Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 20:04

General

  • Target

    6d236c68dd1c7e2a4754cf749601aaa4619ecd15457935d7decb8ab926442f40.exe

  • Size

    17KB

  • MD5

    ec4b6cb51f8ac1e2fee1b105a242e375

  • SHA1

    05c8eddf8dbe1ee6db1339ea258428f488d0d9fb

  • SHA256

    6d236c68dd1c7e2a4754cf749601aaa4619ecd15457935d7decb8ab926442f40

  • SHA512

    8a117c7446ad99146e7c7f1c875961d33793d72f56e68578f9d5a7766c8803801958b7c080f8a8ad12696d7b98a87ff2c21be6e84bdf31f46262affd37a0bb94

  • SSDEEP

    192:nx+uPBkqyIfgm64++u6gzYMzZ0dqsEq65+O0I5L0pJ/WDvd0EtITbKH62RTs2/fj:x+uPfoQ+DfYMzKdPEsOuubuEG3KHM2/L

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d236c68dd1c7e2a4754cf749601aaa4619ecd15457935d7decb8ab926442f40.exe
    "C:\Users\Admin\AppData\Local\Temp\6d236c68dd1c7e2a4754cf749601aaa4619ecd15457935d7decb8ab926442f40.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Windows\svhost.exe
      "C:\Windows\svhost.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\KlXlDmyF8L2LuTc.exe

    Filesize

    17KB

    MD5

    5bfa0969358fb60bfcc721d9470baae3

    SHA1

    4c5bd414747cb5a32f4fe5b72662f24dd92444bd

    SHA256

    7b37b3bf425563aa24476365876a25f4ccc7f3ef8b4daf03ef44f1f5745c9e8a

    SHA512

    32c05eba57c8b8b46707eaea5be6e5904b238fd889a417a2bf6a7031afad4b25944e8d92457818c0a72d952bf04e17ec0b51c5dce957ae21f37f1d2897196752

  • C:\Windows\svhost.exe

    Filesize

    16KB

    MD5

    76fd02b48297edb28940bdfa3fa1c48a

    SHA1

    bf5cae1057a0aca8bf3aab8b121fe77ebb0788ce

    SHA256

    07abd35f09b954eba7011ce18b225017c50168e039732680df58ae703324825c

    SHA512

    28c7bf4785547f6df9d678699a55cfb24c429a2bac5375733ff2f760c92933190517d8acd740bdf69c3ecc799635279af5d7ebd848c5b471318d1f330c441ff0