Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
112s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 08:10
Behavioral task
behavioral1
Sample
6c2797ad19fab8fdcdeca97be0fdd700N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6c2797ad19fab8fdcdeca97be0fdd700N.exe
Resource
win10v2004-20240709-en
General
-
Target
6c2797ad19fab8fdcdeca97be0fdd700N.exe
-
Size
27KB
-
MD5
6c2797ad19fab8fdcdeca97be0fdd700
-
SHA1
8e69fe495c5c8c162a2e65b103f3e03cde51810f
-
SHA256
45d829c5fd80646fa4b1e0296b19a82f7f1688ea037b810da8d4e77ae25738a8
-
SHA512
31b8f95593e03396954f05bdf386af6d5c9bfd793ea1ecb2f79f7e63f1bec99fd2891a7ecf373aefef6d486acd14da44655af45443987ae72f4fb0cc97767fed
-
SSDEEP
768:X9J/3FzjgfanEGx8V36unjv88tznuRU65Y4gpph1ePVCMu:N5VzcfA/6LrVpL74gfh16nu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2908 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2552-0-0x00000000010C0000-0x00000000010D8000-memory.dmp upx behavioral1/files/0x0008000000016d81-12.dat upx behavioral1/memory/2552-11-0x00000000010C0000-0x00000000010D8000-memory.dmp upx behavioral1/memory/2552-5-0x00000000000E0000-0x00000000000F8000-memory.dmp upx behavioral1/files/0x000c000000016d58-63.dat upx behavioral1/memory/2908-65-0x0000000001320000-0x0000000001338000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" 6c2797ad19fab8fdcdeca97be0fdd700N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe 6c2797ad19fab8fdcdeca97be0fdd700N.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2552 6c2797ad19fab8fdcdeca97be0fdd700N.exe Token: SeDebugPrivilege 2908 CTS.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2908 2552 6c2797ad19fab8fdcdeca97be0fdd700N.exe 29 PID 2552 wrote to memory of 2908 2552 6c2797ad19fab8fdcdeca97be0fdd700N.exe 29 PID 2552 wrote to memory of 2908 2552 6c2797ad19fab8fdcdeca97be0fdd700N.exe 29 PID 2552 wrote to memory of 2908 2552 6c2797ad19fab8fdcdeca97be0fdd700N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c2797ad19fab8fdcdeca97be0fdd700N.exe"C:\Users\Admin\AppData\Local\Temp\6c2797ad19fab8fdcdeca97be0fdd700N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD5907822455f4a13fa8eaa94e61184503a
SHA1231614143cdff35b0170a61600de43daf8bfb8c3
SHA25654b6bc991563e20e18494d84694aad15a8b34746b56001e6ca700c973cd3f1bd
SHA5128413c9e245f36adab1167f9dee304911dfff19d2eed65200d4baca1afe58b7eb925f174ee1f9f88c1ece43624bf651897eb9ad448a49b0a28747c2d9eb2c280d
-
Filesize
27KB
MD5a6749b968461644db5cc0ecceffb224a
SHA12795aa37b8586986a34437081351cdd791749a90
SHA256720023737d7ff700818f55612ba069a609a5ddea646bb3509b615ee3523a4ca2
SHA5122a276816290746ed914af9cf6427aef31ce9395b8e9937090e329a8f74fb84c62d15b196e13346caa086842b3f5f549b9eb20cbf422d18c9c1b63e6342ea90b4