Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/04/2024, 21:15

General

  • Target

    22d73ee57b47f03321db5a9169a979fbc2047c759af1644eac738c845ff5ca13.dll

  • Size

    2.6MB

  • MD5

    3883efff0a1400cd9a4b2ea4018a88df

  • SHA1

    268e2c1444f2eb7a026ebc7ad0e7d1ac6c3fe63b

  • SHA256

    22d73ee57b47f03321db5a9169a979fbc2047c759af1644eac738c845ff5ca13

  • SHA512

    07fe2c3e4357002a98194acc1d357a8050b6903013c0e5b5cf702bb58cf95c4109925f8833e89cccb1489704159a3014beff6fb89b029d81e89ad54b3e8d1a98

  • SSDEEP

    49152:IPZHVeyVETYDCJNAFCT/qJka+aOVE/Y0rHCEpXhEQTZ1lsc07PYbPjFk3vo7UXG+:opoTYDGNWC/a+PV/GH12APyYIG3

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\22d73ee57b47f03321db5a9169a979fbc2047c759af1644eac738c845ff5ca13.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4452
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\22d73ee57b47f03321db5a9169a979fbc2047c759af1644eac738c845ff5ca13.dll,#1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3652
      • C:\Users\Admin\AppData\Local\Temp\FF8E.tmp
        C:\Users\Admin\AppData\Local\Temp\FF8E.tmp
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        PID:4656
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1312 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3972

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Google\CrashReports\e7c0b29d-f771-4447-b32d-fd1324355950.dmp

      Filesize

      32KB

      MD5

      38dfc14f8f739fa60fbbe70b7d7494e0

      SHA1

      b1865b4b8c5af053f517990ae2c6a622bb15dd64

      SHA256

      3df1a5bf8ec0df51dbfc501ba57379a42864da805f1650a84477137a2778c6a9

      SHA512

      07711c321dd6e50550813a74afce12130fbdf0a84db2178f69b145a58714b26680313ce227f7b57100ccdc8e30eec2d5a8151ebf83bf5cfc11c6bfc77da1dfb1

    • C:\Users\Admin\AppData\Local\Temp\FF8E.tmp

      Filesize

      145KB

      MD5

      c610e7ccd6859872c585b2a85d7dc992

      SHA1

      362b3d4b72e3add687c209c79b500b7c6a246d46

      SHA256

      14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

      SHA512

      8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

    • memory/3652-0-0x00000000011C0000-0x000000000128C000-memory.dmp

      Filesize

      816KB

    • memory/3652-1-0x00000000011C0000-0x000000000128C000-memory.dmp

      Filesize

      816KB