Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
12/12/2022, 10:14
Static task
static1
General
-
Target
47a40add511868171afab04d336c6120be951799b6230fdbd581e6469e1a088e.exe
-
Size
2.9MB
-
MD5
b26439eb7f5e2a7f1e2dabcfa8e3a7b1
-
SHA1
4c4ca12b90e83e563408557e028580dd43b56975
-
SHA256
47a40add511868171afab04d336c6120be951799b6230fdbd581e6469e1a088e
-
SHA512
4d6fedbafd7f6ca7b0a3b9bf0162cd1d607098e82e474cca971fd828f1d0d4c9a1a00811583abd11d93b76f39972abbe7e6fae6b633c0062befc3d93612b0a5f
-
SSDEEP
49152:EW32/5cuXfOG+CwXxDebqytiJCaLsL6M8Aoek1d:anXWRxDQqCLd8AK
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4440 wmic.exe Token: SeSecurityPrivilege 4440 wmic.exe Token: SeTakeOwnershipPrivilege 4440 wmic.exe Token: SeLoadDriverPrivilege 4440 wmic.exe Token: SeSystemProfilePrivilege 4440 wmic.exe Token: SeSystemtimePrivilege 4440 wmic.exe Token: SeProfSingleProcessPrivilege 4440 wmic.exe Token: SeIncBasePriorityPrivilege 4440 wmic.exe Token: SeCreatePagefilePrivilege 4440 wmic.exe Token: SeBackupPrivilege 4440 wmic.exe Token: SeRestorePrivilege 4440 wmic.exe Token: SeShutdownPrivilege 4440 wmic.exe Token: SeDebugPrivilege 4440 wmic.exe Token: SeSystemEnvironmentPrivilege 4440 wmic.exe Token: SeRemoteShutdownPrivilege 4440 wmic.exe Token: SeUndockPrivilege 4440 wmic.exe Token: SeManageVolumePrivilege 4440 wmic.exe Token: 33 4440 wmic.exe Token: 34 4440 wmic.exe Token: 35 4440 wmic.exe Token: 36 4440 wmic.exe Token: SeIncreaseQuotaPrivilege 4440 wmic.exe Token: SeSecurityPrivilege 4440 wmic.exe Token: SeTakeOwnershipPrivilege 4440 wmic.exe Token: SeLoadDriverPrivilege 4440 wmic.exe Token: SeSystemProfilePrivilege 4440 wmic.exe Token: SeSystemtimePrivilege 4440 wmic.exe Token: SeProfSingleProcessPrivilege 4440 wmic.exe Token: SeIncBasePriorityPrivilege 4440 wmic.exe Token: SeCreatePagefilePrivilege 4440 wmic.exe Token: SeBackupPrivilege 4440 wmic.exe Token: SeRestorePrivilege 4440 wmic.exe Token: SeShutdownPrivilege 4440 wmic.exe Token: SeDebugPrivilege 4440 wmic.exe Token: SeSystemEnvironmentPrivilege 4440 wmic.exe Token: SeRemoteShutdownPrivilege 4440 wmic.exe Token: SeUndockPrivilege 4440 wmic.exe Token: SeManageVolumePrivilege 4440 wmic.exe Token: 33 4440 wmic.exe Token: 34 4440 wmic.exe Token: 35 4440 wmic.exe Token: 36 4440 wmic.exe Token: SeIncreaseQuotaPrivilege 1164 WMIC.exe Token: SeSecurityPrivilege 1164 WMIC.exe Token: SeTakeOwnershipPrivilege 1164 WMIC.exe Token: SeLoadDriverPrivilege 1164 WMIC.exe Token: SeSystemProfilePrivilege 1164 WMIC.exe Token: SeSystemtimePrivilege 1164 WMIC.exe Token: SeProfSingleProcessPrivilege 1164 WMIC.exe Token: SeIncBasePriorityPrivilege 1164 WMIC.exe Token: SeCreatePagefilePrivilege 1164 WMIC.exe Token: SeBackupPrivilege 1164 WMIC.exe Token: SeRestorePrivilege 1164 WMIC.exe Token: SeShutdownPrivilege 1164 WMIC.exe Token: SeDebugPrivilege 1164 WMIC.exe Token: SeSystemEnvironmentPrivilege 1164 WMIC.exe Token: SeRemoteShutdownPrivilege 1164 WMIC.exe Token: SeUndockPrivilege 1164 WMIC.exe Token: SeManageVolumePrivilege 1164 WMIC.exe Token: 33 1164 WMIC.exe Token: 34 1164 WMIC.exe Token: 35 1164 WMIC.exe Token: 36 1164 WMIC.exe Token: SeIncreaseQuotaPrivilege 1164 WMIC.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 5036 wrote to memory of 4440 5036 47a40add511868171afab04d336c6120be951799b6230fdbd581e6469e1a088e.exe 81 PID 5036 wrote to memory of 4440 5036 47a40add511868171afab04d336c6120be951799b6230fdbd581e6469e1a088e.exe 81 PID 5036 wrote to memory of 384 5036 47a40add511868171afab04d336c6120be951799b6230fdbd581e6469e1a088e.exe 83 PID 5036 wrote to memory of 384 5036 47a40add511868171afab04d336c6120be951799b6230fdbd581e6469e1a088e.exe 83 PID 384 wrote to memory of 1164 384 cmd.exe 85 PID 384 wrote to memory of 1164 384 cmd.exe 85 PID 5036 wrote to memory of 2880 5036 47a40add511868171afab04d336c6120be951799b6230fdbd581e6469e1a088e.exe 86 PID 5036 wrote to memory of 2880 5036 47a40add511868171afab04d336c6120be951799b6230fdbd581e6469e1a088e.exe 86 PID 2880 wrote to memory of 3416 2880 cmd.exe 88 PID 2880 wrote to memory of 3416 2880 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\47a40add511868171afab04d336c6120be951799b6230fdbd581e6469e1a088e.exe"C:\Users\Admin\AppData\Local\Temp\47a40add511868171afab04d336c6120be951799b6230fdbd581e6469e1a088e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\System32\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4440
-
-
C:\Windows\system32\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
-
C:\Windows\system32\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\System32\Wbem\WMIC.exewmic cpu get name3⤵PID:3416
-
-