Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2022, 07:48
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
4 signatures
150 seconds
General
-
Target
file.exe
-
Size
5.7MB
-
MD5
294b523aa2161c9cd5c9b777593caeb1
-
SHA1
0c5824d59d5bd053c4d43fbccbf1a2f12738a349
-
SHA256
b123fe42bed02d6a2e7bf2eaf4c808301e2d8fb1d79af42a3168037057ab491f
-
SHA512
2a2690a61603fb98c128599752405b7d7a90b72e5e180cdd67db344cf0e2a2bb637af0ced63c9744e36fff1f94e8c64c353ac8d675326e118f70572c29219525
-
SSDEEP
49152:PrK4gFKXDqnfpuIHTfg7DbQzDFeygR9fbTMZ0yVoESNrjeRaXkutlkE1gFvFYOaB:PrK41Onfw2fUygLfbTd99e/GY9av/ie
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3188 wmic.exe Token: SeSecurityPrivilege 3188 wmic.exe Token: SeTakeOwnershipPrivilege 3188 wmic.exe Token: SeLoadDriverPrivilege 3188 wmic.exe Token: SeSystemProfilePrivilege 3188 wmic.exe Token: SeSystemtimePrivilege 3188 wmic.exe Token: SeProfSingleProcessPrivilege 3188 wmic.exe Token: SeIncBasePriorityPrivilege 3188 wmic.exe Token: SeCreatePagefilePrivilege 3188 wmic.exe Token: SeBackupPrivilege 3188 wmic.exe Token: SeRestorePrivilege 3188 wmic.exe Token: SeShutdownPrivilege 3188 wmic.exe Token: SeDebugPrivilege 3188 wmic.exe Token: SeSystemEnvironmentPrivilege 3188 wmic.exe Token: SeRemoteShutdownPrivilege 3188 wmic.exe Token: SeUndockPrivilege 3188 wmic.exe Token: SeManageVolumePrivilege 3188 wmic.exe Token: 33 3188 wmic.exe Token: 34 3188 wmic.exe Token: 35 3188 wmic.exe Token: 36 3188 wmic.exe Token: SeIncreaseQuotaPrivilege 3188 wmic.exe Token: SeSecurityPrivilege 3188 wmic.exe Token: SeTakeOwnershipPrivilege 3188 wmic.exe Token: SeLoadDriverPrivilege 3188 wmic.exe Token: SeSystemProfilePrivilege 3188 wmic.exe Token: SeSystemtimePrivilege 3188 wmic.exe Token: SeProfSingleProcessPrivilege 3188 wmic.exe Token: SeIncBasePriorityPrivilege 3188 wmic.exe Token: SeCreatePagefilePrivilege 3188 wmic.exe Token: SeBackupPrivilege 3188 wmic.exe Token: SeRestorePrivilege 3188 wmic.exe Token: SeShutdownPrivilege 3188 wmic.exe Token: SeDebugPrivilege 3188 wmic.exe Token: SeSystemEnvironmentPrivilege 3188 wmic.exe Token: SeRemoteShutdownPrivilege 3188 wmic.exe Token: SeUndockPrivilege 3188 wmic.exe Token: SeManageVolumePrivilege 3188 wmic.exe Token: 33 3188 wmic.exe Token: 34 3188 wmic.exe Token: 35 3188 wmic.exe Token: 36 3188 wmic.exe Token: SeIncreaseQuotaPrivilege 4680 WMIC.exe Token: SeSecurityPrivilege 4680 WMIC.exe Token: SeTakeOwnershipPrivilege 4680 WMIC.exe Token: SeLoadDriverPrivilege 4680 WMIC.exe Token: SeSystemProfilePrivilege 4680 WMIC.exe Token: SeSystemtimePrivilege 4680 WMIC.exe Token: SeProfSingleProcessPrivilege 4680 WMIC.exe Token: SeIncBasePriorityPrivilege 4680 WMIC.exe Token: SeCreatePagefilePrivilege 4680 WMIC.exe Token: SeBackupPrivilege 4680 WMIC.exe Token: SeRestorePrivilege 4680 WMIC.exe Token: SeShutdownPrivilege 4680 WMIC.exe Token: SeDebugPrivilege 4680 WMIC.exe Token: SeSystemEnvironmentPrivilege 4680 WMIC.exe Token: SeRemoteShutdownPrivilege 4680 WMIC.exe Token: SeUndockPrivilege 4680 WMIC.exe Token: SeManageVolumePrivilege 4680 WMIC.exe Token: 33 4680 WMIC.exe Token: 34 4680 WMIC.exe Token: 35 4680 WMIC.exe Token: 36 4680 WMIC.exe Token: SeIncreaseQuotaPrivilege 4680 WMIC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3468 wrote to memory of 3188 3468 file.exe 79 PID 3468 wrote to memory of 3188 3468 file.exe 79 PID 3468 wrote to memory of 3188 3468 file.exe 79 PID 3468 wrote to memory of 4396 3468 file.exe 81 PID 3468 wrote to memory of 4396 3468 file.exe 81 PID 3468 wrote to memory of 4396 3468 file.exe 81 PID 4396 wrote to memory of 4680 4396 cmd.exe 83 PID 4396 wrote to memory of 4680 4396 cmd.exe 83 PID 4396 wrote to memory of 4680 4396 cmd.exe 83 PID 3468 wrote to memory of 4792 3468 file.exe 84 PID 3468 wrote to memory of 4792 3468 file.exe 84 PID 3468 wrote to memory of 4792 3468 file.exe 84 PID 4792 wrote to memory of 4356 4792 cmd.exe 86 PID 4792 wrote to memory of 4356 4792 cmd.exe 86 PID 4792 wrote to memory of 4356 4792 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3188
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4680
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:4356
-
-