Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 05:51
Static task
static1
Behavioral task
behavioral1
Sample
83462c00333b20021fbb408da39ca430N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
83462c00333b20021fbb408da39ca430N.exe
Resource
win10v2004-20240802-en
General
-
Target
83462c00333b20021fbb408da39ca430N.exe
-
Size
159KB
-
MD5
83462c00333b20021fbb408da39ca430
-
SHA1
71a7255f72440bdc88e8da73540ec411761f02bb
-
SHA256
ecdc8ca79cbc5d4e2f8ab1ddc00dbfe193b75b9206ea5d74e3a44b51754c33cb
-
SHA512
1d215a568c07164e3e12bc52eb08937e5ef760ac0ab1da2c06048253744c67f2f478dca163bdba0d77d9bc26072ec3dd589728db92aa46e9149343e35969b2b9
-
SSDEEP
3072:9jh85+KsoQLHMoZDcLwdM8a5Dpv+P02T/y2IvGWdd5yAcK:9jhw+7RF+IML/vi02T/y2IPEAf
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2312 kd3OwAVFBt3kzg9.exe 2324 svhost.exe -
Loads dropped DLL 1 IoCs
pid Process 2300 83462c00333b20021fbb408da39ca430N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winhost = "C:\\Windows\\svhost.exe" svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winhost = "C:\\Windows\\svhost.exe" 83462c00333b20021fbb408da39ca430N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svhost.exe 83462c00333b20021fbb408da39ca430N.exe File created C:\Windows\svhost.exe svhost.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 83462c00333b20021fbb408da39ca430N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2300 83462c00333b20021fbb408da39ca430N.exe Token: SeDebugPrivilege 2324 svhost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2312 2300 83462c00333b20021fbb408da39ca430N.exe 30 PID 2300 wrote to memory of 2312 2300 83462c00333b20021fbb408da39ca430N.exe 30 PID 2300 wrote to memory of 2312 2300 83462c00333b20021fbb408da39ca430N.exe 30 PID 2300 wrote to memory of 2312 2300 83462c00333b20021fbb408da39ca430N.exe 30 PID 2300 wrote to memory of 2324 2300 83462c00333b20021fbb408da39ca430N.exe 32 PID 2300 wrote to memory of 2324 2300 83462c00333b20021fbb408da39ca430N.exe 32 PID 2300 wrote to memory of 2324 2300 83462c00333b20021fbb408da39ca430N.exe 32 PID 2300 wrote to memory of 2324 2300 83462c00333b20021fbb408da39ca430N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\83462c00333b20021fbb408da39ca430N.exe"C:\Users\Admin\AppData\Local\Temp\83462c00333b20021fbb408da39ca430N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\kd3OwAVFBt3kzg9.exeC:\Users\Admin\AppData\Local\Temp\kd3OwAVFBt3kzg9.exe2⤵
- Executes dropped EXE
PID:2312
-
-
C:\Windows\svhost.exe"C:\Windows\svhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD55e7c375139b7453abd0b91a8a220f8e5
SHA188a3d645fab0f4129c1e485c90b593ab60e469ae
SHA25636ec99991653fa54be6f638d0b95eeac3e3f5e3006e4320318c4aa6fc2e330a8
SHA5120805763fe788e0edeb69747d2f419842dc093c2d871d39f25afe2cd27867d54f90fa15892ff5e8c7148280c1ca9b90a0a375f56c277e5d442257c9e77295f1b2
-
Filesize
143KB
MD538f108cddb6619fba80f8382d5227ece
SHA112fd277bf756f22cfae3043900e4aff8b9f05ed9
SHA2568296fe257b8c34398e3f291764454ec3cd9cbe06d60989b632ef4ba6c73ae5dc
SHA5123db732c23f10122c78cffc6b6a5b11836ade1a23f5c6f9a192f2be2fa99c5bd7afb7a9e29c5d518a888cdd2091f9ac41b244214be226152830e96f5ec2cca424