Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240319-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2024, 09:13

General

  • Target

    decdb0792dc19680eb2ae0b6c5a57f36.exe

  • Size

    571KB

  • MD5

    decdb0792dc19680eb2ae0b6c5a57f36

  • SHA1

    6a39fe6622fbc6647e8199038a42348b782db0ea

  • SHA256

    b70101421d4e552f3641bea7257496edae2e5b27eed082fbdd37ab0747f2ecc6

  • SHA512

    ac798e93eb002b4c9d7630aa3c63a7e30525e1e089e4e81d820d0b255375c02a9c9ffa092e8a541dc02f1d6144058b477348bf9403988a2a1c9a363f4ad09dc2

  • SSDEEP

    12288:N880N2Ymmt0LDXoNIzfday0rUjk5ymOcB+pwPprnv:N8RwoSz1ay0rUKLOsDFnv

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\decdb0792dc19680eb2ae0b6c5a57f36.exe
    "C:\Users\Admin\AppData\Local\Temp\decdb0792dc19680eb2ae0b6c5a57f36.exe"
    1⤵
    • Adds Run key to start application
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • NTFS ADS
    • Suspicious use of SetWindowsHookEx
    PID:5072
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4180 --field-trial-handle=2256,i,16750283575152780128,2524258836761969159,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:5016

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\905c0769f9a06c95a24ddf945\patcher.exe

      Filesize

      1.1MB

      MD5

      0381483dc66d35d5e3a3624833a0ea33

      SHA1

      d822c94bdb4653c2a0ade2ace56d9452a5949af6

      SHA256

      0b9a7fc5d09451eb365463262be8cd702a3839d3c2917f02c2a4ecfc0b4e1dc9

      SHA512

      58912d8f4e06acb30acd421319495507d539f90d0fb56692a97a865a6c5343417d37adbfa40509ab33eb4ac56c82ff5e7f818ef7db62d35a208fc13cbb68245e

    • memory/5072-0-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/5072-1-0x0000000002160000-0x0000000002163000-memory.dmp

      Filesize

      12KB

    • memory/5072-533-0x0000000002160000-0x0000000002163000-memory.dmp

      Filesize

      12KB