Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
104s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 10:16
Static task
static1
Behavioral task
behavioral1
Sample
82b7a04e06de0dd5b20c7cc333df8010N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
82b7a04e06de0dd5b20c7cc333df8010N.exe
Resource
win10v2004-20240709-en
General
-
Target
82b7a04e06de0dd5b20c7cc333df8010N.exe
-
Size
159KB
-
MD5
82b7a04e06de0dd5b20c7cc333df8010
-
SHA1
1133763a625ce6690ad5b0042b48688a9bcfd376
-
SHA256
0e6d0b320bafe07d030b4be7f049daf9ba870f3a29bdab116a02f1de7677adeb
-
SHA512
d3855d6ae90eb5b32d2b513b9bdf555b7893046bcd5c35ea2eab71ca5849ff10f401bd54ec15190b82d01fb6f7595ac4bd7ef4a2103c6fbff44eb3ac9512d4e9
-
SSDEEP
3072:th85+KsltciZzA10H38CXPdePLQDvp44gk513K+LLZ+asmvNhErCwpoCrTBgGCBk:thw+7TpZ73nVwyuDmVLZVUPoogi
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4528 tlDD8w1PiOBC1Y4.exe 2996 svhost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Winhost = "C:\\Windows\\svhost.exe" 82b7a04e06de0dd5b20c7cc333df8010N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Winhost = "C:\\Windows\\svhost.exe" svhost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svhost.exe 82b7a04e06de0dd5b20c7cc333df8010N.exe File created C:\Windows\svhost.exe svhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2208 82b7a04e06de0dd5b20c7cc333df8010N.exe Token: SeDebugPrivilege 2996 svhost.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2208 wrote to memory of 4528 2208 82b7a04e06de0dd5b20c7cc333df8010N.exe 84 PID 2208 wrote to memory of 4528 2208 82b7a04e06de0dd5b20c7cc333df8010N.exe 84 PID 2208 wrote to memory of 2996 2208 82b7a04e06de0dd5b20c7cc333df8010N.exe 86 PID 2208 wrote to memory of 2996 2208 82b7a04e06de0dd5b20c7cc333df8010N.exe 86 PID 2208 wrote to memory of 2996 2208 82b7a04e06de0dd5b20c7cc333df8010N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\82b7a04e06de0dd5b20c7cc333df8010N.exe"C:\Users\Admin\AppData\Local\Temp\82b7a04e06de0dd5b20c7cc333df8010N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\tlDD8w1PiOBC1Y4.exeC:\Users\Admin\AppData\Local\Temp\tlDD8w1PiOBC1Y4.exe2⤵
- Executes dropped EXE
PID:4528
-
-
C:\Windows\svhost.exe"C:\Windows\svhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
339KB
MD50305dae117c3643efafc381c8a62071e
SHA1eb10b7743ec15a86ed9958c8b415124230da9558
SHA256c34013cc0256d581071493a8e81ddc4b8678b701256adcd1f36f72a2de4613cb
SHA512f39fc63f862b12608dabbac64c39c8ed1e564d980560e6c4f879fe095e86e95a1de58c4a6089fe4673bbfaa178be1d6e7e415a6dfcd37950069fb469e6f75572
-
Filesize
143KB
MD52fdb371d45181dff59577110ba1064e2
SHA142a5833cb0ac90e38d734d1327bb3f7c7a6aa453
SHA25680d7ec8ce3913d81ea5d4f304b8609e56f0e49778c52af9279e742ea54f4a155
SHA51252982041ba9ca552b90b79b251501ec6c33c5251d09ca9969a1b179af2ec17aca6eb81db6e588e12751bcea04208e1da8d5a754a979dd98ceb3f50780aadea20
-
Filesize
16KB
MD576fd02b48297edb28940bdfa3fa1c48a
SHA1bf5cae1057a0aca8bf3aab8b121fe77ebb0788ce
SHA25607abd35f09b954eba7011ce18b225017c50168e039732680df58ae703324825c
SHA51228c7bf4785547f6df9d678699a55cfb24c429a2bac5375733ff2f760c92933190517d8acd740bdf69c3ecc799635279af5d7ebd848c5b471318d1f330c441ff0