Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
126s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 01:41
Static task
static1
Behavioral task
behavioral1
Sample
441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe
Resource
win7-20240221-en
General
-
Target
441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe
-
Size
749KB
-
MD5
a6479dae68115fad0a37c5fb33becf99
-
SHA1
398663b27c9297a884c800aa64916c976638a036
-
SHA256
441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb
-
SHA512
aa3dc1b98aa53708a2b9834fb3dc0585ae5deffa168fe65d2aff3d80f4b0849c41d3cbd37e306ac6bfbfe5689e8c625828c93453fd21d5f7ecc0b16ad85f7452
-
SSDEEP
12288:Cv2E2CrJF9srANfrX8QoN2e9YxzKapgg3e8SIa+9j8CfL6qd8kAXDbvDYD:jE2CrJdNfjrfJ+aX3e8DaOj8wL6e
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2600 dwm.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files\Windows Sidebar\fr-FR\c5b4cb5e9653cc 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe File created C:\Program Files\Windows Media Player\es-ES\lsass.exe 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe File created C:\Program Files\Windows Media Player\es-ES\6203df4a6bafc7 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe File created C:\Program Files (x86)\MSBuild\dwm.exe 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe File created C:\Program Files\Windows Sidebar\fr-FR\services.exe 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe File opened for modification C:\Program Files\Windows Media Player\es-ES\lsass.exe 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe File created C:\Program Files (x86)\MSBuild\6cb0b6c459d5d3 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe File created C:\Program Files (x86)\Internet Explorer\es-ES\explorer.exe 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe File created C:\Program Files (x86)\Internet Explorer\es-ES\7a0fd90576e088 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 2600 dwm.exe 2600 dwm.exe 2600 dwm.exe 2600 dwm.exe 2600 dwm.exe 2600 dwm.exe 2600 dwm.exe 2600 dwm.exe 2600 dwm.exe 2600 dwm.exe 2600 dwm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2600 dwm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe Token: SeDebugPrivilege 2600 dwm.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1592 wrote to memory of 2984 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 28 PID 1592 wrote to memory of 2984 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 28 PID 1592 wrote to memory of 2984 1592 441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe 28 PID 2984 wrote to memory of 2520 2984 cmd.exe 30 PID 2984 wrote to memory of 2520 2984 cmd.exe 30 PID 2984 wrote to memory of 2520 2984 cmd.exe 30 PID 2984 wrote to memory of 2564 2984 cmd.exe 31 PID 2984 wrote to memory of 2564 2984 cmd.exe 31 PID 2984 wrote to memory of 2564 2984 cmd.exe 31 PID 2984 wrote to memory of 2600 2984 cmd.exe 32 PID 2984 wrote to memory of 2600 2984 cmd.exe 32 PID 2984 wrote to memory of 2600 2984 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe"C:\Users\Admin\AppData\Local\Temp\441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6YuPbH1TRd.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2520
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:2564
-
-
C:\Program Files (x86)\MSBuild\dwm.exe"C:\Program Files (x86)\MSBuild\dwm.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
749KB
MD5a6479dae68115fad0a37c5fb33becf99
SHA1398663b27c9297a884c800aa64916c976638a036
SHA256441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb
SHA512aa3dc1b98aa53708a2b9834fb3dc0585ae5deffa168fe65d2aff3d80f4b0849c41d3cbd37e306ac6bfbfe5689e8c625828c93453fd21d5f7ecc0b16ad85f7452
-
Filesize
214B
MD52e857cf567dd2bbf7575802b6e9c2601
SHA1df40254ce082cde1222f56096b9776ccaabf981d
SHA256d017b1a24cff046ea63d1d1bf13beecdd92c3e33f2f0e384e7b5e4009e35cab1
SHA512139dc4213104d12fa29d730a89cb68bcafaa718f23b74d61a0803cb9049241854070c78311529e7caf2670cc97ba2aafc7e8f5bdcb924bb9dec34feca65f7ba2