Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    92s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2023, 03:10

General

  • Target

    51151117db0ca403eeaf951bbedc08bec3a8b394519a5112bc6813d3b8860b6c.exe

  • Size

    380KB

  • MD5

    94cd5c180fb6aa5ffd26043afc3b5982

  • SHA1

    0eed6b92fc4f9978348bb360cbe72c2792d4698b

  • SHA256

    51151117db0ca403eeaf951bbedc08bec3a8b394519a5112bc6813d3b8860b6c

  • SHA512

    278fe5281f7bef5f90107e9c1e765439ddf7a65c19d5680b158856ca0063898be86e50ff8db47fc398be4011e37d4c6b61a6f057d809e7cc171362158b2de78f

  • SSDEEP

    6144:f6ZEjhyJ+RaNrNUfa+XmvQ+I5yH/2MLpfKR2y8wUR:f6ZEjhyJ+UmaumvQdyH/2M1KRGR

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\51151117db0ca403eeaf951bbedc08bec3a8b394519a5112bc6813d3b8860b6c.exe
    "C:\Users\Admin\AppData\Local\Temp\51151117db0ca403eeaf951bbedc08bec3a8b394519a5112bc6813d3b8860b6c.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3496
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 1132
      2⤵
      • Program crash
      PID:1444
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3496 -ip 3496
    1⤵
      PID:1012

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3496-132-0x0000000002CED000-0x0000000002D1B000-memory.dmp

      Filesize

      184KB

    • memory/3496-133-0x0000000004930000-0x000000000497B000-memory.dmp

      Filesize

      300KB

    • memory/3496-134-0x0000000000400000-0x0000000002BC7000-memory.dmp

      Filesize

      39.8MB

    • memory/3496-135-0x0000000007480000-0x0000000007A24000-memory.dmp

      Filesize

      5.6MB

    • memory/3496-136-0x0000000007A30000-0x0000000008048000-memory.dmp

      Filesize

      6.1MB

    • memory/3496-137-0x0000000008050000-0x000000000815A000-memory.dmp

      Filesize

      1.0MB

    • memory/3496-138-0x00000000073F0000-0x0000000007402000-memory.dmp

      Filesize

      72KB

    • memory/3496-139-0x0000000008160000-0x000000000819C000-memory.dmp

      Filesize

      240KB

    • memory/3496-140-0x0000000002CED000-0x0000000002D1B000-memory.dmp

      Filesize

      184KB

    • memory/3496-141-0x00000000083F0000-0x0000000008456000-memory.dmp

      Filesize

      408KB

    • memory/3496-142-0x0000000008AB0000-0x0000000008B42000-memory.dmp

      Filesize

      584KB

    • memory/3496-143-0x0000000008CB0000-0x0000000008E72000-memory.dmp

      Filesize

      1.8MB

    • memory/3496-144-0x0000000008E80000-0x00000000093AC000-memory.dmp

      Filesize

      5.2MB

    • memory/3496-145-0x0000000006DC0000-0x0000000006E36000-memory.dmp

      Filesize

      472KB

    • memory/3496-146-0x000000000A7C0000-0x000000000A810000-memory.dmp

      Filesize

      320KB

    • memory/3496-147-0x0000000002CED000-0x0000000002D1B000-memory.dmp

      Filesize

      184KB

    • memory/3496-148-0x0000000000400000-0x0000000002BC7000-memory.dmp

      Filesize

      39.8MB