Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 05:08
Static task
static1
Behavioral task
behavioral1
Sample
c6efed7bd3f653226121cc6221e67b29f5ab268e0d8465a29da2c12b818631e0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
c6efed7bd3f653226121cc6221e67b29f5ab268e0d8465a29da2c12b818631e0.exe
Resource
win10v2004-20231222-en
General
-
Target
c6efed7bd3f653226121cc6221e67b29f5ab268e0d8465a29da2c12b818631e0.exe
-
Size
862KB
-
MD5
451242c66de4ba164892f8c02444c2a6
-
SHA1
b9b54d42a516208a2b003615b127d420433f3f57
-
SHA256
c6efed7bd3f653226121cc6221e67b29f5ab268e0d8465a29da2c12b818631e0
-
SHA512
0fdfea2fc2b11622cab8fd9459c5a317113cb9ce8bd18a1c8be9eb02db0fa54f18776b3a113d7a6c5971dc87e54490b48a3f783be125d14811d79d1c51f4e069
-
SSDEEP
12288:A6F8gPUVpBqFnkB5ZGUJUz6m3+hrWjPNq1tp1s8ef/tnlb0PAnSrhgY2fxRiQbox:A6FYBqNkZVW+EW
Malware Config
Signatures
-
Detects executables packed with ConfuserEx Mod 1 IoCs
resource yara_rule behavioral2/memory/3888-0-0x0000000000990000-0x0000000000A6E000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx -
Loads dropped DLL 1 IoCs
pid Process 3888 c6efed7bd3f653226121cc6221e67b29f5ab268e0d8465a29da2c12b818631e0.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 c6efed7bd3f653226121cc6221e67b29f5ab268e0d8465a29da2c12b818631e0.exe Key opened \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 c6efed7bd3f653226121cc6221e67b29f5ab268e0d8465a29da2c12b818631e0.exe Key opened \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 c6efed7bd3f653226121cc6221e67b29f5ab268e0d8465a29da2c12b818631e0.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 ipinfo.io 18 ipinfo.io -
Program crash 1 IoCs
pid pid_target Process procid_target 2808 3888 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3888 c6efed7bd3f653226121cc6221e67b29f5ab268e0d8465a29da2c12b818631e0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3888 c6efed7bd3f653226121cc6221e67b29f5ab268e0d8465a29da2c12b818631e0.exe -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 c6efed7bd3f653226121cc6221e67b29f5ab268e0d8465a29da2c12b818631e0.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 c6efed7bd3f653226121cc6221e67b29f5ab268e0d8465a29da2c12b818631e0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6efed7bd3f653226121cc6221e67b29f5ab268e0d8465a29da2c12b818631e0.exe"C:\Users\Admin\AppData\Local\Temp\c6efed7bd3f653226121cc6221e67b29f5ab268e0d8465a29da2c12b818631e0.exe"1⤵
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 27682⤵
- Program crash
PID:2808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3888 -ip 38881⤵PID:4996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5c00f3970108a8af891b5768c37ef0b63
SHA1cf5e378a5236a9a015fa5617a303f9a5a296e645
SHA256d1edb25dac788ec78d570f905d9c81651b4229228272b3ebc64d20b3ca8c6d43
SHA5127542d99357fab4e243caad174e1f1eb172c334ede37af2e32f49bb30fece84599eb28bea005eccd920d5903a85dbe4bf56a55f8d87f29eaab6187a72d15be93b
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
791KB
MD50fe0a178f711b623a8897e4b0bb040d1
SHA101ea412aeab3d331f825d93d7ee1f5fa6d3c46e6
SHA2560c7cd52abdb6eb3e556d81caac398a127495e4a251ef600e6505a81385a1982d
SHA5126c53c489c4464b9dc9a5dd31c48bb4afa65f7d6df9cc71e705cea2074ebd5e249cad4894eac6f6b308b3574633bc6e1706dfc5fda5f46c27f1e37d21e65fbc54