Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    37s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2022, 17:09

General

  • Target

    090390c056a8ede941bd4f6bf3a3d3f631688fd34b9b14cb9941cd1525030eb8.exe

  • Size

    533KB

  • MD5

    60bf216bd89b6faeb8f52aa8b73b4e08

  • SHA1

    85795a51b062861f11e059a97aaf5fa46e9e68d3

  • SHA256

    090390c056a8ede941bd4f6bf3a3d3f631688fd34b9b14cb9941cd1525030eb8

  • SHA512

    d550e091b7853d9557c18750d5e10342efc2c731db7d56a71421d29934f8c205490bfdc624b8a9bb45072be0618a1077d7ed1614b73f9c6fb74decd9e8ae7c80

  • SSDEEP

    12288:gXsVa0LWyNkUK8drvf+5pnFYGq6O881MS+Nkz1hH3F1T:WmW7oNO5pFYyO88KRO1J

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\090390c056a8ede941bd4f6bf3a3d3f631688fd34b9b14cb9941cd1525030eb8.exe
    "C:\Users\Admin\AppData\Local\Temp\090390c056a8ede941bd4f6bf3a3d3f631688fd34b9b14cb9941cd1525030eb8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\2011.08.15T21.55\Virtual\STUBEXE\@APPDATALOCAL@\Temp\kar.exe
      "C:\Users\Admin\AppData\Local\Temp\kar.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2012

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\2011.08.15T21.55\Virtual\STUBEXE\@APPDATALOCAL@\Temp\kar.exe

    Filesize

    17KB

    MD5

    ee3ac6f4f5e134ea31f6a0e65c1c210c

    SHA1

    68af40f0e524e3583913286bcc91b75e6ebc9c10

    SHA256

    ee8b196b526366dc8a4372e90be9f63cec1d037e47083fb0ed981b942d3848c5

    SHA512

    91cb3ad70a2d6408a78763f2af0a6b0ffc0448f0f7357b7fe5fe061e13712ea11da8d4c2b4c0d01ba8c7ffef8255022ed41cb3e599ba0780f7b41a0e0514ffe0

  • \Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\2011.08.15T21.55\Virtual\STUBEXE\@APPDATALOCAL@\Temp\kar.exe

    Filesize

    17KB

    MD5

    ee3ac6f4f5e134ea31f6a0e65c1c210c

    SHA1

    68af40f0e524e3583913286bcc91b75e6ebc9c10

    SHA256

    ee8b196b526366dc8a4372e90be9f63cec1d037e47083fb0ed981b942d3848c5

    SHA512

    91cb3ad70a2d6408a78763f2af0a6b0ffc0448f0f7357b7fe5fe061e13712ea11da8d4c2b4c0d01ba8c7ffef8255022ed41cb3e599ba0780f7b41a0e0514ffe0

  • memory/1504-90-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-100-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-63-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-61-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-65-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-67-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-69-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-71-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-73-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-75-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-77-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-79-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-81-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-83-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-86-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-88-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-92-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-94-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-54-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-96-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-59-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-104-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-98-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-102-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-106-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-110-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-108-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-112-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-114-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-116-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-118-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-363-0x000000000026B000-0x000000000026D000-memory.dmp

    Filesize

    8KB

  • memory/1504-57-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-677-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/1504-55-0x0000000000220000-0x000000000028C000-memory.dmp

    Filesize

    432KB

  • memory/2012-672-0x0000000000460000-0x00000000004CC000-memory.dmp

    Filesize

    432KB

  • memory/2012-673-0x00000000004AB000-0x00000000004AD000-memory.dmp

    Filesize

    8KB

  • memory/2012-674-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2012-675-0x0000000000460000-0x00000000004CC000-memory.dmp

    Filesize

    432KB

  • memory/2012-676-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB