Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2024, 01:35

General

  • Target

    b62f2070c5f4ce8402e368ce8551d7b5.exe

  • Size

    3.2MB

  • MD5

    b62f2070c5f4ce8402e368ce8551d7b5

  • SHA1

    61026b0357f5a990c1f87fdcbe31b80b93f3eb9a

  • SHA256

    b99642a723d341b812ba92868477946218e834798e3bd9dd603ba9579930755f

  • SHA512

    1c2f59236fe3bc3aab590e0fca332af36eacbd9e250663940eb49796b5a8d463beb94dd4f09ca91cff9cc75c24328df81d1870a9f99a7716bdae561b1d3b1ae9

  • SSDEEP

    49152:FOE92SHF+3j5D78OBUK+V8tgJd8OhbuRKwpBDBQCKMN7pXRKNnp3:7xCs1K+CgaOHk9Nng

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 44 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b62f2070c5f4ce8402e368ce8551d7b5.exe
    "C:\Users\Admin\AppData\Local\Temp\b62f2070c5f4ce8402e368ce8551d7b5.exe"
    1⤵
    • Adds Run key to start application
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • NTFS ADS
    • Suspicious use of SetWindowsHookEx
    PID:3260

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\905c0769f9a06c95a24ddf945\patcher.exe$

    Filesize

    3.2MB

    MD5

    b62f2070c5f4ce8402e368ce8551d7b5

    SHA1

    61026b0357f5a990c1f87fdcbe31b80b93f3eb9a

    SHA256

    b99642a723d341b812ba92868477946218e834798e3bd9dd603ba9579930755f

    SHA512

    1c2f59236fe3bc3aab590e0fca332af36eacbd9e250663940eb49796b5a8d463beb94dd4f09ca91cff9cc75c24328df81d1870a9f99a7716bdae561b1d3b1ae9

  • memory/3260-0-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/3260-1-0x0000000002160000-0x0000000002163000-memory.dmp

    Filesize

    12KB

  • memory/3260-371-0x0000000002160000-0x0000000002163000-memory.dmp

    Filesize

    12KB