Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23/07/2024, 21:58

General

  • Target

    c882557d69cd1db1090fb404707256c614bf7d0fe46c601238f3f99a4e2c219c.exe

  • Size

    1.1MB

  • MD5

    f1a680421f737526b10ec2142bfe0e1f

  • SHA1

    157c6433e433fb7ad9a64ed3fb968e7e51981ee0

  • SHA256

    c882557d69cd1db1090fb404707256c614bf7d0fe46c601238f3f99a4e2c219c

  • SHA512

    d51684ea62cb9bc34912d14b10975f3ff25063df6d36164a57ffe22749db5f78fb820542e6d63a2a539e1984a6d4f27fce1a472bb35cebef200609d721886448

  • SSDEEP

    24576:Sp9mNaOPOeZ4ZRQVxj3kWO1pgkysLbIqBcDu5GY/cj4coCYHb0YLF05:6vy4ZRQVZkDIqBR5GY/cUcoph+5

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c882557d69cd1db1090fb404707256c614bf7d0fe46c601238f3f99a4e2c219c.exe
    "C:\Users\Admin\AppData\Local\Temp\c882557d69cd1db1090fb404707256c614bf7d0fe46c601238f3f99a4e2c219c.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\CyberLink\CBE\D8D760AC-ACA2-493e-9623-61E9D47DE89C\c882557d69cd1db1090fb404707256c614bf7d0fe46c601238f3f99a4e2c219c.exe_v2\8a87f4fb-1c55-4e53-956d-633630e7d570.json

    Filesize

    891B

    MD5

    be6d0f8ded4a76d3aa05600b3f124012

    SHA1

    40b4c1bc91e933a1bcc761a04b5eb9b743fbd2e5

    SHA256

    51c3259bdbdd709abad58552392a75d479fe593a81026c87046f05e5f7b2e799

    SHA512

    9339960ef55b1fb3d2c2d94b4a8489e890a7524749c3990ff972114a88d945339eb6b34a305cd1d97e84a1abcb08c2c4fe75062def5c255e011b73123de06f5f

  • C:\ProgramData\CyberLink\CBE\D8D760AC-ACA2-493e-9623-61E9D47DE89C\c882557d69cd1db1090fb404707256c614bf7d0fe46c601238f3f99a4e2c219c.exe_v2\UNO.ini

    Filesize

    7B

    MD5

    be9d6efbd8632e482c64618f00a701fa

    SHA1

    cc7c0702a34305282ba77d4eb88db1fa0bbed850

    SHA256

    d94fd0c7e43df0a03014a44d79653c0845adb29e6222ca47718c46af90847b84

    SHA512

    c59eee3a838ec35f447c28a701289f3f35ea5ec08d0c38df54482b39a2219598074d49fc162b1ef46d9e20c336221f53bc86de7163183193001b466ff36dd5c8

  • C:\Users\Admin\AppData\Local\Temp\8a87f4fb-1c55-4e53-956d-633630e7d570.json

    Filesize

    435B

    MD5

    515ec1c97c4a116f9613bc8659fdcdd6

    SHA1

    f5d6bce40018dd380dcbeba1a9cabd15270be96c

    SHA256

    6e16c0477efd55ca5dbd86ad65a8ef4b5ecbcdb10ecc3de723e05af155ea7c46

    SHA512

    14c7f2f35a0ab96159a093290447699ce3bd50207c19398b8e6ab42545c574f434703e84f9598401f35e4286831af04c0fc25b066eb91ba628a2fb91b6776b6d