Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 04:26
Static task
static1
Behavioral task
behavioral1
Sample
cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe
Resource
win10v2004-20240419-en
General
-
Target
cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe
-
Size
1.1MB
-
MD5
6a5a8c18485a6aeff8bb93be025db1cd
-
SHA1
103bea545e9d9256aa4fd52b567ab3f05271e4aa
-
SHA256
cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f
-
SHA512
0da147bba5fe0838444b1a031c666942c48584b1627613c83a158df39bfe59ba60d19204396e1b7d6b37e14f537ade145f421f39d65d055b41189162c0e71284
-
SSDEEP
12288:9n8yN0Mr8VZOSzt9tzZxpwXK4Qzh+jMlWCEh/iZyzBLZiSjJ5KH2awbx3QLKwM:FPuVZOSzXFZxpwiz0wy/9BTq+x3QLs
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 20 IoCs
resource yara_rule behavioral1/files/0x0034000000016122-6.dat UPX behavioral1/memory/3036-9-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/3036-16-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2216-17-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2044-25-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2216-76-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2216-77-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2216-80-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2216-81-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2216-88-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2216-89-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2216-97-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2216-98-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2216-104-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2216-105-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2216-113-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2216-114-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2216-126-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2216-127-0x0000000000400000-0x00000000016A8000-memory.dmp UPX behavioral1/memory/2216-140-0x0000000000400000-0x00000000016A8000-memory.dmp UPX -
Executes dropped EXE 4 IoCs
pid Process 2216 Isass.exe 2044 Isass.exe 2532 cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe 2384 cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe -
Loads dropped DLL 10 IoCs
pid Process 3036 cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe 3036 cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe 3036 cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe 3036 cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe 2044 Isass.exe 2532 cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe 2384 cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe 2216 Isass.exe 2216 Isass.exe 2216 Isass.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3036 cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe 2216 Isass.exe 2044 Isass.exe 2044 Isass.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2216 3036 cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe 28 PID 3036 wrote to memory of 2216 3036 cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe 28 PID 3036 wrote to memory of 2216 3036 cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe 28 PID 3036 wrote to memory of 2216 3036 cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe 28 PID 3036 wrote to memory of 2044 3036 cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe 29 PID 3036 wrote to memory of 2044 3036 cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe 29 PID 3036 wrote to memory of 2044 3036 cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe 29 PID 3036 wrote to memory of 2044 3036 cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe 29 PID 2044 wrote to memory of 2532 2044 Isass.exe 30 PID 2044 wrote to memory of 2532 2044 Isass.exe 30 PID 2044 wrote to memory of 2532 2044 Isass.exe 30 PID 2044 wrote to memory of 2532 2044 Isass.exe 30 PID 2044 wrote to memory of 2532 2044 Isass.exe 30 PID 2044 wrote to memory of 2532 2044 Isass.exe 30 PID 2044 wrote to memory of 2532 2044 Isass.exe 30 PID 2532 wrote to memory of 2384 2532 cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe 31 PID 2532 wrote to memory of 2384 2532 cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe 31 PID 2532 wrote to memory of 2384 2532 cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe 31 PID 2532 wrote to memory of 2384 2532 cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe 31 PID 2532 wrote to memory of 2384 2532 cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe 31 PID 2532 wrote to memory of 2384 2532 cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe 31 PID 2532 wrote to memory of 2384 2532 cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe"C:\Users\Admin\AppData\Local\Temp\cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe"C:\Users\Admin\AppData\Local\Temp\cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\Temp\{D12813AA-6B30-40FC-87AF-6A94362DD83E}\.cr\cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe"C:\Windows\Temp\{D12813AA-6B30-40FC-87AF-6A94362DD83E}\.cr\cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe" -burn.filehandle.attached=180 -burn.filehandle.self=1884⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2384
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
450KB
MD56769f78e265852c88a6850c91391d414
SHA1bfa7647c3c4589cc3693677a51eb9157b73e36c1
SHA256de50d943bbf9e955a3965f742e3eeb236e5302e6ab125a597bda84b4c458b1e9
SHA512ce25d325f8bf85e016996d26ad4cfde523bb4a3d75610e17385b887cc30d5d728e9e1e1bbe17901593f9ca6a2dfb805ea6ad66e8df885b691b441e80969add57
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
\Users\Admin\AppData\Local\Temp\cc8b7476b414acfce4a6a10437473098e7cf272e27fc1723786e631bf6d2d86f.exe
Filesize632KB
MD5c27046bd35c5717084bb40c7305b941a
SHA151510a7753dd2a1236b34b495db21ef18a74c25c
SHA256e0bc82c13bcd1ade084a0421dab88e23e9cc5499323449e585e7dd2116951bd3
SHA512df9dc98043ea5b86c671e769a75e569366223c5a291f5eed22f68af9783a0aa295d8bb0ee0b510767cce7961f2e501124d9fe656044766644e18682f21446214
-
Filesize
191KB
MD5eab9caf4277829abdf6223ec1efa0edd
SHA174862ecf349a9bedd32699f2a7a4e00b4727543d
SHA256a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041
SHA51245b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2