Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 06:58
Static task
static1
Behavioral task
behavioral1
Sample
61ee60da4584d6c14e2ff83fb96ee8d0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
61ee60da4584d6c14e2ff83fb96ee8d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
61ee60da4584d6c14e2ff83fb96ee8d0N.exe
-
Size
254KB
-
MD5
61ee60da4584d6c14e2ff83fb96ee8d0
-
SHA1
9d8dc6f72e2ea981e1fc28be3bfa4067f21c15a2
-
SHA256
af6f6618d0587d510a90d9443c83cd03ae01a05b5aaf5ca8f6998c4dea593337
-
SHA512
66102382e7eab8d96134d946e7b4d1a4762923768122c50d42661e8552038bc445d700d9f9ffae0fa6189d9368d10f24ca6e373bdc77ed16a930467863444cf4
-
SSDEEP
6144:GjYKlAhUBVB3pQOS+hENlFgy81B9fAd0RPhQgXi0qOt+xCi:GjYRm7QOS+ynFgDS0ZYtOt6R
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2264 CTS.exe 2912 UTZYRMNvUj0OBHI.exe -
Loads dropped DLL 1 IoCs
pid Process 2516 61ee60da4584d6c14e2ff83fb96ee8d0N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" 61ee60da4584d6c14e2ff83fb96ee8d0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe 61ee60da4584d6c14e2ff83fb96ee8d0N.exe File created C:\Windows\CTS.exe CTS.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61ee60da4584d6c14e2ff83fb96ee8d0N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2516 61ee60da4584d6c14e2ff83fb96ee8d0N.exe Token: SeDebugPrivilege 2264 CTS.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2912 2516 61ee60da4584d6c14e2ff83fb96ee8d0N.exe 30 PID 2516 wrote to memory of 2912 2516 61ee60da4584d6c14e2ff83fb96ee8d0N.exe 30 PID 2516 wrote to memory of 2912 2516 61ee60da4584d6c14e2ff83fb96ee8d0N.exe 30 PID 2516 wrote to memory of 2912 2516 61ee60da4584d6c14e2ff83fb96ee8d0N.exe 30 PID 2516 wrote to memory of 2264 2516 61ee60da4584d6c14e2ff83fb96ee8d0N.exe 31 PID 2516 wrote to memory of 2264 2516 61ee60da4584d6c14e2ff83fb96ee8d0N.exe 31 PID 2516 wrote to memory of 2264 2516 61ee60da4584d6c14e2ff83fb96ee8d0N.exe 31 PID 2516 wrote to memory of 2264 2516 61ee60da4584d6c14e2ff83fb96ee8d0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\61ee60da4584d6c14e2ff83fb96ee8d0N.exe"C:\Users\Admin\AppData\Local\Temp\61ee60da4584d6c14e2ff83fb96ee8d0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\UTZYRMNvUj0OBHI.exeC:\Users\Admin\AppData\Local\Temp\UTZYRMNvUj0OBHI.exe2⤵
- Executes dropped EXE
PID:2912
-
-
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD50f736d30fbdaebed364c4cd9f084e500
SHA1d7e96b736463af4b3edacd5cc5525cb70c593334
SHA256431b7f30b7f8d520f69066b03b8dccbb35a6cb40a53c5e2320c6b5acf96b2e34
SHA512570a2f76d653414fedc12ed486f2bf0333dc860f52d70faa895d6b9951ac185317637d7b076e05c932f4c536259e19a952a716e9516d506d2a19de73c50f2566
-
Filesize
168KB
MD517275206102d1cf6f17346fd73300030
SHA1bbec93f6fb2ae56c705efd6e58d6b3cc68bf1166
SHA256dead0ebd5b5bf5d4b0e68ba975e9a70f98820e85d056b0a6b3775fc4df4da0f6
SHA512ce14a4f95328bb9ce437c5d79084e9d647cb89b66cde86a540b200b1667edc76aa27a36061b6e2ceccecb70b9a011b4bd54040e2a480b8546888ba5cc84a01b3