Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
63s -
max time network
13s -
platform
windows7_x64 -
resource
win7 -
submitted
28/07/2020, 12:34
Static task
static1
Behavioral task
behavioral1
Sample
0c2013904dddc7a75d7cfb297b302b30b4ceb0caaf13af01097e422cfcd9392c.exe
Resource
win7
Behavioral task
behavioral2
Sample
0c2013904dddc7a75d7cfb297b302b30b4ceb0caaf13af01097e422cfcd9392c.exe
Resource
win10v200722
General
-
Target
0c2013904dddc7a75d7cfb297b302b30b4ceb0caaf13af01097e422cfcd9392c.exe
-
Size
537KB
-
MD5
dcc11d6bcb5db3714555eeab0f426355
-
SHA1
c85bf19f5cb2ea39aa1eab88c3da82be498c99e3
-
SHA256
0c2013904dddc7a75d7cfb297b302b30b4ceb0caaf13af01097e422cfcd9392c
-
SHA512
bd725a4c98a3324277c6f3553da0ab2b195155770816afe7cd12d83310edbb2a1a4234ec5eb24dd3fec365b748a14cc7394d8bf8d012dd975e4b573c63111ac1
Malware Config
Signatures
-
Modifies extensions of user files 7 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\NewStart.tiff_out 0c2013904dddc7a75d7cfb297b302b30b4ceb0caaf13af01097e422cfcd9392c.exe File created C:\Users\Admin\Pictures\PushUnprotect.png_out 0c2013904dddc7a75d7cfb297b302b30b4ceb0caaf13af01097e422cfcd9392c.exe File created C:\Users\Admin\Pictures\RegisterUse.tiff_out 0c2013904dddc7a75d7cfb297b302b30b4ceb0caaf13af01097e422cfcd9392c.exe File created C:\Users\Admin\Pictures\RequestConvertTo.raw_out 0c2013904dddc7a75d7cfb297b302b30b4ceb0caaf13af01097e422cfcd9392c.exe File created C:\Users\Admin\Pictures\UndoRevoke.png_out 0c2013904dddc7a75d7cfb297b302b30b4ceb0caaf13af01097e422cfcd9392c.exe File created C:\Users\Admin\Pictures\CheckpointRemove.tif_out 0c2013904dddc7a75d7cfb297b302b30b4ceb0caaf13af01097e422cfcd9392c.exe File created C:\Users\Admin\Pictures\CheckpointShow.png_out 0c2013904dddc7a75d7cfb297b302b30b4ceb0caaf13af01097e422cfcd9392c.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini_out 0c2013904dddc7a75d7cfb297b302b30b4ceb0caaf13af01097e422cfcd9392c.exe