Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2023, 00:36

General

  • Target

    6f1aff257d43624aa0527ad8e42a9eaa_JC.exe

  • Size

    476KB

  • MD5

    6f1aff257d43624aa0527ad8e42a9eaa

  • SHA1

    05b88598b95381e953ded29f283a74c09804c24a

  • SHA256

    f197085e02a2ee9e70b421847c1aa685acd571fd677a91cb3024f63228e27e68

  • SHA512

    cd2dcac8c0ccd68ffc616d26250844c724d993e82fdbed7b8ac00982a6b6cbdfc2a3ab83f50c5103992a3e92c7f8aa13b6f458db01c7d497d4d7f4cbffbbafb9

  • SSDEEP

    12288:ZteeYSnaQVt3Iu89PJ7a3KfMcVVDAmUlJdq6ozktbsJ0C:ZteeY69T3UJ7Vf7eFtNozkRsJT

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f1aff257d43624aa0527ad8e42a9eaa_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\6f1aff257d43624aa0527ad8e42a9eaa_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Users\Admin\AppData\Local\Temp\0We9oeg8sS2hrrQ.exe
      C:\Users\Admin\AppData\Local\Temp\0We9oeg8sS2hrrQ.exe
      2⤵
      • Executes dropped EXE
      PID:1288
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:3000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\0We9oeg8sS2hrrQ.exe

    Filesize

    476KB

    MD5

    935e2ac5b9c3efb1167242716b096422

    SHA1

    c13d37c636b97a59eade8178501d765cb30819a7

    SHA256

    d88d411538fe8f8f7701303b94caddd146af664b839263718576e7bd0cdf0611

    SHA512

    33f543d356e2e6d5d328d602d6da304e16b6646e42226d0ae7f73d48e46b1a5d34b483539f5ec8a0dc9bc589c9f77c9b1f645b6e43a2ebecc8a2a89926c3d7ed

  • C:\Users\Admin\AppData\Local\Temp\0We9oeg8sS2hrrQ.exe

    Filesize

    64KB

    MD5

    e97c622b03fb2a2598bf019fbbe29f2c

    SHA1

    32698bd1d3a0ff6cf441770d1b2b816285068d19

    SHA256

    5c1af46c7300e87a73dacf6cf41ce397e3f05df6bd9c7e227b4ac59f85769160

    SHA512

    db70c62fb35a8e5b005f13b57c1ebbf6c465f6ff0524422294c43e27fb4aa79379dc1e300ad11dc2354405c43b192ae06b91c0f525a1f2617e4d14673651a87d

  • C:\Users\Admin\AppData\Local\Temp\0We9oeg8sS2hrrQ.exe

    Filesize

    64KB

    MD5

    e97c622b03fb2a2598bf019fbbe29f2c

    SHA1

    32698bd1d3a0ff6cf441770d1b2b816285068d19

    SHA256

    5c1af46c7300e87a73dacf6cf41ce397e3f05df6bd9c7e227b4ac59f85769160

    SHA512

    db70c62fb35a8e5b005f13b57c1ebbf6c465f6ff0524422294c43e27fb4aa79379dc1e300ad11dc2354405c43b192ae06b91c0f525a1f2617e4d14673651a87d

  • C:\Windows\CTS.exe

    Filesize

    412KB

    MD5

    5c0283165000c05ddbb2d74fb6084223

    SHA1

    2e725d4ccf1d23cf4b18e80ef962ea342d4e7f7d

    SHA256

    55adcf4b195ca87cc5f45ec0f6c1d1068a5d9163ed05c50ab58799503dc877b4

    SHA512

    dcbd4ffc5306df6afbdecc509759e6ad1a7ec4dd48917637520cb3844984c526246f7ed005849f046e03f722bbf11e3966328c9287a4061db6eba9b1881b7ca5

  • C:\Windows\CTS.exe

    Filesize

    412KB

    MD5

    5c0283165000c05ddbb2d74fb6084223

    SHA1

    2e725d4ccf1d23cf4b18e80ef962ea342d4e7f7d

    SHA256

    55adcf4b195ca87cc5f45ec0f6c1d1068a5d9163ed05c50ab58799503dc877b4

    SHA512

    dcbd4ffc5306df6afbdecc509759e6ad1a7ec4dd48917637520cb3844984c526246f7ed005849f046e03f722bbf11e3966328c9287a4061db6eba9b1881b7ca5

  • C:\Windows\CTS.exe

    Filesize

    412KB

    MD5

    5c0283165000c05ddbb2d74fb6084223

    SHA1

    2e725d4ccf1d23cf4b18e80ef962ea342d4e7f7d

    SHA256

    55adcf4b195ca87cc5f45ec0f6c1d1068a5d9163ed05c50ab58799503dc877b4

    SHA512

    dcbd4ffc5306df6afbdecc509759e6ad1a7ec4dd48917637520cb3844984c526246f7ed005849f046e03f722bbf11e3966328c9287a4061db6eba9b1881b7ca5

  • \Users\Admin\AppData\Local\Temp\0We9oeg8sS2hrrQ.exe

    Filesize

    64KB

    MD5

    e97c622b03fb2a2598bf019fbbe29f2c

    SHA1

    32698bd1d3a0ff6cf441770d1b2b816285068d19

    SHA256

    5c1af46c7300e87a73dacf6cf41ce397e3f05df6bd9c7e227b4ac59f85769160

    SHA512

    db70c62fb35a8e5b005f13b57c1ebbf6c465f6ff0524422294c43e27fb4aa79379dc1e300ad11dc2354405c43b192ae06b91c0f525a1f2617e4d14673651a87d

  • \Users\Admin\AppData\Local\Temp\0We9oeg8sS2hrrQ.exe

    Filesize

    64KB

    MD5

    e97c622b03fb2a2598bf019fbbe29f2c

    SHA1

    32698bd1d3a0ff6cf441770d1b2b816285068d19

    SHA256

    5c1af46c7300e87a73dacf6cf41ce397e3f05df6bd9c7e227b4ac59f85769160

    SHA512

    db70c62fb35a8e5b005f13b57c1ebbf6c465f6ff0524422294c43e27fb4aa79379dc1e300ad11dc2354405c43b192ae06b91c0f525a1f2617e4d14673651a87d

  • memory/1460-0-0x00000000003E0000-0x0000000000400000-memory.dmp

    Filesize

    128KB

  • memory/1460-15-0x00000000003E0000-0x0000000000400000-memory.dmp

    Filesize

    128KB

  • memory/1460-11-0x0000000000070000-0x0000000000090000-memory.dmp

    Filesize

    128KB

  • memory/3000-18-0x00000000010C0000-0x00000000010E0000-memory.dmp

    Filesize

    128KB