Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2023, 02:31
Static task
static1
General
-
Target
469bb2e0e9f48a661156adc335133e1610b2000674e1f0f48b5bbbaa846269a6.exe
-
Size
462KB
-
MD5
765df00ae025cd5e708c8f905717afab
-
SHA1
b5525cc6046115be644943da0668c7f96ec61e5b
-
SHA256
469bb2e0e9f48a661156adc335133e1610b2000674e1f0f48b5bbbaa846269a6
-
SHA512
c4bb1a3634785f83c5967e31986540decde368f8d23af5c5ce60ddce9a44b7d2042d6edd604afadfc25b15e09f3b494bcdddc127ecb2a4ede1016de93d72973c
-
SSDEEP
6144:5mLeNB6mBqES187kIQkvUQaKXMRFIBlloxupmL1E/DjT:5mQB6mBPSe7k8MQrBvoxupmL1E/
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1552 2700 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2700 469bb2e0e9f48a661156adc335133e1610b2000674e1f0f48b5bbbaa846269a6.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2700 469bb2e0e9f48a661156adc335133e1610b2000674e1f0f48b5bbbaa846269a6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\469bb2e0e9f48a661156adc335133e1610b2000674e1f0f48b5bbbaa846269a6.exe"C:\Users\Admin\AppData\Local\Temp\469bb2e0e9f48a661156adc335133e1610b2000674e1f0f48b5bbbaa846269a6.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 15042⤵
- Program crash
PID:1552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2700 -ip 27001⤵PID:5096