Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/04/2024, 00:06

General

  • Target

    8fe24cddfb206aff5a56a2d7348634936f232f6fbfcacc912f5a85072cf23bae.exe

  • Size

    1.0MB

  • MD5

    4ba5cf728ff86d0f0cbcecee7d8908f8

  • SHA1

    95a8a614e91250827994e14996122223fb90a150

  • SHA256

    8fe24cddfb206aff5a56a2d7348634936f232f6fbfcacc912f5a85072cf23bae

  • SHA512

    b88b58978c6732481d1d7a35091c0706530a00e98cb5ec13d58288e569919c5077b1bc182d1a786c44f138f2d19f1b7901c8a3b3391c3c2fe92d9f2b4af9368e

  • SSDEEP

    24576:sWK75hcNvQk3uPSJijaX69PKQ+270OQaq/tQemel:BMh43uaFXlQ+A0qq1F

Malware Config

Signatures

  • Detects executables containing possible sandbox analysis VM usernames 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8fe24cddfb206aff5a56a2d7348634936f232f6fbfcacc912f5a85072cf23bae.exe
    "C:\Users\Admin\AppData\Local\Temp\8fe24cddfb206aff5a56a2d7348634936f232f6fbfcacc912f5a85072cf23bae.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Users\Admin\AppData\Local\Temp\8fe24cddfb206aff5a56a2d7348634936f232f6fbfcacc912f5a85072cf23bae.exe
      "C:\Users\Admin\AppData\Local\Temp\8fe24cddfb206aff5a56a2d7348634936f232f6fbfcacc912f5a85072cf23bae.exe"
      2⤵
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4476
      • C:\Users\Admin\AppData\Local\Temp\8fe24cddfb206aff5a56a2d7348634936f232f6fbfcacc912f5a85072cf23bae.exe
        "C:\Users\Admin\AppData\Local\Temp\8fe24cddfb206aff5a56a2d7348634936f232f6fbfcacc912f5a85072cf23bae.exe"
        3⤵
        • Checks computer location settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1812
        • C:\Users\Admin\AppData\Local\Temp\8fe24cddfb206aff5a56a2d7348634936f232f6fbfcacc912f5a85072cf23bae.exe
          "C:\Users\Admin\AppData\Local\Temp\8fe24cddfb206aff5a56a2d7348634936f232f6fbfcacc912f5a85072cf23bae.exe"
          4⤵
            PID:816
        • C:\Users\Admin\AppData\Local\Temp\8fe24cddfb206aff5a56a2d7348634936f232f6fbfcacc912f5a85072cf23bae.exe
          "C:\Users\Admin\AppData\Local\Temp\8fe24cddfb206aff5a56a2d7348634936f232f6fbfcacc912f5a85072cf23bae.exe"
          3⤵
            PID:2680
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2412 -s 940
          2⤵
          • Program crash
          PID:4432
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2412 -ip 2412
        1⤵
          PID:2928

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\brasilian kicking hot (!) beautyfull .rar.exe

          Filesize

          1.5MB

          MD5

          46b891a44d8941906e2b4fb65d93ccb9

          SHA1

          4ff811a3d9faf4933cdb061f7b6fa0cd492f8e78

          SHA256

          e84481cc39422bd4528bb159561ebb13ef7db27f098a35885d9bb38df5e574ef

          SHA512

          4dec7f5bca6a0405d1bc30e6d78f5cb47019dd5257654810b53d9c3d059fcad0648eabfafc30025902d15c5ee9978db64cb9763ca43bb56a7c33ea6ecd1ed5aa