Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/01/2024, 16:04

General

  • Target

    80435c956343c13c8eb6252c7229692f.exe

  • Size

    224KB

  • MD5

    80435c956343c13c8eb6252c7229692f

  • SHA1

    471c6efa52c9dec5a0a3e12936b81d225eaf4bd3

  • SHA256

    f8f32ceb8188585cd9db161a8a96353cd72df8971195f3f9769ef87fbfc286fd

  • SHA512

    cce97de05d646d1a20e48dc34ef240cee1975d62683ea1cd19f742d43fcd299b0e5c0c94b95b46e4312665076f7e1ca7003badc644840192889f5d12e5bc9d5f

  • SSDEEP

    6144:7FCZksD0tc4/sjUAx8sHZJcT9CU63Qyw:4kOj4/sjUAx8oZECtpw

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Windows directory 3 IoCs
  • Program crash 1 IoCs
  • Runs net.exe
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\80435c956343c13c8eb6252c7229692f.exe
    "C:\Users\Admin\AppData\Local\Temp\80435c956343c13c8eb6252c7229692f.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4812
    • C:\Windows\SysWOW64\net.exe
      net stop SharedAccess
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3268
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop SharedAccess
        3⤵
          PID:1972
      • C:\windows\s.exe
        C:\windows\s.exe
        2⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1712
        • C:\Windows\SysWOW64\net.exe
          net stop SharedAccess
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1236
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop SharedAccess
            4⤵
              PID:3048
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1712 -s 1640
            3⤵
            • Program crash
            PID:4704
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1712 -ip 1712
        1⤵
          PID:4184

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\s.exe

          Filesize

          224KB

          MD5

          80435c956343c13c8eb6252c7229692f

          SHA1

          471c6efa52c9dec5a0a3e12936b81d225eaf4bd3

          SHA256

          f8f32ceb8188585cd9db161a8a96353cd72df8971195f3f9769ef87fbfc286fd

          SHA512

          cce97de05d646d1a20e48dc34ef240cee1975d62683ea1cd19f742d43fcd299b0e5c0c94b95b46e4312665076f7e1ca7003badc644840192889f5d12e5bc9d5f

        • C:\Windows\systemos1.exe

          Filesize

          2KB

          MD5

          8bfcf44eb468bd8d016c0a378f5ce3b6

          SHA1

          11afc64a4248bf6856fc4f8481d6b62f50f86143

          SHA256

          04aa3b55acb1d205869dda64310cd684169666980c1fc4f41d7364ee58a7f973

          SHA512

          3e445d11ba096b13fca27dd4a7cd620eff4a31f90163f91002128baf96ad95bf58f4dd7143ca59789701aacc55fd9d68400e6bff350e1781696cdf0a95754ea8

        • memory/1712-6-0x0000000002070000-0x0000000002071000-memory.dmp

          Filesize

          4KB

        • memory/1712-14-0x0000000000400000-0x000000000047E000-memory.dmp

          Filesize

          504KB

        • memory/1712-15-0x0000000000400000-0x000000000047E000-memory.dmp

          Filesize

          504KB

        • memory/1712-16-0x0000000002070000-0x0000000002071000-memory.dmp

          Filesize

          4KB

        • memory/1712-17-0x0000000000400000-0x000000000047E000-memory.dmp

          Filesize

          504KB

        • memory/1712-18-0x0000000000400000-0x000000000047E000-memory.dmp

          Filesize

          504KB

        • memory/1712-19-0x0000000000400000-0x000000000047E000-memory.dmp

          Filesize

          504KB

        • memory/4812-0-0x00000000022A0000-0x00000000022A1000-memory.dmp

          Filesize

          4KB

        • memory/4812-1-0x0000000000400000-0x000000000047E000-memory.dmp

          Filesize

          504KB

        • memory/4812-7-0x0000000000400000-0x000000000047E000-memory.dmp

          Filesize

          504KB