Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    126s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    30/04/2024, 01:41

General

  • Target

    441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe

  • Size

    749KB

  • MD5

    a6479dae68115fad0a37c5fb33becf99

  • SHA1

    398663b27c9297a884c800aa64916c976638a036

  • SHA256

    441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb

  • SHA512

    aa3dc1b98aa53708a2b9834fb3dc0585ae5deffa168fe65d2aff3d80f4b0849c41d3cbd37e306ac6bfbfe5689e8c625828c93453fd21d5f7ecc0b16ad85f7452

  • SSDEEP

    12288:Cv2E2CrJF9srANfrX8QoN2e9YxzKapgg3e8SIa+9j8CfL6qd8kAXDbvDYD:jE2CrJdNfjrfJ+aX3e8DaOj8wL6e

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe
    "C:\Users\Admin\AppData\Local\Temp\441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1592
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6YuPbH1TRd.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2984
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:2520
        • C:\Windows\system32\w32tm.exe
          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
          3⤵
            PID:2564
          • C:\Program Files (x86)\MSBuild\dwm.exe
            "C:\Program Files (x86)\MSBuild\dwm.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            PID:2600

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Internet Explorer\es-ES\explorer.exe

        Filesize

        749KB

        MD5

        a6479dae68115fad0a37c5fb33becf99

        SHA1

        398663b27c9297a884c800aa64916c976638a036

        SHA256

        441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb

        SHA512

        aa3dc1b98aa53708a2b9834fb3dc0585ae5deffa168fe65d2aff3d80f4b0849c41d3cbd37e306ac6bfbfe5689e8c625828c93453fd21d5f7ecc0b16ad85f7452

      • C:\Users\Admin\AppData\Local\Temp\6YuPbH1TRd.bat

        Filesize

        214B

        MD5

        2e857cf567dd2bbf7575802b6e9c2601

        SHA1

        df40254ce082cde1222f56096b9776ccaabf981d

        SHA256

        d017b1a24cff046ea63d1d1bf13beecdd92c3e33f2f0e384e7b5e4009e35cab1

        SHA512

        139dc4213104d12fa29d730a89cb68bcafaa718f23b74d61a0803cb9049241854070c78311529e7caf2670cc97ba2aafc7e8f5bdcb924bb9dec34feca65f7ba2

      • memory/1592-4-0x000000001B080000-0x000000001B100000-memory.dmp

        Filesize

        512KB

      • memory/1592-12-0x00000000006C0000-0x00000000006D8000-memory.dmp

        Filesize

        96KB

      • memory/1592-0-0x00000000000D0000-0x0000000000192000-memory.dmp

        Filesize

        776KB

      • memory/1592-6-0x00000000002B0000-0x00000000002BE000-memory.dmp

        Filesize

        56KB

      • memory/1592-7-0x0000000076BC0000-0x0000000076BC1000-memory.dmp

        Filesize

        4KB

      • memory/1592-9-0x0000000000680000-0x000000000069C000-memory.dmp

        Filesize

        112KB

      • memory/1592-10-0x0000000076BB0000-0x0000000076BB1000-memory.dmp

        Filesize

        4KB

      • memory/1592-3-0x0000000002110000-0x00000000021CE000-memory.dmp

        Filesize

        760KB

      • memory/1592-13-0x0000000076BA0000-0x0000000076BA1000-memory.dmp

        Filesize

        4KB

      • memory/1592-2-0x0000000076DF0000-0x0000000076F99000-memory.dmp

        Filesize

        1.7MB

      • memory/1592-1-0x000007FEF5310000-0x000007FEF5CFC000-memory.dmp

        Filesize

        9.9MB

      • memory/1592-31-0x0000000076DF0000-0x0000000076F99000-memory.dmp

        Filesize

        1.7MB

      • memory/1592-30-0x000007FEF5310000-0x000007FEF5CFC000-memory.dmp

        Filesize

        9.9MB

      • memory/2600-35-0x0000000000220000-0x00000000002E2000-memory.dmp

        Filesize

        776KB