Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03/02/2024, 16:23

General

  • Target

    8cca707142e789ecf400f8e255d83cf6.exe

  • Size

    23KB

  • MD5

    8cca707142e789ecf400f8e255d83cf6

  • SHA1

    b9b03842dd34a625181f9f0442f04b152d9f8346

  • SHA256

    bdc05c7b33fffcb6ff3f41f82eeba4f8bb482378ea2e1a88549438d01ac589c9

  • SHA512

    636e94a1e385dc35f369b2211de0c8cafcd54819082becc4f765edbc686bb71899376bbdb04bdbd55928f19ec27f3835b0aa97e1885eab0eac7fc3a052d829aa

  • SSDEEP

    384:1osp+++C6P3jDuz6QgehyjIRNEpfKq1xq3Ufvnt+3Xt:1osp+/7SWgQfKq18I8

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Kills process with taskkill 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8cca707142e789ecf400f8e255d83cf6.exe
    "C:\Users\Admin\AppData\Local\Temp\8cca707142e789ecf400f8e255d83cf6.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\8CCA70~1.EXE > nul
      2⤵
      • Deletes itself
      PID:1108
  • C:\Windows\SysWOW64\8cca707142e789ecf400f8e255d83cf6.exe
    C:\Windows\SysWOW64\8cca707142e789ecf400f8e255d83cf6.exe
    1⤵
    • Executes dropped EXE
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1104
    • C:\Windows\SysWOW64\Taskkill.exe
      Taskkill /fi "imagename eq rfwsrv.exe" /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2124
    • C:\Windows\SysWOW64\Taskkill.exe
      Taskkill /fi "imagename eq RAVMON.EXE" /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\8cca707142e789ecf400f8e255d83cf6.exe

    Filesize

    23KB

    MD5

    8cca707142e789ecf400f8e255d83cf6

    SHA1

    b9b03842dd34a625181f9f0442f04b152d9f8346

    SHA256

    bdc05c7b33fffcb6ff3f41f82eeba4f8bb482378ea2e1a88549438d01ac589c9

    SHA512

    636e94a1e385dc35f369b2211de0c8cafcd54819082becc4f765edbc686bb71899376bbdb04bdbd55928f19ec27f3835b0aa97e1885eab0eac7fc3a052d829aa