Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 19:11
Static task
static1
Behavioral task
behavioral1
Sample
19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe
Resource
win10v2004-20240704-en
General
-
Target
19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe
-
Size
864KB
-
MD5
70b6803237853f5eb9a7aa1c3afdad7f
-
SHA1
93e79bed55e798e544b7554c820bf3e1fc1fcbed
-
SHA256
19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188
-
SHA512
47d7f8db39940d06520e889cbf10c926468d7799f1afdf4af0eb77cc106a600da918ff649223b5c0ec314ef19e757bf6777dbad3523c76cd4cc8b2034cb1e6b3
-
SSDEEP
12288:Zv1nWdQP1EDhZPxUTDYrGiVrzBrB8x4w6Ic7FQQN8e6yHI+1Dn+im49TOesj6DG3:Z9ndEVfUTpitz3FtFnNJ6m1jAes+DGL7
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1628 Isass.exe 2428 RU_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 2756 RU_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe -
Loads dropped DLL 6 IoCs
pid Process 1732 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 1732 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 1732 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 2428 RU_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 2756 RU_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 1628 Isass.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Program Files (x86)\\Microsoft Build\\Isass.exe" 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Program Files (x86)\\Microsoft Build\\Isass.exe" 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Build\Isass.exe 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1732 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 1628 Isass.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1628 1732 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 30 PID 1732 wrote to memory of 1628 1732 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 30 PID 1732 wrote to memory of 1628 1732 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 30 PID 1732 wrote to memory of 1628 1732 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 30 PID 1732 wrote to memory of 2428 1732 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 31 PID 1732 wrote to memory of 2428 1732 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 31 PID 1732 wrote to memory of 2428 1732 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 31 PID 1732 wrote to memory of 2428 1732 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 31 PID 1732 wrote to memory of 2428 1732 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 31 PID 1732 wrote to memory of 2428 1732 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 31 PID 1732 wrote to memory of 2428 1732 19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 31 PID 2428 wrote to memory of 2756 2428 RU_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 32 PID 2428 wrote to memory of 2756 2428 RU_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 32 PID 2428 wrote to memory of 2756 2428 RU_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 32 PID 2428 wrote to memory of 2756 2428 RU_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 32 PID 2428 wrote to memory of 2756 2428 RU_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 32 PID 2428 wrote to memory of 2756 2428 RU_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 32 PID 2428 wrote to memory of 2756 2428 RU_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe"C:\Users\Admin\AppData\Local\Temp\19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Microsoft Build\Isass.exe"C:\Program Files (x86)\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1628
-
-
C:\Users\Admin\AppData\Local\Temp\RU_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe"C:\Users\Admin\AppData\Local\Temp\RU_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\Temp\{4BB1B707-AE0A-4F1E-9A59-5036703C6452}\.cr\RU_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe"C:\Windows\Temp\{4BB1B707-AE0A-4F1E-9A59-5036703C6452}\.cr\RU_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\RU_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe" -burn.filehandle.attached=180 -burn.filehandle.self=1883⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2756
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD51566dec0c572f2818b31b7d4d92574d9
SHA126b2aa506dcd29aeeab19adec8de747931b62f41
SHA256d0e8aa26815914db1cbf88f6d31fe33a16323441a36636d6e4ef3b1531ad3dfb
SHA51213fb9370332a29836ae12b21afac038498c5242655fb9703f23fd21d86b95f099a3334e0c2d8dc2a86a2114ea3a919917f3f21d54ccecc10dfaf54eb4fd3ad5a
-
Filesize
4KB
MD59eb0320dfbf2bd541e6a55c01ddc9f20
SHA1eb282a66d29594346531b1ff886d455e1dcd6d99
SHA2569095bf7b6baa0107b40a4a6d727215be077133a190f4ca9bd89a176842141e79
SHA5129ada3a1757a493fbb004bd767fab8f77430af69d71479f340b8b8ede904cc94cd733700db593a4a2d2e1184c0081fd0648318d867128e1cb461021314990931d
-
\Users\Admin\AppData\Local\Temp\RU_19d3824c60fc16430938c0120e39982093ac631570f2ed42d9cf1b738817c188.exe
Filesize611KB
MD5f128e3e0f84eccc3dbbdee42ff9435e1
SHA10b3dbe89c14dd81cce548104cf7b43b9d8fa8b52
SHA25610b3f98dd53d37a2b7f6ab31058a5c858b7ae1e845fd48aadbbec8da2d1239cd
SHA512eebd53e8261c568b0094da504315022bd6f020541c839e33d0351c224449162e0a592e4850aeb872fd639b4fd23c2b4c05c210f6672f5f4aeb94d4076b409eea
-
Filesize
197KB
MD54356ee50f0b1a878e270614780ddf095
SHA1b5c0915f023b2e4ed3e122322abc40c4437909af
SHA25641a8787fdc9467f563438daba4131191aa1eb588a81beb9a89fe8bd886c16104
SHA512b9e482efe9189683dabfc9feff8b386d7eba4ecf070f42a1eebee6052cfb181a19497f831f1ea6429cfcce1d4865a5d279b24bd738d702902e9887bb9f0c4691