Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 03:22

General

  • Target

    02c03f3d2982ecdd7dde16212b7533bf.exe

  • Size

    1.2MB

  • MD5

    02c03f3d2982ecdd7dde16212b7533bf

  • SHA1

    9e6f922920775f9a8b36177489a5de3c59c9d21f

  • SHA256

    123a2f45b582c82b36c29c054f378f7559cb346a9090de9caf0ebe577f8a1664

  • SHA512

    9a843f985e217147b273edc1a06bef58976645a0f7c8ea23609196deb8d3e94e66af09cb7c151dbf9d8e4ec4253f6bb9f7b69a3c1b8fa17fe199c56cbb2291f5

  • SSDEEP

    24576:vjQqIWuXi6kgaINVZdkQaAUuEgYdBO+hkmDZs82kOUF4+mfM2neKvYV58QGOjbvo:souXiTcNLefAUvVb3ZLOU+PeKvYV9DmZ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02c03f3d2982ecdd7dde16212b7533bf.exe
    "C:\Users\Admin\AppData\Local\Temp\02c03f3d2982ecdd7dde16212b7533bf.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3440
    • C:\Users\Admin\AppData\Local\Temp\SWCDAYEUOIN\tmppack.exe
      -y
      2⤵
      • Executes dropped EXE
      PID:4632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\064my2d\gui\page_4183_attr_3.png

    Filesize

    10KB

    MD5

    cf6451e42fc3d5cacaab23dfb286e9dd

    SHA1

    320cb0371ed48b15dfd4839d0c2d0a1a1be60e38

    SHA256

    4b25cde8520cb7cdc9b6a50e95b95746ab9233b5c956ff24cdd74a0150eaefc7

    SHA512

    aa40b291a4c40767e802952f892f67304b13199aef27267ab130f9842306dea47d3bde986c5fe7abc67847b89bc937066b79c2a097f7dedd7be6423dbe0d8565

  • C:\Users\Admin\AppData\Local\Temp\064my2d\gui\page_4183_attr_46.bmp

    Filesize

    41KB

    MD5

    19cafe521085d306aa66d256bce120c6

    SHA1

    a41ae63f80dc451fb68a34f64aa86867f2cdbd6e

    SHA256

    ce22b3fa0bb7ad842657737c51a287caea2623019fcefbea4906462f49e31894

    SHA512

    936e0ca8f2accfaba11dc190e89ae3d19e2ba0963824e87c24ab7e1cc006cc7232163c90924a1e93abe7d602b64b4b5543544e114d9059ea56b6f28535c8527d

  • C:\Users\Admin\AppData\Local\Temp\064my2d\wizard.xml

    Filesize

    7KB

    MD5

    668db86f85ca867db6c1171b3c2830e5

    SHA1

    45f1459e83c6d1aad99f03f724e4086b51e08e13

    SHA256

    4be63b1a3b61ce143740eb0f1adbe44cda00b8a7a76a068e933fbaf40e91e5b0

    SHA512

    9c290624368c68d31bd2e80a28ecdb7e048a34bb20d2b1d05c7ab8f9179b61ba4a66ba6d43e1833b16a3fea807fb9c3a39659e67ea538a938e612109fcb4e45a

  • C:\Users\Admin\AppData\Local\Temp\SWCDAYEUOIN\installer.pak

    Filesize

    473KB

    MD5

    a3e6234bd198f6ea0da3a7140f4dae96

    SHA1

    64d54e5d34278078a519f9fa23695fc21a0e4f6f

    SHA256

    7beb08b278da8b6cca995989463be42785d3cfefbe5bc307e0950c15ef2c8207

    SHA512

    abacd1c0da0aa36309fd226a0459b9db16874aa49809144a3cb8f80c2123ab954a8de524e499f5a474b394d4de310db32695b6ac36754c2fb14d0223135ca447

  • C:\Users\Admin\AppData\Local\Temp\SWCDAYEUOIN\tmppack.exe

    Filesize

    316KB

    MD5

    b1b648cfa849e2292dceb6dc44b368ea

    SHA1

    c734fd9c621de76f239ae5301940f7325d8a72ee

    SHA256

    319af37524c39986671bfeaa22d6e51831f418d02d6995e7309f1dc8cfcf782b

    SHA512

    ae010f695bd4f79fbbd94d090cfff8c20547fe6f175ab034c9f71876a38c385e2deffdb066bb46f558fc7ea5ef6c271ee4c1f3edd1872bd8d9603cb3ac507790

  • C:\Users\Admin\AppData\Local\Temp\SWCDAYEUOIN\tmppack.exe

    Filesize

    557KB

    MD5

    445346ce52c4b847b6c84d7ca834f690

    SHA1

    1a6af974faa7ddcb37098ddd6b36ab305c44adaf

    SHA256

    9627ae735bc41450897daa8107c648540f5ca1b5de23c3ab0f48897551a53ca2

    SHA512

    b8f4a258523fdbcc3a0f705ecb61d7478003bb2a48eb1615f16bc276e203310a01554b186791d4542ccd7906ad95d3c9d5a27ceb069e650de1f393d6aef0f43e

  • memory/3440-7-0x00000000055E0000-0x0000000005777000-memory.dmp

    Filesize

    1.6MB

  • memory/3440-87-0x0000000005150000-0x0000000005151000-memory.dmp

    Filesize

    4KB

  • memory/3440-103-0x0000000005150000-0x0000000005151000-memory.dmp

    Filesize

    4KB