Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    91s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/02/2023, 03:02 UTC

General

  • Target

    file.exe

  • Size

    395KB

  • MD5

    7ed61df0773d87197bbe21e0f6d8e5ae

  • SHA1

    f03e5f08c58922c2f1141b1c83f71334fd158735

  • SHA256

    0d508393e05d4d39c96b797330f892cedaa7b563a32e36ff6bcd6bc2d6423421

  • SHA512

    e53edcd4fb01c009708035eac4bf1cd09b1cc1fb9396a42a18ebf731dca46c78924a3cfe72c263efb12f20d148a5e05d77cc0d937df711a652e483fc302cdd51

  • SSDEEP

    6144:ASrL490uvdT4khgpHhzRTNuhtTIb/+SAR3Yu/WZqTuQj9+dJa:xrM2u1TxgxxNNuvGWSGYu/WZqTljOJ

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2636
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 1220
      2⤵
      • Program crash
      PID:1556
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2636 -ip 2636
    1⤵
      PID:3092

    Network

      No results found
    • 104.80.225.205:443
      322 B
      7
    • 77.73.133.62:22344
      file.exe
      5.5kB
      5.5kB
      16
      10
    • 13.69.109.130:443
      322 B
      7
    • 178.79.208.1:80
      322 B
      7
    • 178.79.208.1:80
      322 B
      7
    • 178.79.208.1:80
      322 B
      7
    No results found

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2636-132-0x00000000005BE000-0x00000000005EC000-memory.dmp

      Filesize

      184KB

    • memory/2636-133-0x0000000002250000-0x00000000022B2000-memory.dmp

      Filesize

      392KB

    • memory/2636-134-0x0000000000400000-0x00000000004DF000-memory.dmp

      Filesize

      892KB

    • memory/2636-135-0x0000000004C10000-0x00000000051B4000-memory.dmp

      Filesize

      5.6MB

    • memory/2636-136-0x0000000005230000-0x0000000005848000-memory.dmp

      Filesize

      6.1MB

    • memory/2636-137-0x00000000058F0000-0x0000000005902000-memory.dmp

      Filesize

      72KB

    • memory/2636-138-0x0000000005910000-0x0000000005A1A000-memory.dmp

      Filesize

      1.0MB

    • memory/2636-139-0x0000000005A60000-0x0000000005A9C000-memory.dmp

      Filesize

      240KB

    • memory/2636-140-0x0000000005C30000-0x0000000005C96000-memory.dmp

      Filesize

      408KB

    • memory/2636-141-0x0000000006400000-0x0000000006492000-memory.dmp

      Filesize

      584KB

    • memory/2636-142-0x00000000064B0000-0x0000000006526000-memory.dmp

      Filesize

      472KB

    • memory/2636-143-0x00000000065A0000-0x0000000006762000-memory.dmp

      Filesize

      1.8MB

    • memory/2636-144-0x0000000006770000-0x0000000006C9C000-memory.dmp

      Filesize

      5.2MB

    • memory/2636-145-0x0000000006DA0000-0x0000000006DBE000-memory.dmp

      Filesize

      120KB

    • memory/2636-147-0x0000000000400000-0x00000000004DF000-memory.dmp

      Filesize

      892KB

    • memory/2636-146-0x00000000005BE000-0x00000000005EC000-memory.dmp

      Filesize

      184KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.