Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    164s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 19:44

General

  • Target

    e9ba8163308c746aa5ae1c9f89005238733f47707a91315b54a40e3ef74d47ec.exe

  • Size

    352KB

  • MD5

    6aeae49808cfb5549f187cf28883cb20

  • SHA1

    cc0452cdcb791c96f18f0ae1e6c64833ecff61e9

  • SHA256

    e9ba8163308c746aa5ae1c9f89005238733f47707a91315b54a40e3ef74d47ec

  • SHA512

    0e6a4959dccc57649180079f4a400caf8881c9b852a91e37be6de38eec03e1f356ca955d6b8b4f1f0e0ad4b632fb3da5bf13e08de8ca34922006edbbf4d124c6

  • SSDEEP

    6144:k9CcMDcknswQM3XM3llUlA+QCD8PB3SAUXh6BLREoSdLfsztUB:xceXsw9X6ll4A+fD8xSheNEoSdLaUB

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9ba8163308c746aa5ae1c9f89005238733f47707a91315b54a40e3ef74d47ec.exe
    "C:\Users\Admin\AppData\Local\Temp\e9ba8163308c746aa5ae1c9f89005238733f47707a91315b54a40e3ef74d47ec.exe"
    1⤵
    • Modifies system executable filetype association
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3644
    • C:\Users\Admin\AppData\Local\Temp\3582-490\e9ba8163308c746aa5ae1c9f89005238733f47707a91315b54a40e3ef74d47ec.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\e9ba8163308c746aa5ae1c9f89005238733f47707a91315b54a40e3ef74d47ec.exe"
      2⤵
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3604

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\e9ba8163308c746aa5ae1c9f89005238733f47707a91315b54a40e3ef74d47ec.exe

    Filesize

    312KB

    MD5

    e5a1e18ec3158460a73d293241369c39

    SHA1

    931f6db4b30af8e5c33f67816091293e4dadeb8d

    SHA256

    bccfda214510ff12383bc92430861e0464212eac4828e58d448e0f265ce9a09a

    SHA512

    f1640c887a61b43dc943b80c560984d4192ec148dbeb7a133ac42834c5176f8b407c3859f8991f772463d8f2f944e8d2382a3160cdef219bf9e84c34d7c2edc3

  • C:\Users\Admin\AppData\Local\Temp\3582-490\e9ba8163308c746aa5ae1c9f89005238733f47707a91315b54a40e3ef74d47ec.exe

    Filesize

    312KB

    MD5

    e5a1e18ec3158460a73d293241369c39

    SHA1

    931f6db4b30af8e5c33f67816091293e4dadeb8d

    SHA256

    bccfda214510ff12383bc92430861e0464212eac4828e58d448e0f265ce9a09a

    SHA512

    f1640c887a61b43dc943b80c560984d4192ec148dbeb7a133ac42834c5176f8b407c3859f8991f772463d8f2f944e8d2382a3160cdef219bf9e84c34d7c2edc3

  • memory/3604-138-0x0000000000850000-0x0000000000854000-memory.dmp

    Filesize

    16KB

  • memory/3604-136-0x0000000000850000-0x0000000000854000-memory.dmp

    Filesize

    16KB

  • memory/3604-135-0x0000000000850000-0x0000000000854000-memory.dmp

    Filesize

    16KB

  • memory/3604-137-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/3604-139-0x0000000000850000-0x0000000000854000-memory.dmp

    Filesize

    16KB

  • memory/3604-140-0x0000000000850000-0x0000000000854000-memory.dmp

    Filesize

    16KB

  • memory/3604-141-0x0000000000850000-0x0000000000854000-memory.dmp

    Filesize

    16KB

  • memory/3604-142-0x0000000000850000-0x0000000000854000-memory.dmp

    Filesize

    16KB

  • memory/3604-143-0x0000000000850000-0x0000000000854000-memory.dmp

    Filesize

    16KB

  • memory/3604-144-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB