Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    130s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/02/2024, 12:41

General

  • Target

    setup.exe

  • Size

    461KB

  • MD5

    010d574c857cb43f8251274ee91f0c25

  • SHA1

    9c94e9a3517c4b3ac3c0353e23c9c851cacbb31b

  • SHA256

    a60d402fd8dee92d8b703ded713b219bbd35fef67b92e2e05d3d96244a62baac

  • SHA512

    07eb5a962507d6f24a5fed3c38713a1ed86d5c3561b099a30849c0d8e80d0483aaa8a02b35f4e7a4ebb7d1de0bda651283ea13bcbf8738c0c1b59d4c046e0e45

  • SSDEEP

    12288:aCyequ7t5JocXPnUS0eQKK6JDBHNlbOGbOt:au55Jr/MKDBNxr4

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:4792
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:740
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3716

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3716-14-0x00000201ACE40000-0x00000201ACE50000-memory.dmp

      Filesize

      64KB

    • memory/3716-50-0x00000201B5360000-0x00000201B5361000-memory.dmp

      Filesize

      4KB

    • memory/3716-49-0x00000201B5250000-0x00000201B5251000-memory.dmp

      Filesize

      4KB

    • memory/3716-48-0x00000201B5250000-0x00000201B5251000-memory.dmp

      Filesize

      4KB

    • memory/3716-46-0x00000201B5220000-0x00000201B5221000-memory.dmp

      Filesize

      4KB

    • memory/3716-30-0x00000201ACF40000-0x00000201ACF50000-memory.dmp

      Filesize

      64KB

    • memory/4792-6-0x00000000052C0000-0x0000000005352000-memory.dmp

      Filesize

      584KB

    • memory/4792-10-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

      Filesize

      64KB

    • memory/4792-13-0x0000000074810000-0x0000000074FC0000-memory.dmp

      Filesize

      7.7MB

    • memory/4792-9-0x0000000005E10000-0x0000000005E22000-memory.dmp

      Filesize

      72KB

    • memory/4792-8-0x0000000005440000-0x00000000059E4000-memory.dmp

      Filesize

      5.6MB

    • memory/4792-7-0x0000000005360000-0x00000000053C6000-memory.dmp

      Filesize

      408KB

    • memory/4792-0-0x00000000005B0000-0x0000000000606000-memory.dmp

      Filesize

      344KB

    • memory/4792-5-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

      Filesize

      64KB

    • memory/4792-4-0x0000000074810000-0x0000000074FC0000-memory.dmp

      Filesize

      7.7MB