Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    13/06/2024, 12:16

General

  • Target

    sigortacixd.exe

  • Size

    154.8MB

  • MD5

    46253ba66e62c99f2b4f56ad079f4a15

  • SHA1

    15b5b512fea69bc6082265b574b5548d4169e712

  • SHA256

    70f82bf21f88abd131fe52fc21b85c2778715af3d28d8c8bec8729389013d59d

  • SHA512

    9e5e2eba88287ea8220487a7afa8aaccf970c530988ca8c407aa17a9db38d1c2bfffe3f2420722e05b9c7826054dd1577abe71abfc4909d822ed3a128adcd93b

  • SSDEEP

    1572864:1UNrUK1epsL/7TCuLct0wGWlm0ZMy2Q5t92grqsSlHSIcelNVtC+vp5FD+gr0cAU:eegW7q48MGo

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sigortacixd.exe
    "C:\Users\Admin\AppData\Local\Temp\sigortacixd.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3132
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "tasklist"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4972
      • C:\Windows\system32\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:1812
    • C:\Users\Admin\AppData\Local\Temp\sigortacixd.exe
      "C:\Users\Admin\AppData\Local\Temp\sigortacixd.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\zz" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1892,i,14752151691650645064,13220161137471478584,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
      2⤵
        PID:5116
      • C:\Users\Admin\AppData\Local\Temp\sigortacixd.exe
        "C:\Users\Admin\AppData\Local\Temp\sigortacixd.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\zz" --mojo-platform-channel-handle=1732 --field-trial-handle=1892,i,14752151691650645064,13220161137471478584,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
        2⤵
          PID:5032
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "tasklist"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1316
          • C:\Windows\system32\tasklist.exe
            tasklist
            3⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:2152
        • C:\Users\Admin\AppData\Local\Temp\sigortacixd.exe
          "C:\Users\Admin\AppData\Local\Temp\sigortacixd.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --user-data-dir="C:\Users\Admin\AppData\Roaming\zz" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1564 --field-trial-handle=1892,i,14752151691650645064,13220161137471478584,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3732

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\0977d2da-4a51-49e2-873c-c4ecabc64c1a.tmp.node

        Filesize

        1.5MB

        MD5

        4d46c172c39805df5c9de9af42ba5a88

        SHA1

        a2dd4f8e3d798f68f8530d5f7d254ad224c8587b

        SHA256

        5623d8e82583c26d405e82add2f80945ff8a797e40ff52640e1390259edcd4c6

        SHA512

        f809a0631579936d9b6b618cb95b27c643cea9add825fafd48a86bc8d2853079321a8b9afa750585f811f3a92617e4bc8e67b89aca00f3c591a50cbbb14a7f5d

      • C:\Users\Admin\AppData\Local\Temp\6070e2ea-56b7-4734-b1a1-2111dd97d1e5.tmp.node

        Filesize

        154KB

        MD5

        db6a7abae9b0da59c9011ed4f94b6fbd

        SHA1

        e73242bf71c93beb7156534f3f2502d44eb15d5d

        SHA256

        4ee5214adfb5178ad574585d8834b21f83718dc0c47a53a406935c713be0c167

        SHA512

        e02cea4dcaa056196cdc6c1146bf9379270b0f062b807cb5eb247e3842830b525127132286525eb21920d0ace24ab14d66758402487b410d58ba847a29955c5b

      • memory/3732-31-0x0000021BCC5F0000-0x0000021BCC5F1000-memory.dmp

        Filesize

        4KB

      • memory/3732-42-0x0000021BCC5F0000-0x0000021BCC5F1000-memory.dmp

        Filesize

        4KB

      • memory/3732-41-0x0000021BCC5F0000-0x0000021BCC5F1000-memory.dmp

        Filesize

        4KB

      • memory/3732-40-0x0000021BCC5F0000-0x0000021BCC5F1000-memory.dmp

        Filesize

        4KB

      • memory/3732-39-0x0000021BCC5F0000-0x0000021BCC5F1000-memory.dmp

        Filesize

        4KB

      • memory/3732-38-0x0000021BCC5F0000-0x0000021BCC5F1000-memory.dmp

        Filesize

        4KB

      • memory/3732-37-0x0000021BCC5F0000-0x0000021BCC5F1000-memory.dmp

        Filesize

        4KB

      • memory/3732-36-0x0000021BCC5F0000-0x0000021BCC5F1000-memory.dmp

        Filesize

        4KB

      • memory/3732-32-0x0000021BCC5F0000-0x0000021BCC5F1000-memory.dmp

        Filesize

        4KB

      • memory/3732-30-0x0000021BCC5F0000-0x0000021BCC5F1000-memory.dmp

        Filesize

        4KB