Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    162s
  • max time network
    206s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 07:38

General

  • Target

    549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe

  • Size

    428KB

  • MD5

    62767859b9b880c0efe7546d9bc5d120

  • SHA1

    89d2744283d2037738d012593b50212d8b02989c

  • SHA256

    549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8

  • SHA512

    81fdc2cf41a9113235b2653647efb95402f8553b8f99e0a44d605adaf477cf8579279e6bc8b8e130e976bb5ef5da096e75eecbf2dd63c22994e5b8897583d1e2

  • SSDEEP

    6144:Hnp8zTOujFmHrlrAQkbbG0LE0o0N0z3a8ECggYKBjiI:JwQkCgDMji

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Modifies registry class 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2484
      • C:\Users\Admin\AppData\Local\Temp\549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe
        "C:\Users\Admin\AppData\Local\Temp\549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe"
        2⤵
        • Drops file in Drivers directory
        • Installs/modifies Browser Helper Object
        • Drops file in System32 directory
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies data under HKEY_USERS
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4804
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c del c:\rzxsy*.dll /f /s /q
          3⤵
            PID:1296
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c del /f /s /q "%USERPROFILE%\COOKIES\*.TXT"
            3⤵
              PID:1936
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c del /f /s /q "%USERPROFILE%\Local Settings\Temporary Internet Files\*.*"
              3⤵
                PID:1432
              • C:\Windows\SysWOW64\attrib.exe
                attrib.exe c:\windows\system32\drivers\etc\hosts -s -h -r
                3⤵
                • Views/modifies file attributes
                PID:4212
              • C:\Windows\SysWOW64\attrib.exe
                attrib.exe c:\windows\system32\drivers\etc\hosts -s -h -r
                3⤵
                • Views/modifies file attributes
                PID:5116

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/4804-132-0x0000000000400000-0x000000000046B000-memory.dmp

            Filesize

            428KB

          • memory/4804-139-0x0000000000400000-0x000000000046B000-memory.dmp

            Filesize

            428KB