Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
110s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 08:42
Static task
static1
Behavioral task
behavioral1
Sample
55ca8ad51323f61d22270c058ce2afe0N.exe
Resource
win7-20240708-en
General
-
Target
55ca8ad51323f61d22270c058ce2afe0N.exe
-
Size
1.2MB
-
MD5
55ca8ad51323f61d22270c058ce2afe0
-
SHA1
31eaaf1f3c2ec356a731b2bd9b5c3040feb8806d
-
SHA256
25eaca238eb0e1f75a03faf9fb52520d0898c1f84cf1bc0b8395abaaf40e5436
-
SHA512
a1ddbe19ada5d44352b96c6ab7ee1854f8acd2254f647e875cd9c6ae801cab1f7eb4d739d5badaeddf7cd1745c2d81ad3bf5a56a82b3c9e11c7fde54ad23e29e
-
SSDEEP
12288:b3ULO2IiSmCkt5Zqa+5H5jMd/B5DzjUdggzBoa8sk7WlyL7sX332LG4mjgQqgy:7sO2mStjd55HjqgeBdX6cn2LB
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7zG.exe 55ca8ad51323f61d22270c058ce2afe0N.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 55ca8ad51323f61d22270c058ce2afe0N.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.exe 55ca8ad51323f61d22270c058ce2afe0N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 55ca8ad51323f61d22270c058ce2afe0N.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 55ca8ad51323f61d22270c058ce2afe0N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2684 2552 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55ca8ad51323f61d22270c058ce2afe0N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2552 55ca8ad51323f61d22270c058ce2afe0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2684 2552 55ca8ad51323f61d22270c058ce2afe0N.exe 31 PID 2552 wrote to memory of 2684 2552 55ca8ad51323f61d22270c058ce2afe0N.exe 31 PID 2552 wrote to memory of 2684 2552 55ca8ad51323f61d22270c058ce2afe0N.exe 31 PID 2552 wrote to memory of 2684 2552 55ca8ad51323f61d22270c058ce2afe0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\55ca8ad51323f61d22270c058ce2afe0N.exe"C:\Users\Admin\AppData\Local\Temp\55ca8ad51323f61d22270c058ce2afe0N.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 1562⤵
- Program crash
PID:2684
-