Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    159s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 09:56

General

  • Target

    2c9fc24d6b2c6a8c4b8e4b9ca0cd93b6bcd72d5e41291fea35b9fa144bd197f5.exe

  • Size

    25KB

  • MD5

    2ca55b2dfe1e5515e8ae20288e11b8b5

  • SHA1

    e3a22fab668ae0accb2f3ba330771cd4b59ba8b8

  • SHA256

    2c9fc24d6b2c6a8c4b8e4b9ca0cd93b6bcd72d5e41291fea35b9fa144bd197f5

  • SHA512

    9d617d3f6db74a66c34eda75f19725746fbd2cbf155be7a87404ce955006869e0f2f0c6d92d57ad8a332672c18276b5999bd2fc4810b6123e9154d4b52851abb

  • SSDEEP

    384:qc0J+vqBoLotA8oPNIrxKRQSv7QrzVVvOytGxboE9K/mKHrjpjvu:8Q3LotOPNSQVwVVxGKEvKHrVu

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c9fc24d6b2c6a8c4b8e4b9ca0cd93b6bcd72d5e41291fea35b9fa144bd197f5.exe
    "C:\Users\Admin\AppData\Local\Temp\2c9fc24d6b2c6a8c4b8e4b9ca0cd93b6bcd72d5e41291fea35b9fa144bd197f5.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Windows\spoolsv.exe
      "C:\Windows\spoolsv.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      PID:5076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    349KB

    MD5

    1093e4adb9390774c313f42161772b87

    SHA1

    6b6c2ee239a4920fa76416a4233bf5aacaaa9b06

    SHA256

    72e9105c3d2e574c2ae9d28be0aa7abfe1aa5da686e3a0e9e2d2e62338e66396

    SHA512

    83562218c5436c9e1c66dbd84b9feef433d9f46dc079aec7d6694d7ca2e9dca259056925f2a2553fe55dbfb41a561b7c7241d78497dae583d0d283bbf737cdf9

  • C:\Users\Admin\AppData\Local\Temp\nsdALcakcAMgps3.exe

    Filesize

    25KB

    MD5

    8964b393c5085a0577f7524ca2b6bf20

    SHA1

    46e9c2a3821ba4fd96ed970811185ef07b61ddfc

    SHA256

    ff8f8ad8d0b71e70ad9bf402931845a614835ce237d3efec9cdec4517fc0fdb4

    SHA512

    68c5a4a113e0a89dccba62c9a782004e14b3bca25981789826de2060168bbe9621f27f392d6eaea8d6fcb2e722920b164f782f7aef8b5aa57517931e87aa227c

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    82071fd2379c64429acf376487fcddff

    SHA1

    2da42c7eaa62ecee65757b441c939f12b52228fb

    SHA256

    272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

    SHA512

    194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb

  • C:\Windows\spoolsv.exe

    Filesize

    25KB

    MD5

    82071fd2379c64429acf376487fcddff

    SHA1

    2da42c7eaa62ecee65757b441c939f12b52228fb

    SHA256

    272bd07fa6c2678fd96a026237a184fceffa65d319f6844bac582aff90ce25d8

    SHA512

    194bdbdf624ec425a095a44116032687c46b3e2370f3c436e2d5516dcc778824ff57fa69edfacb42e5e76e05894eb0a40acf32dcee3b80ba397f823ec82b6adb