Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    75s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/09/2022, 01:40

General

  • Target

    596f2946d7a78c8fd4aa2b7701d0adea57f6b27b11bf8366e69fcfec92dae3aa.exe

  • Size

    361KB

  • MD5

    523ec13a73602aed47e911453df629d4

  • SHA1

    1dac079455fbf72496a97be5461ec50f4b857c0d

  • SHA256

    596f2946d7a78c8fd4aa2b7701d0adea57f6b27b11bf8366e69fcfec92dae3aa

  • SHA512

    67e273f2107621fa07391c4604a8cc922572550db736e64c96bab18b35d8b9d1957482c6f8625af91015951a12f69c8a900ade9e7138c10bb1182b24b47faed1

  • SSDEEP

    6144:21mec8NDwJabA/BDzhzVBOAXi1qAN5xo6OAb5fDHrCg7DhdYJwxHpfx:217NkUs/BDzhzVFXeQ6digvhLxJfx

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\596f2946d7a78c8fd4aa2b7701d0adea57f6b27b11bf8366e69fcfec92dae3aa.exe
    "C:\Users\Admin\AppData\Local\Temp\596f2946d7a78c8fd4aa2b7701d0adea57f6b27b11bf8366e69fcfec92dae3aa.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4476
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4476 -s 1880
      2⤵
      • Program crash
      PID:2016
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4476 -ip 4476
    1⤵
      PID:3276

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4476-135-0x0000000000B08000-0x0000000000B32000-memory.dmp

      Filesize

      168KB

    • memory/4476-136-0x0000000002590000-0x00000000025C7000-memory.dmp

      Filesize

      220KB

    • memory/4476-137-0x00000000051D0000-0x0000000005774000-memory.dmp

      Filesize

      5.6MB

    • memory/4476-138-0x0000000000400000-0x000000000085C000-memory.dmp

      Filesize

      4.4MB

    • memory/4476-139-0x0000000005780000-0x0000000005D98000-memory.dmp

      Filesize

      6.1MB

    • memory/4476-140-0x0000000002CC0000-0x0000000002CD2000-memory.dmp

      Filesize

      72KB

    • memory/4476-141-0x0000000005DA0000-0x0000000005EAA000-memory.dmp

      Filesize

      1.0MB

    • memory/4476-142-0x0000000002D00000-0x0000000002D3C000-memory.dmp

      Filesize

      240KB

    • memory/4476-143-0x0000000006B70000-0x0000000006C02000-memory.dmp

      Filesize

      584KB

    • memory/4476-144-0x0000000006C20000-0x0000000006C86000-memory.dmp

      Filesize

      408KB

    • memory/4476-145-0x0000000006F90000-0x0000000007152000-memory.dmp

      Filesize

      1.8MB

    • memory/4476-146-0x0000000007160000-0x000000000768C000-memory.dmp

      Filesize

      5.2MB

    • memory/4476-147-0x00000000079B0000-0x0000000007A00000-memory.dmp

      Filesize

      320KB

    • memory/4476-148-0x0000000007A20000-0x0000000007A96000-memory.dmp

      Filesize

      472KB

    • memory/4476-149-0x0000000007BC0000-0x0000000007BDE000-memory.dmp

      Filesize

      120KB

    • memory/4476-150-0x0000000000B08000-0x0000000000B32000-memory.dmp

      Filesize

      168KB

    • memory/4476-151-0x0000000002590000-0x00000000025C7000-memory.dmp

      Filesize

      220KB

    • memory/4476-152-0x0000000000B08000-0x0000000000B32000-memory.dmp

      Filesize

      168KB

    • memory/4476-153-0x0000000000400000-0x000000000085C000-memory.dmp

      Filesize

      4.4MB