Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/01/2024, 22:52

General

  • Target

    7e3792f05e502eb3e47f6fd739d40819.exe

  • Size

    29KB

  • MD5

    7e3792f05e502eb3e47f6fd739d40819

  • SHA1

    32932ab541e47f06442791af45e69051cc9fad8d

  • SHA256

    c2b18d558c41919021fbf0165dff5f57f26ff9090279a95e8762bbac6bbfd0cc

  • SHA512

    58acc5fa7733ce8508433aa88f9a1397c8b2a7be3ba1aee95603e275b5b6effdd9683c3f83f34bfe754eaf48f51e11ec6819237bb1444b96f27c6402e2f1cf75

  • SSDEEP

    768:XocAX3LKew369lp2z3Sd4baFXLjwP/Tgj93b8NIocVSEF9:SKcR4mjD9r823F9

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e3792f05e502eb3e47f6fd739d40819.exe
    "C:\Users\Admin\AppData\Local\Temp\7e3792f05e502eb3e47f6fd739d40819.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1408
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    352KB

    MD5

    ee47b8327e7321f84548dbe9fc3f010e

    SHA1

    429a22a724be0b74a276ff50b9a141a62df2640d

    SHA256

    3fdc328fadff07684773f3a4043834baa5e33d3cea46015bc11e63c0acd2b64e

    SHA512

    5274d299b23f69aae9e43fd357f7e6f67efc98f8e7d30a464f2e6169eb2356f9ab038e5e8c422420166c9e7ed1807cb4c6d21a1c97b2467784d2611ba2136ac8

  • C:\Users\Admin\AppData\Local\Temp\S5hJQO9F5vv0OkO.exe

    Filesize

    29KB

    MD5

    0ee6e2484c088cbf4810cdc053733edf

    SHA1

    1a123ae57503d542faf70f77e29bd49b0a96ac5c

    SHA256

    72f25ae8493650fd0a7e19ee96484579e3259cc40348398a7c9678ef4e7912a1

    SHA512

    ec123d615f4f0c961a51978bc8dec15e49d39e5eddde365c5b16a5cd1d8d60ba827d29932c2c17583b06dbe779bd39a96b863bd24a614f631e52882bf7353f89

  • C:\Windows\CTS.exe

    Filesize

    29KB

    MD5

    70aa23c9229741a9b52e5ce388a883ac

    SHA1

    b42683e21e13de3f71db26635954d992ebe7119e

    SHA256

    9d25cc704b1c00c9d17903e25ca35c319663e997cb9da0b116790b639e9688f2

    SHA512

    be604a2ad5ab8a3e5edb8901016a76042ba873c8d05b4ef8eec31241377ec6b2a883b51c6912dc7640581ffa624547db334683975883ae74e62808b5ae9ab0b5

  • memory/1408-0-0x00000000007A0000-0x00000000007B7000-memory.dmp

    Filesize

    92KB

  • memory/1408-7-0x00000000007A0000-0x00000000007B7000-memory.dmp

    Filesize

    92KB

  • memory/3064-9-0x0000000000D00000-0x0000000000D17000-memory.dmp

    Filesize

    92KB

  • memory/3064-31-0x0000000000D00000-0x0000000000D17000-memory.dmp

    Filesize

    92KB