Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 20:52
Static task
static1
Behavioral task
behavioral1
Sample
4193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693.exe
Resource
win10v2004-20240226-en
General
-
Target
4193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693.exe
-
Size
387KB
-
MD5
6a83e0018512174846a87c577db58ba2
-
SHA1
91e67bb940eb4736aca57e93f9251cc21816e7fd
-
SHA256
4193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693
-
SHA512
52032a277a6c5f204efce6b122c453c08bcc9bb47b1f486d27a328e197163f24abef622744879dadc69ea4d771e4b1f8e925c6556014d9177f0e5dad12dd9a85
-
SSDEEP
6144:/rTfUHeeSKOS9ccFKk3Y9t9YZjuiYz1MpA5nL:/n8yN0Mr8ZjtI1z5nL
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 20 IoCs
resource yara_rule behavioral2/memory/1496-0-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral2/files/0x0008000000023270-4.dat UPX behavioral2/memory/4160-6-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral2/memory/1496-8-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral2/memory/4160-9-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral2/memory/4160-10-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral2/memory/4160-13-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral2/memory/4160-17-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral2/files/0x0004000000009f86-18.dat UPX behavioral2/memory/4160-21-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral2/memory/4160-22-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral2/memory/4160-27-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral2/memory/4160-28-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral2/memory/4160-34-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral2/memory/4160-38-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral2/memory/4160-45-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral2/memory/4160-46-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral2/memory/4160-54-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral2/memory/4160-55-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX behavioral2/memory/4160-64-0x0000000000400000-0x00000000016A8E52-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 4160 Isass.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 4193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" 4193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1496 4193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693.exe 1496 4193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693.exe 4160 Isass.exe 4160 Isass.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1496 wrote to memory of 4160 1496 4193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693.exe 89 PID 1496 wrote to memory of 4160 1496 4193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693.exe 89 PID 1496 wrote to memory of 4160 1496 4193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\4193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693.exe"C:\Users\Admin\AppData\Local\Temp\4193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3668 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:81⤵PID:872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
387KB
MD56a83e0018512174846a87c577db58ba2
SHA191e67bb940eb4736aca57e93f9251cc21816e7fd
SHA2564193f57c71a4c5a46fb50bbadee6e9d1786bba4820f17da52bbd0b741e311693
SHA51252032a277a6c5f204efce6b122c453c08bcc9bb47b1f486d27a328e197163f24abef622744879dadc69ea4d771e4b1f8e925c6556014d9177f0e5dad12dd9a85
-
Filesize
5.5MB
MD50d87f9b022eb9de5206b939610f91c15
SHA1af088d0b3a9888fb244affa76c327645137a3c11
SHA256fa975a3766239301aaf689c23ffd13194e241cafc1afdfef04718cac2eae4b34
SHA512a8f11e25dd3d8bf8e938425dc1a5692ebf7d000f9a6b2686aebf05448cea124f47717a043fcc774551bd3f12f0bcaa0d2c049caba9d06732fc7142e2185b48b0