-
Network
-
Remote address:8.8.8.8:53Requestapi.mybrowserbar.comIN AResponseapi.mybrowserbar.comIN CNAMEwww.mybrowserbar.comwww.mybrowserbar.comIN CNAMEprod-web-1552869019.us-east-2.elb.amazonaws.comprod-web-1552869019.us-east-2.elb.amazonaws.comIN A3.136.164.202prod-web-1552869019.us-east-2.elb.amazonaws.comIN A3.15.55.122
-
3.136.164.202:80api.mybrowserbar.comf082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd.tmp152 B 3
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51c4efc4d4c081af62f7b2d92f00fbbc0
SHA1f6ccecce05b5718b84a39102af857f7a5b05d262
SHA256bd14d07140d13451b4ce2dc20167303d8559fa8bb512e5375621eab2b303cecc
SHA512870363c09ff5dbac1d7fb8d099a6cab1a76e7bb3f33c8307f886db4d9ebaa60e2c8bd4565dfb3d0a5be60671de9b6e896fadc907e856a3ccad3f6c7c6f21e070
-
\Users\Admin\AppData\Local\Temp\is-JRBNH.tmp\f082b3d46adb5bb3a7aca15811072c6557a9440fd370519d8cdef3a7a13de0cd.tmp
Filesize1.1MB
MD5341d01d2cb848e096a4f4c6d09cf1957
SHA1d66940670eafe5b10f9c3bf2cdead8506fac815e
SHA256cb662b012f9230ce4ba6d545d215c133354fd5a747d12541b4653ab70fec0cfe
SHA512ac937982ba65073b6cfe7e30d26cacb69e64edfdfaecb7b1dc50fcec8e5be27ada7b90300477edd4a85e57bc24762101e20f6c5418ce5cdbf1183d8764413b8c
-
Filesize
162KB
MD5b43f1c9e0a21f85c00e73d3de946cde1
SHA1cc71f9b1349a3e54e48a0d0781d69fad28b5ec24
SHA2566eac0fc6c55f21899c085066c8a5170ba90f79b56562d0dad6d99ddc310ad087
SHA5128eaaedcd5282eb55f10b2f99fcf5e71ef48b812971cb721887775c30fc7f1692f71aa2d9248f0b859b0ad4ce42d91f22ea72c4940548efe78a192b6353650f0a
-
Filesize
165KB
MD561ad4bfdb2885d3497596dfad2889c9a
SHA1991979ad59db2c930c85cdc0a6a37ecc8f344e2c
SHA2564ae86843fbb76c8a9bc3c364f85ec8ec1727556970e7ed5c2d31868e631c3162
SHA512799b561f54f841eed856ccebefc9cac90000837afa677f3718e550aa8f0c445e77a37f2eb69c8ec25f734fe64ff63cf7352f6c2ee8f9bb7efc90244582ab3788
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
205KB
MD5dee52c28fb4198cc702f3c379c5e982b
SHA1bb8f5c9f2ddadf3544a6319e66f5a6dd6788decf
SHA256e005bc8003ca90903f021df51c9af6d35b750e67799ecbabed0af71ba54a4231
SHA5120a76e229299f4c799b007cc43723a29fe6306fea9db07a43dab216fa73b952dc0d2a45e3de8267d94203e77a2712574a65bf29a6e322f9f2fd65cf4006d8c838