Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    172s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2024, 19:44

General

  • Target

    7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe

  • Size

    1.8MB

  • MD5

    4901a08eee2cc636f6fd904b39beb89b

  • SHA1

    ddca16ff6a8bef2e331139f0b1899a969cab34fd

  • SHA256

    7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af

  • SHA512

    b73aa63af1d20d3ab8f510fbd9c26e19f8e6458a527fd260935c8d8e056d5823d4b8f838426fdca4734d9da79113b2858b2bc4c6e51b286160c2ec602d32ebee

  • SSDEEP

    49152:sKJ0WR7AFPyyiSruXKpk3WFDL9zxnSO8HNUPCAaq8Wdo0:sKlBAFPydSS6W6X9lnF8t4C7

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe
    "C:\Users\Admin\AppData\Local\Temp\7b33c10203120082f771de53577b5ff1d2439419dcf5d721273e5765dba9a9af.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2320
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3420
  • C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    1⤵
    • Executes dropped EXE
    PID:388
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv
    1⤵
      PID:112
    • C:\Windows\system32\fxssvc.exe
      C:\Windows\system32\fxssvc.exe
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:5004
    • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
      "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
      1⤵
      • Executes dropped EXE
      PID:1664
    • C:\Program Files (x86)\Microsoft\Edge\Application\123.0.2420.81\elevation_service.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\123.0.2420.81\elevation_service.exe"
      1⤵
      • Executes dropped EXE
      PID:3220
    • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
      "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
      1⤵
      • Executes dropped EXE
      PID:3340
    • \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
      "c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
      1⤵
      • Executes dropped EXE
      PID:3332

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft\Edge\Application\123.0.2420.81\elevation_service.exe

      Filesize

      2.3MB

      MD5

      9f3b23e52977de28d87e0dcfa48e4e00

      SHA1

      1b1796b7473e81bad1ccded2fcc7767b21cf88d0

      SHA256

      590759dd7904e0cff8c00d2f9e24d198f5b4597b823d74a807c6074f1519c1be

      SHA512

      e102a383d304425dc0d2dfcd82264d089917ed3fa74c1242fe7ea8c1004a83682eb920558fdf88a69eb7a37a5d113b8512509582a27e3a00992e3994236bf8b2

    • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

      Filesize

      797KB

      MD5

      93df57d74085bc119f6f7d967a6097a2

      SHA1

      77185fdf409ff91e8622e1becb3475d755b26bb8

      SHA256

      747f8009e5b5e99ea8400ea372d03ca76686a9b0f6851cb04ba8b0087cf8a463

      SHA512

      39a1bc1323ecc8deee1445ca2626d45407e6af7cc1cc8e1df13fed8da443bc871f57430a90ced12263d26089496bfc1e5a77a766de065a85a4ce95d33d8e084b

    • C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE

      Filesize

      805KB

      MD5

      f11a44742488f33fd74932baa55e5e52

      SHA1

      99ddda4cf7020fda5528eb37cc278d3eaab9adee

      SHA256

      d7744fea74116e3f4291baac73320785bb16bb3cb18d61afdbc7dfc6e7bf32cd

      SHA512

      41fea353076518ac5cb7de981691558bcfda7b145bfbf92148e1f4132f5ec01ebf2c2d6a45678d4572f833e43a024b1ef9231852454b50fa2acb379f1bcab9c9

    • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe

      Filesize

      2.2MB

      MD5

      2fedb62f68d329af008864c10b9d5298

      SHA1

      d545294ee0aa8945521fcc4ebcc8b1bba9463fba

      SHA256

      a14ae365645a15d8c6198bbcbb840bf1579f49eece8b781765ac6d22ff2337f4

      SHA512

      11a7334bfac4e14e27c0305b6495a58c3cc62bfe025ba19ee1ec184eebd3ef31c954e66addb3aa6e3474b2dc9eae908ca22ed7b2ebcd3a54d23b07c898a153e0

    • C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe

      Filesize

      659KB

      MD5

      3f22a280532f2df29128a3e4aa338528

      SHA1

      c15919fa022f170536ef265630be789639785c52

      SHA256

      45c48e0dc8c2bf1bf8c1c03f5ab1d40f77bbdfd477e6c9053da60929146fe1a2

      SHA512

      155810d0ed59908b8bea5958e078d097455fade1cd8fbf90cfbc129f21f870d5fddd6237ee0c5073c4753d6828fb1407c7cf69c173952c00bc1ee4c4ba6370d8

    • C:\Windows\System32\FXSSVC.exe

      Filesize

      1.2MB

      MD5

      3c4c179c6855816097400726013196df

      SHA1

      0efcb1caca03d68b84bfb72a133765b1d1c084c6

      SHA256

      09e8c764ff7a057e1f001b74467b89a705f00517e1e6e2a2b6b2bca8fc1e7075

      SHA512

      0427328729101203a528c8ed441a3a44b6ea3881cebbf04aa4e49da5c4f4b58c5099f74621942ab5e127dc0e18883a175c54d1c1af76bb7f61dc4a582f76acbf

    • C:\Windows\System32\alg.exe

      Filesize

      661KB

      MD5

      70f3f97825cf34469b9967921e20fa9d

      SHA1

      7f393418059bf7eb07cbc55a45726ef22d00fead

      SHA256

      063dc996c32bac99adf1f8396af18b463518975be78d8f26a05dcc5c00d73097

      SHA512

      d9710f201a138d32fc6aba485173e87d4014cdeb01df099310ebb2a4de0e8338b7f1c1852d31b5f8e8014e3990deb57318e3c52d4e065f6361d1c9ae72c7fc9e

    • C:\Windows\system32\AppVClient.exe

      Filesize

      1.3MB

      MD5

      482a53cba17382eff72538cb810bb1e2

      SHA1

      613ea4385f901c66669aa46f7b5bb88a4b18c1c7

      SHA256

      abcb842741efabb078ec4ea7d3f76a4cf9960064163479eb1ef55a277213ea1f

      SHA512

      713b7e22342edd111200c2de002c90f37e77938a082b3aa1199297fb486015e38f30ef0247e1fe31c9b45594735a1a13960262cafe6652a8c854368ae3d35647

    • memory/388-225-0x0000000140000000-0x00000001400A9000-memory.dmp

      Filesize

      676KB

    • memory/388-101-0x0000000000690000-0x00000000006F0000-memory.dmp

      Filesize

      384KB

    • memory/388-94-0x0000000140000000-0x00000001400A9000-memory.dmp

      Filesize

      676KB

    • memory/388-93-0x0000000000690000-0x00000000006F0000-memory.dmp

      Filesize

      384KB

    • memory/1664-117-0x0000000000900000-0x0000000000960000-memory.dmp

      Filesize

      384KB

    • memory/1664-348-0x0000000140000000-0x000000014024B000-memory.dmp

      Filesize

      2.3MB

    • memory/1664-127-0x0000000000900000-0x0000000000960000-memory.dmp

      Filesize

      384KB

    • memory/1664-118-0x0000000140000000-0x000000014024B000-memory.dmp

      Filesize

      2.3MB

    • memory/2320-7-0x00000000007A0000-0x0000000000807000-memory.dmp

      Filesize

      412KB

    • memory/2320-129-0x0000000000400000-0x00000000005DB000-memory.dmp

      Filesize

      1.9MB

    • memory/2320-1-0x00000000007A0000-0x0000000000807000-memory.dmp

      Filesize

      412KB

    • memory/2320-0-0x0000000000400000-0x00000000005DB000-memory.dmp

      Filesize

      1.9MB

    • memory/2320-205-0x0000000000400000-0x00000000005DB000-memory.dmp

      Filesize

      1.9MB

    • memory/3220-209-0x0000000000890000-0x00000000008F0000-memory.dmp

      Filesize

      384KB

    • memory/3220-350-0x0000000140000000-0x000000014025D000-memory.dmp

      Filesize

      2.4MB

    • memory/3220-222-0x0000000000890000-0x00000000008F0000-memory.dmp

      Filesize

      384KB

    • memory/3220-208-0x0000000140000000-0x000000014025D000-memory.dmp

      Filesize

      2.4MB

    • memory/3332-352-0x0000000140000000-0x00000001400CF000-memory.dmp

      Filesize

      828KB

    • memory/3332-244-0x00000000007B0000-0x0000000000810000-memory.dmp

      Filesize

      384KB

    • memory/3332-237-0x00000000007B0000-0x0000000000810000-memory.dmp

      Filesize

      384KB

    • memory/3332-236-0x0000000140000000-0x00000001400CF000-memory.dmp

      Filesize

      828KB

    • memory/3340-231-0x0000000001A70000-0x0000000001AD0000-memory.dmp

      Filesize

      384KB

    • memory/3340-215-0x0000000001A70000-0x0000000001AD0000-memory.dmp

      Filesize

      384KB

    • memory/3340-213-0x0000000140000000-0x00000001400CF000-memory.dmp

      Filesize

      828KB

    • memory/3340-228-0x0000000001A70000-0x0000000001AD0000-memory.dmp

      Filesize

      384KB

    • memory/3340-235-0x0000000140000000-0x00000001400CF000-memory.dmp

      Filesize

      828KB

    • memory/3420-13-0x00000000006C0000-0x0000000000720000-memory.dmp

      Filesize

      384KB

    • memory/3420-212-0x0000000140000000-0x00000001400AA000-memory.dmp

      Filesize

      680KB

    • memory/3420-29-0x00000000006C0000-0x0000000000720000-memory.dmp

      Filesize

      384KB

    • memory/3420-12-0x0000000140000000-0x00000001400AA000-memory.dmp

      Filesize

      680KB

    • memory/5004-106-0x0000000000A10000-0x0000000000A70000-memory.dmp

      Filesize

      384KB

    • memory/5004-112-0x0000000000A10000-0x0000000000A70000-memory.dmp

      Filesize

      384KB

    • memory/5004-122-0x0000000140000000-0x0000000140135000-memory.dmp

      Filesize

      1.2MB

    • memory/5004-105-0x0000000140000000-0x0000000140135000-memory.dmp

      Filesize

      1.2MB

    • memory/5004-113-0x0000000000A10000-0x0000000000A70000-memory.dmp

      Filesize

      384KB

    • memory/5004-119-0x0000000000A10000-0x0000000000A70000-memory.dmp

      Filesize

      384KB