Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    123s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2022, 04:30

General

  • Target

    896416cf4fc5c5778d60f485d40f0eb642b5876ceb93a9250ae5850958256ee3.exe

  • Size

    5.1MB

  • MD5

    0c6320d07c1d933dfecf6d6104ed7f99

  • SHA1

    7912a9741f0a756f16b86f4781a9d54b99aaa350

  • SHA256

    896416cf4fc5c5778d60f485d40f0eb642b5876ceb93a9250ae5850958256ee3

  • SHA512

    207cf0e72ffd49b58cf6ca070b12202e1ac6532163eb1a7b464f4376ed97f9458ee9fbef2d8ff9d32b5218746f0b2b153a60d1ed79654ee05d0aba891a88f6b7

  • SSDEEP

    98304:QpNFXNuSZTKA0t9FFPE7YVrsk9N8ivyhAdsPSQx0Pq0f4ZN:QpN/bk9fcwVN8iNISDqwe

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\896416cf4fc5c5778d60f485d40f0eb642b5876ceb93a9250ae5850958256ee3.exe
    "C:\Users\Admin\AppData\Local\Temp\896416cf4fc5c5778d60f485d40f0eb642b5876ceb93a9250ae5850958256ee3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    PID:5040

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\SQLite.Interop.dll

    Filesize

    1.7MB

    MD5

    1288823e8e1fca09bb490ce46988188d

    SHA1

    b07fe4a5d032296e3a7d0727216af8c1d2166e91

    SHA256

    6514973856d1767ccb375dcb253400e710fb4f91feb758041d8defe92b1886c5

    SHA512

    88967f64116951092a54118055eab462082f16676ea7565f42515e88765813b53cdfbba5181318e73b668e04ddd030a0bfcf5cf47936772f68df85488b865acd

  • C:\Users\Admin\AppData\Local\Temp\SQLite.Interop.dll

    Filesize

    1.7MB

    MD5

    1288823e8e1fca09bb490ce46988188d

    SHA1

    b07fe4a5d032296e3a7d0727216af8c1d2166e91

    SHA256

    6514973856d1767ccb375dcb253400e710fb4f91feb758041d8defe92b1886c5

    SHA512

    88967f64116951092a54118055eab462082f16676ea7565f42515e88765813b53cdfbba5181318e73b668e04ddd030a0bfcf5cf47936772f68df85488b865acd

  • memory/5040-132-0x000001DFD3C50000-0x000001DFD4166000-memory.dmp

    Filesize

    5.1MB

  • memory/5040-133-0x00007FF996C20000-0x00007FF9976E1000-memory.dmp

    Filesize

    10.8MB

  • memory/5040-136-0x000001DFEFC60000-0x000001DFEFC9A000-memory.dmp

    Filesize

    232KB

  • memory/5040-137-0x000001DFF00C0000-0x000001DFF00CA000-memory.dmp

    Filesize

    40KB

  • memory/5040-138-0x000001DFF0D70000-0x000001DFF0D92000-memory.dmp

    Filesize

    136KB

  • memory/5040-139-0x00007FF996C20000-0x00007FF9976E1000-memory.dmp

    Filesize

    10.8MB