Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1193s -
max time network
1191s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/01/2024, 14:53
Static task
static1
Behavioral task
behavioral1
Sample
7829fd09ab10f4a1a2d5607d0aba69931d1b8ec68f1d95607af34ffaf80691b8.exe
Resource
win10-20231215-en
Behavioral task
behavioral2
Sample
7829fd09ab10f4a1a2d5607d0aba69931d1b8ec68f1d95607af34ffaf80691b8.exe
Resource
win10v2004-20231215-en
General
-
Target
7829fd09ab10f4a1a2d5607d0aba69931d1b8ec68f1d95607af34ffaf80691b8.exe
-
Size
15.4MB
-
MD5
48960927f906cbe23a79dc61ff0a2fea
-
SHA1
62ab60890776f8c0188253c61c59706ca5046950
-
SHA256
7829fd09ab10f4a1a2d5607d0aba69931d1b8ec68f1d95607af34ffaf80691b8
-
SHA512
3e2d0e487d9138eaedc0529f4c98cb96635886133ce3020af55175a3ca9e3d5bdf81dfcf5c89e54abc916cdf79cbc44c371ff6014f2fad1fd92c9b7c2d05afb4
-
SSDEEP
393216:bZnIdQ+TOgj/C5oo4162qc1kqzp99v93UUxRz:bjQScqwkqTp93UUxV
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3580 BraveBrowserSetup.exe 4556 dexket.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 3 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3580 BraveBrowserSetup.exe 3580 BraveBrowserSetup.exe 3580 BraveBrowserSetup.exe 3580 BraveBrowserSetup.exe 3580 BraveBrowserSetup.exe 3580 BraveBrowserSetup.exe 3580 BraveBrowserSetup.exe 3580 BraveBrowserSetup.exe 3580 BraveBrowserSetup.exe 3580 BraveBrowserSetup.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3640 wrote to memory of 3580 3640 7829fd09ab10f4a1a2d5607d0aba69931d1b8ec68f1d95607af34ffaf80691b8.exe 78 PID 3640 wrote to memory of 3580 3640 7829fd09ab10f4a1a2d5607d0aba69931d1b8ec68f1d95607af34ffaf80691b8.exe 78 PID 3640 wrote to memory of 4556 3640 7829fd09ab10f4a1a2d5607d0aba69931d1b8ec68f1d95607af34ffaf80691b8.exe 79 PID 3640 wrote to memory of 4556 3640 7829fd09ab10f4a1a2d5607d0aba69931d1b8ec68f1d95607af34ffaf80691b8.exe 79 PID 3640 wrote to memory of 4556 3640 7829fd09ab10f4a1a2d5607d0aba69931d1b8ec68f1d95607af34ffaf80691b8.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\7829fd09ab10f4a1a2d5607d0aba69931d1b8ec68f1d95607af34ffaf80691b8.exe"C:\Users\Admin\AppData\Local\Temp\7829fd09ab10f4a1a2d5607d0aba69931d1b8ec68f1d95607af34ffaf80691b8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\BraveBrowserSetup.exe"C:\Users\Admin\AppData\Local\Temp\BraveBrowserSetup.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3580
-
-
C:\Users\Admin\AppData\Local\Temp\dexket.exe"C:\Users\Admin\AppData\Local\Temp\dexket.exe"2⤵
- Executes dropped EXE
PID:4556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD59a45efb9677b782c9b9d4cf515f782cf
SHA1348ea4242dbfba65daa1f8e6c8561641f927ddff
SHA256a05f37aaf82d576ff766cbc747161a17875a64c238ecebd455832ccd71a342d8
SHA51276021c18303f7ec4ac0a9557d998d560b0f2b359e9096633c73889bc28b12ea2310aefd909a370dabbf5a44e6396df4893a597fbecc0d6fee3c39d94dcc62fa2
-
Filesize
1.9MB
MD5d680d2917481bfd262122e7b29decf12
SHA1a7df7d8e4e8071b979972c3976a54a908f6bbe94
SHA256a21539d8bc802b65960dec0c16ca42d00394228288711442b49e9186665e164e
SHA512bc11b43a46936640a9a207a55cdd5f6e63ab9b97b608ffdab6c999642d30b3f8ce0a2aec0560bb340a691cacaa04f3a8232c74fa219de97ecad4d33b696a20cb
-
Filesize
767KB
MD58dc02ce7893fb2e72ddb834bd5c58269
SHA18c9e415d9610f93961458c5b4aab11aa0c8a1869
SHA2561ad42c95ea1348c39f92fb798e28e3643f6121c1d83367f271290e3712876a6a
SHA512b388938b3a055213a235f97920656b51239dffdfc73fb5ae9f06e5c7864a10fed90633f3a5efb15c429b42f058bff452fa71d585e4886da24fd176c59009d48a
-
Filesize
748KB
MD5e65a2f243100c85f6385fe37c10b8e80
SHA1c2f104a583c35512e3c1ed031126f032b72587c6
SHA2563814beca3926f534b392474bd608dd49d53a1dbcf487a7e17f4b96803c2dbe68
SHA5120ad6cd7056af044dcf2130573511fff727a77efbc398b89209fad6373635e5cd4c8c60556fcf943fa4a3bd0d3fafb51aa88aeb3bbc2faf67ec787602cf840a2c