Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2024, 04:58

General

  • Target

    720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe

  • Size

    1.8MB

  • MD5

    b04bf10382a78635486925f43c521400

  • SHA1

    cc6d7c92abef67967a24816eb4b9d0038d1679a6

  • SHA256

    720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20

  • SHA512

    c6ebe3cdf99d96771d5c4834f044257b19febe6438bccbf695da414ad8727f62fbd284f34919f752a24329d5a9f4ac16bc2a40d3a43d3879970f50070ad64df0

  • SSDEEP

    49152:tx5SUW/cxUitIGLsF0nb+tJVYleAMz77+WAwLYj+3WZUY5kq:tvbjVkjjCAzJLYjLH5h

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 11 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe
    "C:\Users\Admin\AppData\Local\Temp\720f54a145afbc4cd1df0386e6c931c3aa4792dfb005144ed4986977cb955c20.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2432
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:380
  • C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    1⤵
    • Executes dropped EXE
    PID:3612
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv
    1⤵
      PID:4092
    • C:\Windows\system32\fxssvc.exe
      C:\Windows\system32\fxssvc.exe
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:368
    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
      1⤵
      • Executes dropped EXE
      PID:2032
    • C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\elevation_service.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\elevation_service.exe"
      1⤵
      • Executes dropped EXE
      PID:1800
    • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
      "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
      1⤵
      • Executes dropped EXE
      PID:316
    • C:\Windows\System32\msdtc.exe
      C:\Windows\System32\msdtc.exe
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      PID:4948
    • \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
      "c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
      1⤵
      • Executes dropped EXE
      PID:3104
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2232 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:228

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\elevation_service.exe

        Filesize

        699KB

        MD5

        a4c724c771a23cd1e395f88784589f51

        SHA1

        18d658242ca08e0815d18f1edec2efc9dd4a89b2

        SHA256

        23f54da4721846c35423fd34cbc6597553780fc8c54c68af43738e27070bd111

        SHA512

        e179417261273aed29bad81f15384e2c7adf48f4628bac0af03f7afe787e5d9a506e81087b221eb8599f2115bb64a01f5d8420dc62c0ab8055ec3a9a0144080f

      • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

        Filesize

        178KB

        MD5

        f2aa6643b2c75db5d5d2a5b5e3a557a2

        SHA1

        c96d93ede52aeef8f59b86b856361b38942c73f2

        SHA256

        21f9c5446fd24246b2b650edc10fed7057c60583d3dd1218cb4a71048ca79489

        SHA512

        d2235883d6944da90da5a524f12019c47baa03029ab8b4041ed007c29e235be7b3360a8662dde6bb276638ce33191c44e57764f477aeb98542c805c1eb04918b

      • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

        Filesize

        792KB

        MD5

        49c266f443814b59c93517cd606433a4

        SHA1

        3d787127acee0f8d9947c11d044ba9a52eaa5364

        SHA256

        684cdecceb1efd7c6eefbc8d015185578b6e8fcfcb9624cafd54de8de0629ced

        SHA512

        96e38a2fe356f8ed6371a1629b85f29844db3c6e58cdb8f59e73a72b11ec3cca6f96b707f39b82f9234d8fac944df0e824485314e5736a845469f15944a382ed

      • C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE

        Filesize

        314KB

        MD5

        3d35063156bd6284fb56245422609fc0

        SHA1

        e96ffb0c185937df4d41fcefc84b86a290f56a6a

        SHA256

        eec40874c707b1cfadb039e26f1adc85519be8265b44ffd34f1012766cd47314

        SHA512

        73e8bceb40694ec08f14df26a7a3d86838758a52a4a36ad85eef78c0f212e9bf50e0e0336eaaf424f80ff3c766258b3a6c1ea88d561d566774e1347c33899bc5

      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

        Filesize

        2.1MB

        MD5

        f1da5acd55c1794d314f83e6cf666a20

        SHA1

        f64d467cc60be2531e9198adcb94f7948ec213ec

        SHA256

        0d3da63f362f1b07c92e9983388a9bb210496381d0cabdce89852626d740918d

        SHA512

        eea6fcbcb080423fd8ed0807e0e8dd6789893c0267ca0adc7c8d6ae6230ccf360be92518ba982fd69bbb9094537eea81f3909ed5b469a740af53a56d85ad6ec5

      • C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe

        Filesize

        1.3MB

        MD5

        2822dac912a62fd05f271acd95e5a308

        SHA1

        20efe08134a3d12fe2bbea1b99dc7497675bc3f1

        SHA256

        d7548b83942c309538682ddce793024ad8bd308a0a9c21e12cb2c3e07f1d97df

        SHA512

        c5fa7113294792f6ff9cc6b0b8aeca66e3601c04d83147957f0b3c9405498421d061c3eaae1ee43c80951736f9bb9d4f64924ead31550a2e330f71e79cf77f4c

      • C:\Windows\System32\FXSSVC.exe

        Filesize

        599KB

        MD5

        3fee5eb6ee6c593a4f59d1f7e243987c

        SHA1

        4a110d2390c7fa246ebd15a9d4091f77408cdf6e

        SHA256

        327c55ab1b9dc78e10849ee1cfca2897ec5160100831c4176ea0b0f8cbf1ea4c

        SHA512

        31c05a3ede01f0d34f89f2003f564199167834ba33c40d69ca7cd927ccb3f4f67d8ff39d0270f84ce7b0b725fcff3552a661295c67c38b16168bbb182c43562a

      • C:\Windows\System32\alg.exe

        Filesize

        408KB

        MD5

        e7de13c5d24d625c9ed4f13238e2bd1a

        SHA1

        5e245437397b4af57499f2883eb0f7b4bca68f19

        SHA256

        22b9293313fc027177e6befcdbac42d1bd18074cc2d2f63fff948f3d373decf3

        SHA512

        316299f82b1dff377338da8ba54b5ec0d7ce8e1097b4420be273b370840f828c1dd533e030dc17a88fe2bd319829f3c93b5c714c486e7a0e07babc55ded78131

      • C:\Windows\System32\msdtc.exe

        Filesize

        760KB

        MD5

        41f01df16f50a26387f1914ee57f90ad

        SHA1

        3e0712b1943c83ecc59eff3ca02db80b292fc58c

        SHA256

        145e29b8b70220e4c2cc0bc0cb8c122c800dbf21dc8089e1613b9a31476d98c4

        SHA512

        14f1c232e4c2adf0cb128a9223779e03356626a4c7d2e3ec8da742479e289c467683b5a7d6622f771bf03755f94c57f75a41f1c5df961513c940085f1b4025bf

      • C:\Windows\system32\AppVClient.exe

        Filesize

        517KB

        MD5

        05b2e032d81f15bcfa335bf60cf3e18c

        SHA1

        32369f1ad26ceb4384d5bf948feafaef8f69dbab

        SHA256

        f9615cfa214e5a247e2d2f70ca0456aa7f407f7f14af698fc0ef3186e228872e

        SHA512

        35ab8ba2941bc357418852c139bdee8bec9ca9d79d37b4b7e9c50768fdfb6f548ffb3097d1891129eaf8c5b66b707a1b67b5f31e2070f833c90372a42a319e81

      • C:\Windows\system32\fxssvc.exe

        Filesize

        618KB

        MD5

        6dcd369f8650cbdc2f9ea5e7df2d5c98

        SHA1

        40cbd2151075681e2e1aadb6ba48d44b19452d64

        SHA256

        aa43dad916e2cc51a9e2ede415f99647a18d6104a2cb4c4fe534fa5c17dc9642

        SHA512

        3053100e798a20dfc8137da1ba3ad908a69194bd48eec3be8c77a7b7d591d9a330c62f1ffa6eefe1b5be5b567a1d2a35f46a266e221c7704e6a51b884ee342b3

      • memory/316-155-0x0000000000C00000-0x0000000000C60000-memory.dmp

        Filesize

        384KB

      • memory/316-161-0x0000000140000000-0x0000000140176000-memory.dmp

        Filesize

        1.5MB

      • memory/316-158-0x0000000000C00000-0x0000000000C60000-memory.dmp

        Filesize

        384KB

      • memory/316-148-0x0000000140000000-0x0000000140176000-memory.dmp

        Filesize

        1.5MB

      • memory/316-147-0x0000000000C00000-0x0000000000C60000-memory.dmp

        Filesize

        384KB

      • memory/368-106-0x0000000140000000-0x0000000140135000-memory.dmp

        Filesize

        1.2MB

      • memory/368-116-0x0000000000E60000-0x0000000000EC0000-memory.dmp

        Filesize

        384KB

      • memory/368-120-0x0000000140000000-0x0000000140135000-memory.dmp

        Filesize

        1.2MB

      • memory/368-114-0x0000000000E60000-0x0000000000EC0000-memory.dmp

        Filesize

        384KB

      • memory/368-107-0x0000000000E60000-0x0000000000EC0000-memory.dmp

        Filesize

        384KB

      • memory/380-88-0x0000000000770000-0x00000000007D0000-memory.dmp

        Filesize

        384KB

      • memory/380-87-0x0000000000770000-0x00000000007D0000-memory.dmp

        Filesize

        384KB

      • memory/380-15-0x0000000140000000-0x0000000140156000-memory.dmp

        Filesize

        1.3MB

      • memory/380-16-0x0000000000770000-0x00000000007D0000-memory.dmp

        Filesize

        384KB

      • memory/380-146-0x0000000140000000-0x0000000140156000-memory.dmp

        Filesize

        1.3MB

      • memory/1800-304-0x0000000140000000-0x0000000140245000-memory.dmp

        Filesize

        2.3MB

      • memory/1800-134-0x0000000000990000-0x00000000009F0000-memory.dmp

        Filesize

        384KB

      • memory/1800-136-0x0000000140000000-0x0000000140245000-memory.dmp

        Filesize

        2.3MB

      • memory/1800-142-0x0000000000990000-0x00000000009F0000-memory.dmp

        Filesize

        384KB

      • memory/2032-129-0x0000000000C40000-0x0000000000CA0000-memory.dmp

        Filesize

        384KB

      • memory/2032-121-0x0000000000C40000-0x0000000000CA0000-memory.dmp

        Filesize

        384KB

      • memory/2032-275-0x0000000140000000-0x0000000140237000-memory.dmp

        Filesize

        2.2MB

      • memory/2032-123-0x0000000140000000-0x0000000140237000-memory.dmp

        Filesize

        2.2MB

      • memory/2432-6-0x0000000002470000-0x00000000024D6000-memory.dmp

        Filesize

        408KB

      • memory/2432-0-0x0000000000400000-0x00000000005D4000-memory.dmp

        Filesize

        1.8MB

      • memory/2432-7-0x0000000002470000-0x00000000024D6000-memory.dmp

        Filesize

        408KB

      • memory/2432-133-0x0000000000400000-0x00000000005D4000-memory.dmp

        Filesize

        1.8MB

      • memory/2432-241-0x0000000000400000-0x00000000005D4000-memory.dmp

        Filesize

        1.8MB

      • memory/2432-1-0x0000000002470000-0x00000000024D6000-memory.dmp

        Filesize

        408KB

      • memory/3104-244-0x0000000140000000-0x000000014017B000-memory.dmp

        Filesize

        1.5MB

      • memory/3104-256-0x00000000006F0000-0x0000000000750000-memory.dmp

        Filesize

        384KB

      • memory/3104-366-0x0000000140000000-0x000000014017B000-memory.dmp

        Filesize

        1.5MB

      • memory/3104-243-0x00000000006F0000-0x0000000000750000-memory.dmp

        Filesize

        384KB

      • memory/3612-95-0x0000000140000000-0x0000000140155000-memory.dmp

        Filesize

        1.3MB

      • memory/3612-233-0x0000000140000000-0x0000000140155000-memory.dmp

        Filesize

        1.3MB

      • memory/3612-102-0x00000000006B0000-0x0000000000710000-memory.dmp

        Filesize

        384KB

      • memory/3612-94-0x00000000006B0000-0x0000000000710000-memory.dmp

        Filesize

        384KB

      • memory/4948-234-0x0000000140000000-0x0000000140165000-memory.dmp

        Filesize

        1.4MB

      • memory/4948-261-0x0000000000D60000-0x0000000000DC0000-memory.dmp

        Filesize

        384KB

      • memory/4948-355-0x0000000140000000-0x0000000140165000-memory.dmp

        Filesize

        1.4MB