Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
302s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2023, 13:45
General
-
Target
6734.exe
-
Size
504KB
-
MD5
ad576a5e9a73e049d4b2fd7005c4790e
-
SHA1
781c71c7ed316739e7aa6f44072139827eca228c
-
SHA256
9ea90f0a5b0bfa5de1e5aa7eb43000eae8f1c034e5e0b7c3fa97c27e5bc7a8b5
-
SHA512
3061d30fe1a3c8201bbd4106913b03ffd2d16122a8a6f04f8d1023e490589b44b862cf98e08ddfe6b44db79cb904c7f513c1659f1553187ece27429d59cc2357
-
SSDEEP
6144:aym/c4Dyv3TxT8jWHgf8YJkVHC++VeQPBZnq0LZYSwFxQx9tPHh1DTbhXBZdt/vZ:eEpmWHgf8Y6/Qp1nLiDKs+pN1UO
Malware Config
Extracted
gurcu
https://api.telegram.org/bot5805920195:AAHrkiYfOXg55Cncdj5wUj0Ov4rUYjQg7iU/sendMessage?chat_id=5668321496
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation 6734.exe -
Executes dropped EXE 1 IoCs
pid Process 1500 6734.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4732 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3704 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1500 6734.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3664 6734.exe Token: SeDebugPrivilege 1500 6734.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3664 wrote to memory of 2120 3664 6734.exe 84 PID 3664 wrote to memory of 2120 3664 6734.exe 84 PID 2120 wrote to memory of 2136 2120 cmd.exe 86 PID 2120 wrote to memory of 2136 2120 cmd.exe 86 PID 2120 wrote to memory of 3704 2120 cmd.exe 87 PID 2120 wrote to memory of 3704 2120 cmd.exe 87 PID 2120 wrote to memory of 4732 2120 cmd.exe 88 PID 2120 wrote to memory of 4732 2120 cmd.exe 88 PID 2120 wrote to memory of 1500 2120 cmd.exe 89 PID 2120 wrote to memory of 1500 2120 cmd.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6734.exe"C:\Users\Admin\AppData\Local\Temp\6734.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "6734" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\EsetSecurity\6734.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\6734.exe" &&START "" "C:\Users\Admin\AppData\Local\EsetSecurity\6734.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2136
-
-
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:3704
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "6734" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\EsetSecurity\6734.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:4732
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\6734.exe"C:\Users\Admin\AppData\Local\EsetSecurity\6734.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
504KB
MD5ad576a5e9a73e049d4b2fd7005c4790e
SHA1781c71c7ed316739e7aa6f44072139827eca228c
SHA2569ea90f0a5b0bfa5de1e5aa7eb43000eae8f1c034e5e0b7c3fa97c27e5bc7a8b5
SHA5123061d30fe1a3c8201bbd4106913b03ffd2d16122a8a6f04f8d1023e490589b44b862cf98e08ddfe6b44db79cb904c7f513c1659f1553187ece27429d59cc2357
-
Filesize
504KB
MD5ad576a5e9a73e049d4b2fd7005c4790e
SHA1781c71c7ed316739e7aa6f44072139827eca228c
SHA2569ea90f0a5b0bfa5de1e5aa7eb43000eae8f1c034e5e0b7c3fa97c27e5bc7a8b5
SHA5123061d30fe1a3c8201bbd4106913b03ffd2d16122a8a6f04f8d1023e490589b44b862cf98e08ddfe6b44db79cb904c7f513c1659f1553187ece27429d59cc2357
-
Filesize
1KB
MD5fc1be6f3f52d5c841af91f8fc3f790cb
SHA1ac79b4229e0a0ce378ae22fc6104748c5f234511
SHA2566da862f7c7feffca99cd58712ece93928c6ca6aed617f5d8c10a4718eaa2a910
SHA5122f46165017309ee1a0c1b23e30a71e52e86ad8933e2649bf58c3f4628c5aa75659f5b8f6be32c2882f220b2f3ff2fd50d8766bf0a3708c94c2c634c051a05ea6