Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 19:04

General

  • Target

    1383a84b35a27b4d6c6aa6655e894a1f2f019e468b117a182981e1e2a230e0d5.exe

  • Size

    556KB

  • MD5

    3f430d7cb9b35dca2c1b5bd97dc35dc2

  • SHA1

    57cb573ecd71272f9f3eefd1e5cb7cff8c260e1b

  • SHA256

    1383a84b35a27b4d6c6aa6655e894a1f2f019e468b117a182981e1e2a230e0d5

  • SHA512

    e41259c2bdf972535bb46bef2d0a91044e1687f56d65e0b0f08831b42aa11a465ca7d25038593856881ba2233de8c1a0ff195aa65756cd8abce88180845c927b

  • SSDEEP

    12288:JXCNi9BWWre0axaLdiFzNNBBX0LFB7DqDFmAgH4Cqb1IKKB9ylk/bh5MKcVp:sWGZaL01c7mDFmAgGRIKKSk/b/MKcP

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1383a84b35a27b4d6c6aa6655e894a1f2f019e468b117a182981e1e2a230e0d5.exe
    "C:\Users\Admin\AppData\Local\Temp\1383a84b35a27b4d6c6aa6655e894a1f2f019e468b117a182981e1e2a230e0d5.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2864
    • C:\Users\Admin\AppData\Local\Temp\1383a84b35a27b4d6c6aa6655e894a1f2f019e468b117a182981e1e2a230e0d5.exe
      "C:\Users\Admin\AppData\Local\Temp\1383a84b35a27b4d6c6aa6655e894a1f2f019e468b117a182981e1e2a230e0d5.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2612
      • C:\Users\Admin\AppData\Local\Temp\1383a84b35a27b4d6c6aa6655e894a1f2f019e468b117a182981e1e2a230e0d5.exe
        "C:\Users\Admin\AppData\Local\Temp\1383a84b35a27b4d6c6aa6655e894a1f2f019e468b117a182981e1e2a230e0d5.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2052
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 364
      2⤵
      • Program crash
      PID:1560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Windows Sidebar\Shared Gadgets\black porn gay several models ash (Jenna,Samantha).avi.exe

    Filesize

    204KB

    MD5

    7091169001b387c7c2c85b9797679b18

    SHA1

    546ad411c606a6d87f25c41a71093a29745cadfb

    SHA256

    5e103880c3ce19f0332e93ff6b724ad949fbb858f66865cc5794c37f4ac7d9ca

    SHA512

    bb52e90349b6617c77b36c3b7121f651eda96c22180426d5ac1a0ba94118796b20b39390893091a1568536058ea08f2377b9fdbe88e42ba9dae21b39f407beb5

  • C:\debug.txt

    Filesize

    183B

    MD5

    2af1ad5e04b7caa8e0681fb325272a80

    SHA1

    f3653fbcc7c56e1a5422844d2296fb9794b87bb5

    SHA256

    bc6c81f6c95408e148c0a199d28c195d13d0038e9ac5123fefdbc8a007d3ff12

    SHA512

    66b6efedeefbbf8bdae85088436d5da10d65394816ef97fa1535d946f659e74d972cd28016b8a7ad5b74d3f1a3c263c0bfc2b995266ed26deff9ec5a3767479a