Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 22:09
Static task
static1
Behavioral task
behavioral1
Sample
5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe
Resource
win10v2004-20240611-en
General
-
Target
5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe
-
Size
357KB
-
MD5
5209f601f75ee3e823f2e584f77b03f4
-
SHA1
755193138f704c9797df3880302f0abf81e53eba
-
SHA256
5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f
-
SHA512
a3651f7410f0ef99e72dc071baf7f567b757828da6dced8283cf095729f3d7ac32688b7b949616b339c5649dd9f4ffb7558c4d9e9e8d77604c2af30c37935578
-
SSDEEP
6144:/rTfUHeeSKOS9ccFKk3Y9t9YZJqCBX+kqmCJds:/n8yN0Mr8ZJquUls
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 22 IoCs
resource yara_rule behavioral1/files/0x0038000000015d28-1.dat UPX behavioral1/memory/1952-12-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2232-15-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/1952-11-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/1780-17-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2608-20-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2640-27-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2232-30-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2232-31-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2232-34-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2232-35-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2232-42-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2232-43-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2232-51-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2232-52-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2232-58-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2232-59-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2232-70-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2232-71-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2232-79-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2232-80-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral1/memory/2232-92-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX -
Executes dropped EXE 4 IoCs
pid Process 2232 Isass.exe 1780 Isass.exe 2640 Isass.exe 2724 5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe -
Loads dropped DLL 8 IoCs
pid Process 1952 5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe 1952 5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe 1952 5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe 1952 5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe 2608 5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe 2608 5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe 2640 Isass.exe 2232 Isass.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1952 5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe 2232 Isass.exe 1780 Isass.exe 1780 Isass.exe 1780 Isass.exe 2608 5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe 2640 Isass.exe 2640 Isass.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2232 1952 5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe 28 PID 1952 wrote to memory of 2232 1952 5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe 28 PID 1952 wrote to memory of 2232 1952 5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe 28 PID 1952 wrote to memory of 2232 1952 5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe 28 PID 1952 wrote to memory of 1780 1952 5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe 29 PID 1952 wrote to memory of 1780 1952 5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe 29 PID 1952 wrote to memory of 1780 1952 5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe 29 PID 1952 wrote to memory of 1780 1952 5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe 29 PID 1780 wrote to memory of 2608 1780 Isass.exe 30 PID 1780 wrote to memory of 2608 1780 Isass.exe 30 PID 1780 wrote to memory of 2608 1780 Isass.exe 30 PID 1780 wrote to memory of 2608 1780 Isass.exe 30 PID 2608 wrote to memory of 2640 2608 5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe 31 PID 2608 wrote to memory of 2640 2608 5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe 31 PID 2608 wrote to memory of 2640 2608 5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe 31 PID 2608 wrote to memory of 2640 2608 5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe 31 PID 2640 wrote to memory of 2724 2640 Isass.exe 32 PID 2640 wrote to memory of 2724 2640 Isass.exe 32 PID 2640 wrote to memory of 2724 2640 Isass.exe 32 PID 2640 wrote to memory of 2724 2640 Isass.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe"C:\Users\Admin\AppData\Local\Temp\5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2232
-
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe"C:\Users\Admin\AppData\Local\Temp\5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe"C:\Users\Admin\AppData\Local\Temp\5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe"5⤵
- Executes dropped EXE
PID:2724
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\5bd2f0540f6facd358ebd73b1b9edad5d825fee8816def9356354e4343ce220f.exe
Filesize140KB
MD51793928d1c8daf03a8b67a60a0ffbd93
SHA1c777c5be2321bf493877efef590eec8c822e2072
SHA25684a2bb3191f370ba456dd8637e08cd47ef1c80a54d081881cd1e16a8c67f0238
SHA51264ef94fb34b637c5d40878f4d3b0db7f2d74e89be35fca959ee9354cdf8f5bd61d90e8aa1ff795ddafe60ba5d1a0d4b57c41b1bf8750d24d685aa98f4142c11a
-
Filesize
216KB
MD5189d4b2a83e17869255961df5c63933e
SHA15ea50055133566dce52e5dc262dba169d4aa1ac0
SHA256305a51d23f4b2f395722608873e097a767ab74a0d75d31ec98a000fa4625842e
SHA512960d9ab4ff1f6d4d8245d6b48a089d89c2b0976c8b10ec29e9a4df834f73b12262d5e7796f9a49c9e23b12d69d4740dba01bb8ea751072dd979307bc19a8517e