Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/02/2024, 16:23

General

  • Target

    8cca707142e789ecf400f8e255d83cf6.exe

  • Size

    23KB

  • MD5

    8cca707142e789ecf400f8e255d83cf6

  • SHA1

    b9b03842dd34a625181f9f0442f04b152d9f8346

  • SHA256

    bdc05c7b33fffcb6ff3f41f82eeba4f8bb482378ea2e1a88549438d01ac589c9

  • SHA512

    636e94a1e385dc35f369b2211de0c8cafcd54819082becc4f765edbc686bb71899376bbdb04bdbd55928f19ec27f3835b0aa97e1885eab0eac7fc3a052d829aa

  • SSDEEP

    384:1osp+++C6P3jDuz6QgehyjIRNEpfKq1xq3Ufvnt+3Xt:1osp+/7SWgQfKq18I8

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Kills process with taskkill 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8cca707142e789ecf400f8e255d83cf6.exe
    "C:\Users\Admin\AppData\Local\Temp\8cca707142e789ecf400f8e255d83cf6.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\8CCA70~1.EXE > nul
      2⤵
        PID:1952
    • C:\Windows\SysWOW64\8cca707142e789ecf400f8e255d83cf6.exe
      C:\Windows\SysWOW64\8cca707142e789ecf400f8e255d83cf6.exe
      1⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4948
      • C:\Windows\SysWOW64\Taskkill.exe
        Taskkill /fi "imagename eq rfwsrv.exe" /f
        2⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4928
      • C:\Windows\SysWOW64\Taskkill.exe
        Taskkill /fi "imagename eq RAVMON.EXE" /f
        2⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:5004

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\8cca707142e789ecf400f8e255d83cf6.exe

      Filesize

      23KB

      MD5

      8cca707142e789ecf400f8e255d83cf6

      SHA1

      b9b03842dd34a625181f9f0442f04b152d9f8346

      SHA256

      bdc05c7b33fffcb6ff3f41f82eeba4f8bb482378ea2e1a88549438d01ac589c9

      SHA512

      636e94a1e385dc35f369b2211de0c8cafcd54819082becc4f765edbc686bb71899376bbdb04bdbd55928f19ec27f3835b0aa97e1885eab0eac7fc3a052d829aa

    • C:\Windows\WinSxS\x86_microsoft-windows-d..directplay4-payload_31bf3856ad364e35_1.0.19041.1_none_598949f46770a8b9\dplaysvr.exe

      Filesize

      10KB

      MD5

      4e3c92287105f46ce8b881fae83c51a7

      SHA1

      19cbfc2c64d1acbd3c5596c5bd4b680bd8b8352f

      SHA256

      0bd707d309d468af57c10dab0e1a1f87aa59108763978ada3d3ec87b2fb04e95

      SHA512

      252141c709c3c714f2ebb9e9cd7fa274badc203f76d2714534abbf1cea6eeec4df65bc587d1abbd7a6035bc7fddc53fee73681dfa6e65b9ba287ecda32ef4cb2