Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    155s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 14:15

General

  • Target

    bc5026fcf872c2d6337a8afa8f38cc61f3b1cc11a0cda8456ed3f01535b21959.exe

  • Size

    986KB

  • MD5

    7185a4682dd021b6590fbf3713657ab8

  • SHA1

    0b40cdce96649ed78abeffceb8dad7839baf90cb

  • SHA256

    bc5026fcf872c2d6337a8afa8f38cc61f3b1cc11a0cda8456ed3f01535b21959

  • SHA512

    db9ca84181ba2023930c1bb1b92d543185bdfa381216a6095e873521c2bfbc3175add68f7242bc1365ff4d70bcff304e85aaf57aa6022b0b2c1d32d00599df87

  • SSDEEP

    24576:aczJKVdmADtLIj1qj8/Ob1HnVkaJknReHX73d:acA2WtL+qj8/WHVb5Lt

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc5026fcf872c2d6337a8afa8f38cc61f3b1cc11a0cda8456ed3f01535b21959.exe
    "C:\Users\Admin\AppData\Local\Temp\bc5026fcf872c2d6337a8afa8f38cc61f3b1cc11a0cda8456ed3f01535b21959.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1112
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\starter.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\starter.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1188
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\start.exe
        start.exe
        3⤵
        • Executes dropped EXE
        PID:1684
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\s.exe
        s.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4736

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\s.exe

    Filesize

    85KB

    MD5

    7c75fd42b6921b4dd8dbc2a6a152aef4

    SHA1

    0a1f97e753851ddd7e147b8e60f0c7d74d9de1d3

    SHA256

    720d3250153c3c9934adb545e417f7564bfec2cfdae46da0c936cf6acca95ea1

    SHA512

    112c2c9a8a89b7023d88659bea563cbd3cc719a7b5d28b17a00112305f8c6fb2319d833fea61f64454294c2dfef3d1c749ce19edf6bda471f7a8aa7c641fb95a

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\s.exe

    Filesize

    85KB

    MD5

    7c75fd42b6921b4dd8dbc2a6a152aef4

    SHA1

    0a1f97e753851ddd7e147b8e60f0c7d74d9de1d3

    SHA256

    720d3250153c3c9934adb545e417f7564bfec2cfdae46da0c936cf6acca95ea1

    SHA512

    112c2c9a8a89b7023d88659bea563cbd3cc719a7b5d28b17a00112305f8c6fb2319d833fea61f64454294c2dfef3d1c749ce19edf6bda471f7a8aa7c641fb95a

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\start.exe

    Filesize

    208KB

    MD5

    331a51a2189bca1e199de6d1b48af92d

    SHA1

    cc473cf5611569af298d09561e425493d0538722

    SHA256

    fd53d042d12f2316b5bc095676f092e898c89a24a9eac4f71b2a382ec791b4d3

    SHA512

    86d7031e65be13c3bf0da806bb7d4992f5413ea0fbdf3e3735b2e4b37773206cf6944288eb216feb0064514e1532506a30dafe996a67338ef7892557402f2702

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\start.exe

    Filesize

    208KB

    MD5

    331a51a2189bca1e199de6d1b48af92d

    SHA1

    cc473cf5611569af298d09561e425493d0538722

    SHA256

    fd53d042d12f2316b5bc095676f092e898c89a24a9eac4f71b2a382ec791b4d3

    SHA512

    86d7031e65be13c3bf0da806bb7d4992f5413ea0fbdf3e3735b2e4b37773206cf6944288eb216feb0064514e1532506a30dafe996a67338ef7892557402f2702

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\starter.exe

    Filesize

    784KB

    MD5

    2b5085722474a5675e611947c07db31d

    SHA1

    06797dfae01ddfea7b843d61f47751672a96cccd

    SHA256

    d4bd3a9a7bc399c1eae265d0ee4f11ad2224e7b2587bdaa8fa78c0360af5cf39

    SHA512

    3fd94d152f0bbf9bf36ca3adb78d3c350d30172b9711485bdc7e1fd9b78810dc391fb7efde67873884adbd76afeb9e8b3954597d69d9e9bb5a2059447afc4a71

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\starter.exe

    Filesize

    784KB

    MD5

    2b5085722474a5675e611947c07db31d

    SHA1

    06797dfae01ddfea7b843d61f47751672a96cccd

    SHA256

    d4bd3a9a7bc399c1eae265d0ee4f11ad2224e7b2587bdaa8fa78c0360af5cf39

    SHA512

    3fd94d152f0bbf9bf36ca3adb78d3c350d30172b9711485bdc7e1fd9b78810dc391fb7efde67873884adbd76afeb9e8b3954597d69d9e9bb5a2059447afc4a71

  • memory/1684-141-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1684-142-0x0000000004D00000-0x0000000004D9C000-memory.dmp

    Filesize

    624KB

  • memory/1684-143-0x0000000005350000-0x00000000058F4000-memory.dmp

    Filesize

    5.6MB

  • memory/1684-144-0x0000000004DA0000-0x0000000004E32000-memory.dmp

    Filesize

    584KB

  • memory/1684-146-0x0000000004CB0000-0x0000000004CBA000-memory.dmp

    Filesize

    40KB

  • memory/1684-147-0x0000000004F90000-0x0000000004FE6000-memory.dmp

    Filesize

    344KB

  • memory/4736-145-0x00007FFF3B3A0000-0x00007FFF3BDD6000-memory.dmp

    Filesize

    10.2MB