Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 18:39

General

  • Target

    351cd13225c4058ad6bd276481954841.exe

  • Size

    556KB

  • MD5

    351cd13225c4058ad6bd276481954841

  • SHA1

    3c3da47651ea3a0024a3eafd17c5d0ab52ac0b7b

  • SHA256

    8e123b3b7ef8e4b1be8813030cdba044ebe62bed12d388651bd462a68f7dc1a0

  • SHA512

    267dfc289d7bac4dd8b1f0ef1f295c26a467350760007ab0bb3eb6e3ca27e7ec8b372f3ac68ec0cb32ceb0eedf0e96ee1746229a8010f933c38cc74571ec7b52

  • SSDEEP

    12288:qJJogLJ/lht9Yr2Jt47VZRg8bN2+vgKRWZINQdqvM8MSGxA:oJjd7ysglgCN2+4KQZVdqnMSGxA

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\351cd13225c4058ad6bd276481954841.exe
    "C:\Users\Admin\AppData\Local\Temp\351cd13225c4058ad6bd276481954841.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\281.bat
      2⤵
        PID:3792

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\281.bat

      Filesize

      175B

      MD5

      002b84e6ea2ffde3f76acb3b74562807

      SHA1

      f6b8f9b8e9c2456a950de57e6773c18aa2e12f61

      SHA256

      b7539f416834d045cebc4635bcaf10cdec9d8769f0973067d85bbecab8e534f9

      SHA512

      819cada9ca3ead403ccd193d69c5740ee7c5ffa52b3a03d689f598e1d7c3e76cf9283a072392c221e1c92cfa5469f68a6122414a3cb44001ccb19f08db6a0b82

    • C:\Users\Admin\AppData\Local\Temp\63413.exe

      Filesize

      71KB

      MD5

      55238e19dc3069f10645a2bcad016bd4

      SHA1

      8bc00c4d3d15fd9aa46aeffbcb3288be4c46c4da

      SHA256

      9f87f8879e5ce20f7dbece589fa9d9ffe852dcf91604cc243085a9b56486e4a2

      SHA512

      f21bc6faa395f6fc03b3c7986dbc5f1289ab23f77c7d2786e6cf489a6637dbd4fa7aacd713c292dd95baae21d1f7e8d02a2223b14f67c3ba959f2a1188187506

    • memory/3056-0-0x0000000010000000-0x0000000010128000-memory.dmp

      Filesize

      1.2MB