Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/10/2024, 21:09
Static task
static1
Behavioral task
behavioral1
Sample
9c9a9a2a9ae608eea61229125342e9184e755c094ad2d5deef7a898cffa45f5eN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9c9a9a2a9ae608eea61229125342e9184e755c094ad2d5deef7a898cffa45f5eN.exe
Resource
win10v2004-20241007-en
General
-
Target
9c9a9a2a9ae608eea61229125342e9184e755c094ad2d5deef7a898cffa45f5eN.exe
-
Size
326KB
-
MD5
5dc3523309ca2b02be4accac2c562140
-
SHA1
134ad5ff01e268d7065cc86e751b6bcb9dc0ec8a
-
SHA256
9c9a9a2a9ae608eea61229125342e9184e755c094ad2d5deef7a898cffa45f5e
-
SHA512
140d05724590d1329a614af34d47ef79bb8a2b310a03c7023f8263709a5eb8c8aa44ca588ff1421da3ef2bb46b9d795fa1904bca7fceb8ad3d115c87e9d07b8e
-
SSDEEP
6144:kYiOX3N7CXvWN3EujVMX+e36upoPGJdVd3Or20h9ULxv9i:kctLN3E6Ve+equCGJz1Q
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1832 3ED979F323C.exe 1128 RN990CB.exe -
Loads dropped DLL 4 IoCs
pid Process 2868 9c9a9a2a9ae608eea61229125342e9184e755c094ad2d5deef7a898cffa45f5eN.exe 2868 9c9a9a2a9ae608eea61229125342e9184e755c094ad2d5deef7a898cffa45f5eN.exe 1832 3ED979F323C.exe 1832 3ED979F323C.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\4Y3Y0C3AXZZI9IYVAYWEANJXPXOTBS = "C:\\svest\\3ED979F323C.exe /q" RN990CB.exe -
resource yara_rule behavioral1/memory/2868-2-0x0000000000400000-0x00000000004CE000-memory.dmp upx behavioral1/memory/2868-3-0x0000000000400000-0x00000000004CE000-memory.dmp upx behavioral1/memory/2868-4-0x0000000000400000-0x00000000004CE000-memory.dmp upx behavioral1/memory/2868-10-0x0000000000400000-0x00000000004CE000-memory.dmp upx behavioral1/memory/1832-21-0x0000000000400000-0x00000000004CE000-memory.dmp upx behavioral1/memory/1832-25-0x0000000000400000-0x00000000004CE000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RN990CB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9c9a9a2a9ae608eea61229125342e9184e755c094ad2d5deef7a898cffa45f5eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ED979F323C.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PhishingFilter RN990CB.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" RN990CB.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" RN990CB.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" RN990CB.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery RN990CB.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2868 9c9a9a2a9ae608eea61229125342e9184e755c094ad2d5deef7a898cffa45f5eN.exe 2868 9c9a9a2a9ae608eea61229125342e9184e755c094ad2d5deef7a898cffa45f5eN.exe 1832 3ED979F323C.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe 1128 RN990CB.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2868 9c9a9a2a9ae608eea61229125342e9184e755c094ad2d5deef7a898cffa45f5eN.exe Token: SeDebugPrivilege 2868 9c9a9a2a9ae608eea61229125342e9184e755c094ad2d5deef7a898cffa45f5eN.exe Token: SeDebugPrivilege 2868 9c9a9a2a9ae608eea61229125342e9184e755c094ad2d5deef7a898cffa45f5eN.exe Token: SeDebugPrivilege 2868 9c9a9a2a9ae608eea61229125342e9184e755c094ad2d5deef7a898cffa45f5eN.exe Token: SeDebugPrivilege 1832 3ED979F323C.exe Token: SeDebugPrivilege 1832 3ED979F323C.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe Token: SeDebugPrivilege 1128 RN990CB.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2868 wrote to memory of 1832 2868 9c9a9a2a9ae608eea61229125342e9184e755c094ad2d5deef7a898cffa45f5eN.exe 28 PID 2868 wrote to memory of 1832 2868 9c9a9a2a9ae608eea61229125342e9184e755c094ad2d5deef7a898cffa45f5eN.exe 28 PID 2868 wrote to memory of 1832 2868 9c9a9a2a9ae608eea61229125342e9184e755c094ad2d5deef7a898cffa45f5eN.exe 28 PID 2868 wrote to memory of 1832 2868 9c9a9a2a9ae608eea61229125342e9184e755c094ad2d5deef7a898cffa45f5eN.exe 28 PID 1832 wrote to memory of 1128 1832 3ED979F323C.exe 29 PID 1832 wrote to memory of 1128 1832 3ED979F323C.exe 29 PID 1832 wrote to memory of 1128 1832 3ED979F323C.exe 29 PID 1832 wrote to memory of 1128 1832 3ED979F323C.exe 29 PID 1832 wrote to memory of 1128 1832 3ED979F323C.exe 29 PID 1832 wrote to memory of 1128 1832 3ED979F323C.exe 29 PID 1128 wrote to memory of 2868 1128 RN990CB.exe 27 PID 1128 wrote to memory of 2868 1128 RN990CB.exe 27 PID 1128 wrote to memory of 2868 1128 RN990CB.exe 27 PID 1128 wrote to memory of 2868 1128 RN990CB.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c9a9a2a9ae608eea61229125342e9184e755c094ad2d5deef7a898cffa45f5eN.exe"C:\Users\Admin\AppData\Local\Temp\9c9a9a2a9ae608eea61229125342e9184e755c094ad2d5deef7a898cffa45f5eN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\svest\3ED979F323C.exe"C:\svest\3ED979F323C.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\RN990CB.exe"C:\Users\Admin\AppData\Local\Temp\RN990CB.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1128
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be
-
Filesize
326KB
MD55dc3523309ca2b02be4accac2c562140
SHA1134ad5ff01e268d7065cc86e751b6bcb9dc0ec8a
SHA2569c9a9a2a9ae608eea61229125342e9184e755c094ad2d5deef7a898cffa45f5e
SHA512140d05724590d1329a614af34d47ef79bb8a2b310a03c7023f8263709a5eb8c8aa44ca588ff1421da3ef2bb46b9d795fa1904bca7fceb8ad3d115c87e9d07b8e
-
Filesize
169KB
MD56bdc7b3b994a9bc3d2a9f3cd8ef98295
SHA1b21d0f954d12ed53b7343bd9fdd3d9f846d4ada5
SHA2567a6d61da8cbbd3e27170650bedb960c6bfa781791e32ead108be9bd1c111ef23
SHA512d9874173defb090a41d4722c83c8193f1cb04ce1c2123a262614e1c1a666735686391d619535cf3825b91bc72946165908dd6624314902a7a38b3e8e363b4845