Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    17/09/2023, 22:49 UTC

General

  • Target

    4ee210619a17ea358d02f212d8cfbd94bc00343ef11c0cf0a1ec4f5aec40b0b4.exe

  • Size

    2.0MB

  • MD5

    114bc97983b9d07047b38fe764a76d45

  • SHA1

    a3a50e225a4cea5d0c7d605be70cc5cdd42b0e3c

  • SHA256

    4ee210619a17ea358d02f212d8cfbd94bc00343ef11c0cf0a1ec4f5aec40b0b4

  • SHA512

    5a373b07158ba5b769fa9714a18f89559d9e746b719218725afbf228863d5b0adfc218fee637fcafb273fc630b89ba2ec8a0603d2da4c5eb7629cda74d57c9f2

  • SSDEEP

    24576:A//kLASoMc42yNuvyjUD3mZ1fkaj7UMe6:AlMc42yRg2Z1fkaZ

Score
7/10

Malware Config

Signatures

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ee210619a17ea358d02f212d8cfbd94bc00343ef11c0cf0a1ec4f5aec40b0b4.exe
    "C:\Users\Admin\AppData\Local\Temp\4ee210619a17ea358d02f212d8cfbd94bc00343ef11c0cf0a1ec4f5aec40b0b4.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2704
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2296

Network

    No results found
  • 91.103.252.3:23000
    vbc.exe
    3.5MB
    54.2kB
    2574
    1175
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2296-2-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2296-3-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2296-7-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2296-9-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2296-11-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2296-12-0x0000000074750000-0x0000000074E3E000-memory.dmp

    Filesize

    6.9MB

  • memory/2296-13-0x0000000007440000-0x0000000007480000-memory.dmp

    Filesize

    256KB

  • memory/2296-14-0x0000000074750000-0x0000000074E3E000-memory.dmp

    Filesize

    6.9MB

  • memory/2704-0-0x0000000000FF0000-0x0000000001244000-memory.dmp

    Filesize

    2.3MB

  • memory/2704-1-0x0000000000FF0000-0x0000000001244000-memory.dmp

    Filesize

    2.3MB

  • memory/2704-10-0x0000000000FF0000-0x0000000001244000-memory.dmp

    Filesize

    2.3MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.