Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    61s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2023, 06:30

General

  • Target

    Analysis of cochang private key leak event on March 21, 2023.pdf.scr

  • Size

    29.3MB

  • MD5

    0995c7e65e37b776d64b283ca1f21489

  • SHA1

    c5f056d287d852a4c88029f3dd863b27e2a7ec77

  • SHA256

    adfc6d2b25d8aba59c5b358a1ec69a0d9e79d7636999f6232454397435f035a3

  • SHA512

    e05ff36f2d5db1a3bbf6583554ddcad5980ac74782e4b2082a5442f9a8b54b54022848d218d0fa96083176aef6cc2671a0c99a34a717d37073d0ed2c3d79f627

  • SSDEEP

    786432:SjMR4qHLpizyVp/1q1rINsjsq3gazg7ag:0BqHBV1q1rImjsQxPg

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Analysis of cochang private key leak event on March 21, 2023.pdf.scr
    "C:\Users\Admin\AppData\Local\Temp\Analysis of cochang private key leak event on March 21, 2023.pdf.scr" /S
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4424

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4424-133-0x0000000002270000-0x00000000022B9000-memory.dmp

    Filesize

    292KB

  • memory/4424-134-0x0000000012860000-0x0000000012E78000-memory.dmp

    Filesize

    6.1MB

  • memory/4424-135-0x0000000012E80000-0x0000000012E92000-memory.dmp

    Filesize

    72KB

  • memory/4424-136-0x0000000012EA0000-0x0000000012FAA000-memory.dmp

    Filesize

    1.0MB

  • memory/4424-139-0x0000000012850000-0x0000000012860000-memory.dmp

    Filesize

    64KB

  • memory/4424-141-0x0000000012FB0000-0x0000000012FEC000-memory.dmp

    Filesize

    240KB

  • memory/4424-140-0x0000000012850000-0x0000000012860000-memory.dmp

    Filesize

    64KB

  • memory/4424-138-0x0000000012850000-0x0000000012860000-memory.dmp

    Filesize

    64KB

  • memory/4424-137-0x0000000012850000-0x0000000012860000-memory.dmp

    Filesize

    64KB

  • memory/4424-142-0x00000000131C0000-0x0000000013226000-memory.dmp

    Filesize

    408KB

  • memory/4424-143-0x00000000136D0000-0x0000000013C74000-memory.dmp

    Filesize

    5.6MB

  • memory/4424-144-0x0000000013CF0000-0x0000000013D82000-memory.dmp

    Filesize

    584KB

  • memory/4424-145-0x0000000014100000-0x0000000014176000-memory.dmp

    Filesize

    472KB

  • memory/4424-146-0x00000000141D0000-0x0000000014392000-memory.dmp

    Filesize

    1.8MB

  • memory/4424-147-0x0000000014D70000-0x000000001529C000-memory.dmp

    Filesize

    5.2MB

  • memory/4424-148-0x0000000014450000-0x000000001446E000-memory.dmp

    Filesize

    120KB

  • memory/4424-149-0x0000000014510000-0x0000000014560000-memory.dmp

    Filesize

    320KB

  • memory/4424-151-0x0000000002270000-0x00000000022B9000-memory.dmp

    Filesize

    292KB