Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    91s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/10/2022, 16:51 UTC

General

  • Target

    647d1fef53a2ebd44f8066a070dca4f38ffe8cb3759c2088dbee8dfd551bac08.exe

  • Size

    4.8MB

  • MD5

    49dcbf0def88962f118a2a03e441fe54

  • SHA1

    7779b3c6f5c9ca5486cbc71b98d436f920d16538

  • SHA256

    647d1fef53a2ebd44f8066a070dca4f38ffe8cb3759c2088dbee8dfd551bac08

  • SHA512

    3ad2ed520323d92291ed112542391950f7cc3353ff0604e8f35a8f6a1e6a9b84817562de944df68e45e72bd02cb97d7f66b928daa6494bf57507634e09f578d3

  • SSDEEP

    98304:GDR/pKO+6PbFmS3VjVEOeTtJaAbLECnrZXJT7W:GDVbFmS3VjVEOeTtJHbdnrz7

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Program crash 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\647d1fef53a2ebd44f8066a070dca4f38ffe8cb3759c2088dbee8dfd551bac08.exe
    "C:\Users\Admin\AppData\Local\Temp\647d1fef53a2ebd44f8066a070dca4f38ffe8cb3759c2088dbee8dfd551bac08.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3488
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 536
      2⤵
      • Program crash
      PID:2164
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 540
      2⤵
      • Program crash
      PID:3132
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 540
      2⤵
      • Program crash
      PID:4792
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 612
      2⤵
      • Program crash
      PID:2624
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 792
      2⤵
      • Program crash
      PID:1732
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 812
      2⤵
      • Program crash
      PID:4660
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic os get Caption
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2052
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 1304
      2⤵
      • Program crash
      PID:3208
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 1292
      2⤵
      • Program crash
      PID:1268
    • C:\Windows\SysWOW64\cmd.exe
      cmd /C "wmic path win32_VideoController get name"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4428
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic path win32_VideoController get name
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3688
    • C:\Windows\SysWOW64\cmd.exe
      cmd /C "wmic cpu get name"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2792
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic cpu get name
        3⤵
          PID:3084
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 140
        2⤵
        • Program crash
        PID:2408
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3488 -ip 3488
      1⤵
        PID:5008
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3488 -ip 3488
        1⤵
          PID:2508
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3488 -ip 3488
          1⤵
            PID:428
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3488 -ip 3488
            1⤵
              PID:3640
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3488 -ip 3488
              1⤵
                PID:1248
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3488 -ip 3488
                1⤵
                  PID:3108
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3488 -ip 3488
                  1⤵
                    PID:808
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3488 -ip 3488
                    1⤵
                      PID:1668
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3488 -ip 3488
                      1⤵
                        PID:4624

                      Network

                      • flag-us
                        DNS
                        get.geojs.io
                        647d1fef53a2ebd44f8066a070dca4f38ffe8cb3759c2088dbee8dfd551bac08.exe
                        Remote address:
                        8.8.8.8:53
                        Request
                        get.geojs.io
                        IN A
                        Response
                        get.geojs.io
                        IN A
                        172.67.70.233
                        get.geojs.io
                        IN A
                        104.26.1.100
                        get.geojs.io
                        IN A
                        104.26.0.100
                      • 209.197.3.8:80
                        322 B
                        7
                      • 209.197.3.8:80
                        322 B
                        7
                      • 217.195.155.154:8081
                        647d1fef53a2ebd44f8066a070dca4f38ffe8cb3759c2088dbee8dfd551bac08.exe
                        868.7kB
                        10.5kB
                        587
                        262
                      • 172.67.70.233:443
                        get.geojs.io
                        tls
                        647d1fef53a2ebd44f8066a070dca4f38ffe8cb3759c2088dbee8dfd551bac08.exe
                        1.1kB
                        4.4kB
                        12
                        13
                      • 8.8.8.8:53
                        get.geojs.io
                        dns
                        647d1fef53a2ebd44f8066a070dca4f38ffe8cb3759c2088dbee8dfd551bac08.exe
                        58 B
                        106 B
                        1
                        1

                        DNS Request

                        get.geojs.io

                        DNS Response

                        172.67.70.233
                        104.26.1.100
                        104.26.0.100

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • memory/3488-132-0x0000000003120000-0x0000000003567000-memory.dmp

                        Filesize

                        4.3MB

                      • memory/3488-133-0x0000000000400000-0x00000000008C9000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/3488-139-0x0000000000400000-0x00000000008C9000-memory.dmp

                        Filesize

                        4.8MB

                      We care about your privacy.

                      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.