Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    161s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 12:14

General

  • Target

    18300cea329655d632ae8d82a9b46090.exe

  • Size

    29KB

  • MD5

    18300cea329655d632ae8d82a9b46090

  • SHA1

    e838a952c4825e90ff9704edfa457f8169ef4015

  • SHA256

    b14acdfb8b11e4654abae86babbb6b9b00d4fd78ce13651c612b2ebb7e9ac860

  • SHA512

    24495a945a4fdd5560d2e256c90d830cb0c653c34eb4ab7473f564ea25cec7d016fd7db0d6c5299c259136092e8b9a6f8a46920eb476e6f4ed190a9d2f00a080

  • SSDEEP

    768:XocAX3LKew369lp2z3Sd4baFXLjwP/Tgj93b8NIocVSEF6:SKcR4mjD9r823F6

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18300cea329655d632ae8d82a9b46090.exe
    "C:\Users\Admin\AppData\Local\Temp\18300cea329655d632ae8d82a9b46090.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1844
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:5032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    352KB

    MD5

    eafac22d218a998043c815ad66c9fa7a

    SHA1

    aea8a5a838aaace4337210f42973e718457dd967

    SHA256

    3a0f25b044f5fdbf75ece8dffd39d28a638ea527c165ebfe2fc69e1c667bfa0e

    SHA512

    d0af4dc7859737180be876a54ae1f9f05e7dfc4473ef8e17cd75c2994514522b06fc4c43caa299b8ee5d938509c69d9e24d979a5cf85d0d4c4a753ed76c51b33

  • C:\Windows\CTS.exe

    Filesize

    29KB

    MD5

    70aa23c9229741a9b52e5ce388a883ac

    SHA1

    b42683e21e13de3f71db26635954d992ebe7119e

    SHA256

    9d25cc704b1c00c9d17903e25ca35c319663e997cb9da0b116790b639e9688f2

    SHA512

    be604a2ad5ab8a3e5edb8901016a76042ba873c8d05b4ef8eec31241377ec6b2a883b51c6912dc7640581ffa624547db334683975883ae74e62808b5ae9ab0b5

  • memory/1844-0-0x00000000001C0000-0x00000000001D7000-memory.dmp

    Filesize

    92KB

  • memory/1844-9-0x00000000001C0000-0x00000000001D7000-memory.dmp

    Filesize

    92KB

  • memory/5032-7-0x00000000009F0000-0x0000000000A07000-memory.dmp

    Filesize

    92KB

  • memory/5032-26-0x00000000009F0000-0x0000000000A07000-memory.dmp

    Filesize

    92KB