Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 10:55
Behavioral task
behavioral1
Sample
36602e0bb93ee1ffe80939cf4d06eae0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
36602e0bb93ee1ffe80939cf4d06eae0N.exe
Resource
win10v2004-20240704-en
General
-
Target
36602e0bb93ee1ffe80939cf4d06eae0N.exe
-
Size
91KB
-
MD5
36602e0bb93ee1ffe80939cf4d06eae0
-
SHA1
f9fa6dbde43b49f0a3207c855b9233dca7919cce
-
SHA256
b50e602730106f016362788eb74221c3d6feaeef2d84949e39aba621ed1ed1e4
-
SHA512
2483d2c29b81d15ac78f38c590a9135520032e1483065ed3fb3c3e659b9de8cf4f36e18f98d9c65906d458ba9323a1c42a0d2c807f7ae15881253f32bc790cf4
-
SSDEEP
1536:N5VzcfA/6LrVpL74gfh16nd6S2X9Ca5L4iCsLemHFWF3TPquKjTgTJV65QGExj4J:/V2A/gVh74gpgMPCa5lRemlWVP3ogJof
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2652 llKkQFKkG6jIfRq.exe 2516 CTS.exe -
Loads dropped DLL 2 IoCs
pid Process 2368 36602e0bb93ee1ffe80939cf4d06eae0N.exe 2368 36602e0bb93ee1ffe80939cf4d06eae0N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2368-0-0x00000000008F0000-0x0000000000908000-memory.dmp upx behavioral1/files/0x0008000000016c4e-15.dat upx behavioral1/memory/2368-11-0x00000000008D0000-0x00000000008E8000-memory.dmp upx behavioral1/memory/2368-17-0x00000000008F0000-0x0000000000908000-memory.dmp upx behavioral1/memory/2516-23-0x00000000008D0000-0x00000000008E8000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" 36602e0bb93ee1ffe80939cf4d06eae0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe 36602e0bb93ee1ffe80939cf4d06eae0N.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2368 36602e0bb93ee1ffe80939cf4d06eae0N.exe Token: SeDebugPrivilege 2516 CTS.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2652 2368 36602e0bb93ee1ffe80939cf4d06eae0N.exe 30 PID 2368 wrote to memory of 2652 2368 36602e0bb93ee1ffe80939cf4d06eae0N.exe 30 PID 2368 wrote to memory of 2652 2368 36602e0bb93ee1ffe80939cf4d06eae0N.exe 30 PID 2368 wrote to memory of 2652 2368 36602e0bb93ee1ffe80939cf4d06eae0N.exe 30 PID 2368 wrote to memory of 2516 2368 36602e0bb93ee1ffe80939cf4d06eae0N.exe 31 PID 2368 wrote to memory of 2516 2368 36602e0bb93ee1ffe80939cf4d06eae0N.exe 31 PID 2368 wrote to memory of 2516 2368 36602e0bb93ee1ffe80939cf4d06eae0N.exe 31 PID 2368 wrote to memory of 2516 2368 36602e0bb93ee1ffe80939cf4d06eae0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\36602e0bb93ee1ffe80939cf4d06eae0N.exe"C:\Users\Admin\AppData\Local\Temp\36602e0bb93ee1ffe80939cf4d06eae0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\llKkQFKkG6jIfRq.exeC:\Users\Admin\AppData\Local\Temp\llKkQFKkG6jIfRq.exe2⤵
- Executes dropped EXE
PID:2652
-
-
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD5a6749b968461644db5cc0ecceffb224a
SHA12795aa37b8586986a34437081351cdd791749a90
SHA256720023737d7ff700818f55612ba069a609a5ddea646bb3509b615ee3523a4ca2
SHA5122a276816290746ed914af9cf6427aef31ce9395b8e9937090e329a8f74fb84c62d15b196e13346caa086842b3f5f549b9eb20cbf422d18c9c1b63e6342ea90b4
-
Filesize
64KB
MD5ae6ce17005c63b7e9bf15a2a21abb315
SHA19b6bdfb9d648fa422f54ec07b8c8ea70389c09eb
SHA2564a3387a54eeca83f3a8ff1f5f282f7966c9e7bfe159c8eb45444cab01b3e167e
SHA512c883a5f599540d636efc8c0abc05aab7bad0aa1b10ab507f43f18e0fba905a10b94ff2f1ba10ae0fee15cc1b90a165a768dc078fda0ac27474f0eef66f6a11af