Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 16:24

General

  • Target

    7c7d1b64f0cbdd461d277af390d6eae2.exe

  • Size

    101KB

  • MD5

    7c7d1b64f0cbdd461d277af390d6eae2

  • SHA1

    fb62a44e96fdbfd76fe03b550ab23a1f5f312aed

  • SHA256

    cb79879f54a98659a4ae0a72686ecb18027aad44a11527a81c6b4790d053b76c

  • SHA512

    f50681911a5bc35bbe7ac680cc0a5e0becffd3abaf47a2e6417adc48778e9262939038c181c58fcbb52d1208fb3efe3672b05719bced9003ec8714deb8af1c2e

  • SSDEEP

    1536:DuLdaekIpG1GCDPy+EiaD4y3oAYp+d5qw6Re+u58753fNk3OJGkYVPdUUk4moGmL:bep8PHGDUw6Re453fufPdo4mPWIGN

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c7d1b64f0cbdd461d277af390d6eae2.exe
    "C:\Users\Admin\AppData\Local\Temp\7c7d1b64f0cbdd461d277af390d6eae2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:824
    • C:\Users\Admin\AppData\Local\Temp\QuickyPlaeyr.exe
      C:\Users\Admin\AppData\Local\Temp\QuickyPlaeyr.exe
      2⤵
      • Executes dropped EXE
      PID:4724
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 852
        3⤵
        • Program crash
        PID:2864
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4724 -ip 4724
    1⤵
      PID:2684

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\QuickyPlaeyr.exe

      Filesize

      21KB

      MD5

      fea3de2f25ca36ec3d6b66014b72e32e

      SHA1

      034f40ed75c6f7c84fef3685ce339054b0d951af

      SHA256

      0d411ca57a9bd810bbf4a4824e3a4741643e4364fa68eb946a0959464c159871

      SHA512

      75062f647605eea3f910027a4a1a87602c5991e376238a0279667839e06b41f3612fc8182c65fef447c6b88773546eb6259113cad52a24c0de2152766793163c

    • memory/824-11-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/4724-6-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/4724-7-0x0000000000870000-0x0000000000875000-memory.dmp

      Filesize

      20KB

    • memory/4724-8-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB