Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

10/04/2024, 10:26

240410-mgws3sfd41 8

Analysis

  • max time kernel
    99s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/04/2024, 10:26

General

  • Target

    3b2e708eaa4744c76a633391cf2c983f4a098b46436525619e5ea44e105355fe.exe

  • Size

    419KB

  • MD5

    7d20fa01a703afa8907e50417d27b0a4

  • SHA1

    320116162d78afb8e00fd972591479a899d3dfee

  • SHA256

    3b2e708eaa4744c76a633391cf2c983f4a098b46436525619e5ea44e105355fe

  • SHA512

    0dcebe2598e6ccb51f0609831c93071421049eb924f83871e95c5a280af0d2e76630dfc47c5a2780eb18d55ee9690d6c83aabd8f1043cc2cdc21d9fe5425b892

  • SSDEEP

    3072:Ga1HoUY9aEnRUx4DZLQHkRduVhiHm5Pz6GaYtxcpKnyWOtq:GwYznRC4DpduVnxzsYtxWWOtq

Malware Config

Signatures

  • Drops file in Drivers directory 64 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 64 IoCs
  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 64 IoCs
  • Checks SCSI registry key(s) 3 TTPs 52 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Control Panel 60 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b2e708eaa4744c76a633391cf2c983f4a098b46436525619e5ea44e105355fe.exe
    "C:\Users\Admin\AppData\Local\Temp\3b2e708eaa4744c76a633391cf2c983f4a098b46436525619e5ea44e105355fe.exe"
    1⤵
    • Drops file in Drivers directory
    • Modifies Installed Components in the registry
    • Drops desktop.ini file(s)
    • Maps connected drives based on registry
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Modifies Control Panel
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

    Filesize

    264KB

    MD5

    55f41c694994ad16af502a973b394321

    SHA1

    afbc5327d3bf11dc0c5b10ed2830c86061846fa4

    SHA256

    1dbe3ea172a960421ded4894bb5873096352e4b1c590a896121b72efea9a7be1

    SHA512

    ec9321d5c64cf7a8940c4485f098cb5172d354b228fdc8767c19ea87b41974419d1ebd4d0e78779600b3ab1cd5d526542796033385dbaf421b5e8c68861185ea

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\20RAD7Y0\Windows[2].json

    Filesize

    620B

    MD5

    01b53ab60d1307f1db2f793377d3af08

    SHA1

    aead0b1b398828d1bb81e91a52f28e504d717e1c

    SHA256

    b5afda9531d50eca02d7e10dd6a5e5a9346ef452f1aea17049b4acf84be62641

    SHA512

    ee7663533aae47cae26d9605f045b9165ed9ba387789a09db6e4bd0d76ca08aaee685d5299a8ec40ee086123f4e3ab766a793d9199c639d18d56d87c37cc8f6d

  • memory/1704-0-0x0000000000CE0000-0x0000000000D4E000-memory.dmp

    Filesize

    440KB

  • memory/1704-1-0x00007FF809F70000-0x00007FF80AA31000-memory.dmp

    Filesize

    10.8MB

  • memory/1704-2-0x000000001B9E0000-0x000000001B9F0000-memory.dmp

    Filesize

    64KB

  • memory/1704-3-0x00007FF809F70000-0x00007FF80AA31000-memory.dmp

    Filesize

    10.8MB

  • memory/1704-4-0x000000001B9E0000-0x000000001B9F0000-memory.dmp

    Filesize

    64KB

  • memory/1704-91-0x000000001C1F0000-0x000000001C266000-memory.dmp

    Filesize

    472KB