Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/01/2024, 18:28

General

  • Target

    4c267bfd760e90a203a744138d59ce5c.exe

  • Size

    3.4MB

  • MD5

    4c267bfd760e90a203a744138d59ce5c

  • SHA1

    5d585e86b727b9d94e8458a298880f1f79815e3a

  • SHA256

    1da32f2f8d0930fa4817a88b963c853345241501dc27ee1c4ff97778eccef8fb

  • SHA512

    49d0f977d441ceca95366a33288b56baf41daf571b635d0908eb4a3a759a2bd91964eb2038bc0fe24708f4e7881d2cce19225f90c1a8a75db61f2f643d827172

  • SSDEEP

    98304:HRS6nfSOQZOt+CW+7EELhF3gxpNOf2k2Y/4aEuC0:Hkj8NBFwxpNOuk2faEuC0

Malware Config

Signatures

  • Stops running service(s) 3 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c267bfd760e90a203a744138d59ce5c.exe
    "C:\Users\Admin\AppData\Local\Temp\4c267bfd760e90a203a744138d59ce5c.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1456
    • C:\Users\Admin\AppData\Local\Temp\NUBk39y5lI9902.exe
      "C:\Users\Admin\AppData\Local\Temp\NUBk39y5lI9902.exe" QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxUZW1wXDRjMjY3YmZkNzYwZTkwYTIwM2E3NDQxMzhkNTljZTVjLmV4ZQ==
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3272
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /C sc stop "SysMain" & sc config "SysMain" start=disabled
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2332
  • C:\Windows\system32\sc.exe
    sc config "SysMain" start=disabled
    1⤵
    • Launches sc.exe
    PID:1756
  • C:\Windows\system32\sc.exe
    sc stop "SysMain"
    1⤵
    • Launches sc.exe
    PID:3480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\NUBk39y5lI9902.exe

    Filesize

    33KB

    MD5

    0a3fe8806e5fe06bf0df3d0ced7ddba1

    SHA1

    d14f1426150f225d493d55b35ee1666451b17a28

    SHA256

    1fd6d305a7c7dfae7556b1d63915854c2511e4a0dcd122beda392709f9fa427b

    SHA512

    ea8dcd5a69d897a3d63680af11d58f0035c6b5afc68e544283bccb983ddc41a9a90be65e1d28de94f8b23eeaef196d359499e52544682c846c670cf028d76740

  • C:\Users\Admin\AppData\Local\Temp\NUBk39y5lI9902.exe

    Filesize

    138KB

    MD5

    3d48c67fc00cc8f888fbec451ae66abc

    SHA1

    489b63be9e1e6398cac684df4bc6bcd4f480aa85

    SHA256

    7547e27e7ba57b0a3734483c49cd3a05f1f7169a319ea3dd6ce0acfe707a58b2

    SHA512

    5e1a96dba3c7fce93a41dba2237ecaafc863b47a8b47dda14719d741fc85bc871fbccc5083ebc4e09a9b53e662421bce462f3c41fa6460e3e0284edae457032d

  • memory/1456-7-0x0000022E99E30000-0x0000022E99E36000-memory.dmp

    Filesize

    24KB

  • memory/1456-9-0x0000022E99EE0000-0x0000022E99EE6000-memory.dmp

    Filesize

    24KB

  • memory/1456-3-0x0000022EFE770000-0x0000022EFE780000-memory.dmp

    Filesize

    64KB

  • memory/1456-5-0x0000022E99780000-0x0000022E99BB8000-memory.dmp

    Filesize

    4.2MB

  • memory/1456-6-0x0000022E99CC0000-0x0000022E99CC4000-memory.dmp

    Filesize

    16KB

  • memory/1456-0-0x0000022EFC060000-0x0000022EFC384000-memory.dmp

    Filesize

    3.1MB

  • memory/1456-8-0x0000022E99E40000-0x0000022E99EDC000-memory.dmp

    Filesize

    624KB

  • memory/1456-1-0x00007FFBADB70000-0x00007FFBAE631000-memory.dmp

    Filesize

    10.8MB

  • memory/1456-10-0x0000022EFE000000-0x0000022EFE008000-memory.dmp

    Filesize

    32KB

  • memory/1456-11-0x0000022EFEBF0000-0x0000022EFECAA000-memory.dmp

    Filesize

    744KB

  • memory/1456-12-0x0000022E99F20000-0x0000022E99F52000-memory.dmp

    Filesize

    200KB

  • memory/1456-30-0x00007FFBADB70000-0x00007FFBAE631000-memory.dmp

    Filesize

    10.8MB

  • memory/1456-4-0x0000022EFE020000-0x0000022EFE050000-memory.dmp

    Filesize

    192KB

  • memory/1456-2-0x0000022EFE900000-0x0000022EFEBF0000-memory.dmp

    Filesize

    2.9MB

  • memory/1456-13-0x0000022E99F50000-0x0000022E99F54000-memory.dmp

    Filesize

    16KB

  • memory/3272-38-0x00007FFBADB70000-0x00007FFBAE631000-memory.dmp

    Filesize

    10.8MB

  • memory/3272-28-0x00007FFBADB70000-0x00007FFBAE631000-memory.dmp

    Filesize

    10.8MB

  • memory/3272-31-0x0000023B4FC70000-0x0000023B4FC80000-memory.dmp

    Filesize

    64KB

  • memory/3272-32-0x0000023B51DE0000-0x0000023B51E52000-memory.dmp

    Filesize

    456KB

  • memory/3272-33-0x0000023B51D00000-0x0000023B51D06000-memory.dmp

    Filesize

    24KB

  • memory/3272-34-0x0000023B4FC70000-0x0000023B4FC80000-memory.dmp

    Filesize

    64KB

  • memory/3272-36-0x0000023B52340000-0x0000023B5234E000-memory.dmp

    Filesize

    56KB

  • memory/3272-35-0x0000023B54950000-0x0000023B54988000-memory.dmp

    Filesize

    224KB

  • memory/3272-37-0x0000023B4FC70000-0x0000023B4FC80000-memory.dmp

    Filesize

    64KB

  • memory/3272-27-0x0000023B353A0000-0x0000023B356C4000-memory.dmp

    Filesize

    3.1MB

  • memory/3272-39-0x0000023B4FC70000-0x0000023B4FC80000-memory.dmp

    Filesize

    64KB

  • memory/3272-40-0x0000023B4FC70000-0x0000023B4FC80000-memory.dmp

    Filesize

    64KB