Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    106s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/01/2023, 06:16

General

  • Target

    2694c6a46fb4f31717271c0fe8bc07b0.exe

  • Size

    423KB

  • MD5

    2694c6a46fb4f31717271c0fe8bc07b0

  • SHA1

    ffec86aa9cecf527002d904dadf19c2a0d764355

  • SHA256

    5954eac580fa2c454e03ee55567eab4e46f30b3deac01e3eb02511cc7df8d425

  • SHA512

    6086023a304a797e7f44757e0734e92cc57bbf1a55a3ed5f5281dc67f9c558f682610064305d227416621e613efd03a996075b83086421cc1c88938bc2eedadf

  • SSDEEP

    6144:NehV0beObvxzu2zpBSdHnFeIOYd8V6s98PUVYysvTHpGmf/e:NKaHu2zSdHnwFe8cs985bzW

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2694c6a46fb4f31717271c0fe8bc07b0.exe
    "C:\Users\Admin\AppData\Local\Temp\2694c6a46fb4f31717271c0fe8bc07b0.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2340
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 1280
      2⤵
      • Program crash
      PID:3480
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2340 -ip 2340
    1⤵
      PID:3632

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2340-132-0x000000000052E000-0x000000000055D000-memory.dmp

      Filesize

      188KB

    • memory/2340-133-0x00000000021C0000-0x000000000220B000-memory.dmp

      Filesize

      300KB

    • memory/2340-134-0x0000000000400000-0x000000000046F000-memory.dmp

      Filesize

      444KB

    • memory/2340-135-0x0000000004C70000-0x0000000005214000-memory.dmp

      Filesize

      5.6MB

    • memory/2340-136-0x0000000005220000-0x0000000005838000-memory.dmp

      Filesize

      6.1MB

    • memory/2340-137-0x0000000005840000-0x000000000594A000-memory.dmp

      Filesize

      1.0MB

    • memory/2340-138-0x0000000005980000-0x0000000005992000-memory.dmp

      Filesize

      72KB

    • memory/2340-139-0x00000000059A0000-0x00000000059DC000-memory.dmp

      Filesize

      240KB

    • memory/2340-140-0x0000000005C90000-0x0000000005D22000-memory.dmp

      Filesize

      584KB

    • memory/2340-141-0x0000000005D30000-0x0000000005D96000-memory.dmp

      Filesize

      408KB

    • memory/2340-142-0x000000000052E000-0x000000000055D000-memory.dmp

      Filesize

      188KB

    • memory/2340-143-0x0000000006540000-0x00000000065B6000-memory.dmp

      Filesize

      472KB

    • memory/2340-144-0x00000000065D0000-0x0000000006620000-memory.dmp

      Filesize

      320KB

    • memory/2340-145-0x00000000067A0000-0x0000000006962000-memory.dmp

      Filesize

      1.8MB

    • memory/2340-146-0x0000000006970000-0x0000000006E9C000-memory.dmp

      Filesize

      5.2MB

    • memory/2340-147-0x000000000052E000-0x000000000055D000-memory.dmp

      Filesize

      188KB

    • memory/2340-148-0x0000000000400000-0x000000000046F000-memory.dmp

      Filesize

      444KB