Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

11/10/2023, 00:51

231011-a7gevsbe37 10

11/10/2023, 00:50

231011-a652tshd41 10

31/01/2023, 09:06

230131-k21xeshe3z 7

Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31/01/2023, 09:06

General

  • Target

    RDR2CHEAT/PrimeXLauncher.exe

  • Size

    159KB

  • MD5

    0c2de2a3c96398428b0ce53ee8be212f

  • SHA1

    348a9089ecdc242b2d729f642a70794d74c9a06b

  • SHA256

    1331d10811b5b02f55f7a6fa0e957543c2c2ea5c9817518f97905b6038dfed93

  • SHA512

    b767bb3487ddca3bfd8d998b675d149f06473190755d8b0402469ddfebfc4121384bd65107850036b67f72429bd8fca399b9b3ec54f088a49935f20ca5d3f0a3

  • SSDEEP

    3072:OaAzRVKaMvVMLGXVJYkwOQKlTXSRBI1IVZQLv0e0Ut:OaAzRV9MMIF1IVZQLv

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RDR2CHEAT\PrimeXLauncher.exe
    "C:\Users\Admin\AppData\Local\Temp\RDR2CHEAT\PrimeXLauncher.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2708
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4312
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:3484
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe"
        2⤵
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4400
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4400.0.945536853\974990206" -parentBuildID 20200403170909 -prefsHandle 1536 -prefMapHandle 1528 -prefsLen 1 -prefMapSize 220115 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4400 "\\.\pipe\gecko-crash-server-pipe.4400" 1628 gpu
          3⤵
            PID:4812
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4400.3.999519027\1662905133" -childID 1 -isForBrowser -prefsHandle 2340 -prefMapHandle 2332 -prefsLen 156 -prefMapSize 220115 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4400 "\\.\pipe\gecko-crash-server-pipe.4400" 2208 tab
            3⤵
              PID:5024
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4400.13.1260672105\1442429108" -childID 2 -isForBrowser -prefsHandle 3432 -prefMapHandle 3428 -prefsLen 6938 -prefMapSize 220115 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4400 "\\.\pipe\gecko-crash-server-pipe.4400" 3444 tab
              3⤵
                PID:4520

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2708-115-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-116-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-117-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-118-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-119-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-120-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-121-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-122-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-123-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-124-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-126-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-125-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-127-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-128-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-129-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-130-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-131-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-132-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-134-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-135-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-136-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-137-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-138-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-139-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-140-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-141-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-133-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-142-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-143-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-144-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-146-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-147-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-145-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-148-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-150-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-152-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-153-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-154-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-151-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-149-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-155-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-156-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-157-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-158-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-159-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-161-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-162-0x0000000000360000-0x000000000038E000-memory.dmp

            Filesize

            184KB

          • memory/2708-163-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-160-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-164-0x0000000005130000-0x0000000005736000-memory.dmp

            Filesize

            6.0MB

          • memory/2708-166-0x0000000004B80000-0x0000000004B92000-memory.dmp

            Filesize

            72KB

          • memory/2708-167-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-168-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-165-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-169-0x0000000004CB0000-0x0000000004DBA000-memory.dmp

            Filesize

            1.0MB

          • memory/2708-170-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-171-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-172-0x0000000004C20000-0x0000000004C5E000-memory.dmp

            Filesize

            248KB

          • memory/2708-173-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-174-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-175-0x0000000004C60000-0x0000000004CAB000-memory.dmp

            Filesize

            300KB

          • memory/2708-176-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-178-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-177-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-179-0x0000000004F40000-0x0000000004FA6000-memory.dmp

            Filesize

            408KB

          • memory/2708-180-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-181-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-182-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-183-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-184-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-185-0x0000000077C70000-0x0000000077DFE000-memory.dmp

            Filesize

            1.6MB

          • memory/2708-187-0x0000000005F40000-0x000000000643E000-memory.dmp

            Filesize

            5.0MB

          • memory/2708-188-0x0000000005AF0000-0x0000000005B82000-memory.dmp

            Filesize

            584KB

          • memory/2708-191-0x0000000005B90000-0x0000000005BE0000-memory.dmp

            Filesize

            320KB

          • memory/2708-192-0x0000000005C60000-0x0000000005CD6000-memory.dmp

            Filesize

            472KB

          • memory/2708-193-0x0000000006610000-0x00000000067D2000-memory.dmp

            Filesize

            1.8MB

          • memory/2708-194-0x0000000006D10000-0x000000000723C000-memory.dmp

            Filesize

            5.2MB

          • memory/2708-198-0x0000000005F00000-0x0000000005F1E000-memory.dmp

            Filesize

            120KB