Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

11/08/2024, 22:04

240811-1y9cdsvdqa 9

11/08/2024, 22:02

240811-1xxbfazhmk 9

Analysis

  • max time kernel
    151s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/08/2024, 22:02

General

  • Target

    Pralevia.exe

  • Size

    168.7MB

  • MD5

    a6fcb87a864455a93cd2c24399c52b26

  • SHA1

    a4f03ac9fd364221cc4c407ca2c708dc0cecf22c

  • SHA256

    5f831e7ed92b73244b2689f5dd0455d217a38bca458b3b1bca83f5ffe47bfac4

  • SHA512

    89100fcd5852894c22e10db3158b27e8cce312e8ab7b3dd5f126e6751a9dfb71a348801cfb63ea38c74e3c965b04546836cf24edb61ef25dddda3998e01ab5cb

  • SSDEEP

    1572864:1OhiqBPiJU33xaD1gWcdcMPEDCNCgDX0Bf+NNvTPQYhl49RIuKj53fHcTLNKJF96:JgmeNxNNZxqV

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • An obfuscated cmd.exe command-line is typically used to evade detection. 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Pralevia.exe
    "C:\Users\Admin\AppData\Local\Temp\Pralevia.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4556
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "tasklist"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:408
      • C:\Windows\system32\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:5076
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_computersystemproduct get uuid"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1312
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic path win32_computersystemproduct get uuid
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4056
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "tasklist"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2956
      • C:\Windows\system32\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:2232
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "tasklist"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3704
      • C:\Windows\system32\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:4688
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,61,28,111,48,103,192,200,74,187,56,57,175,169,46,187,15,16,0,0,0,28,0,0,0,71,0,111,0,111,0,103,0,108,0,101,0,32,0,67,0,104,0,114,0,111,0,109,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,8,218,122,81,177,48,95,253,108,218,130,13,112,190,161,148,54,196,50,90,193,158,228,91,46,204,167,254,123,58,18,139,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,214,140,72,70,183,16,203,205,43,205,4,153,236,226,150,108,139,243,20,224,114,19,84,193,11,208,124,197,196,61,82,169,48,0,0,0,8,76,156,179,198,169,195,116,34,32,0,17,1,81,169,82,33,38,0,5,199,59,97,116,172,20,214,91,152,86,96,192,206,198,241,87,169,221,33,132,89,174,201,177,80,202,153,147,64,0,0,0,200,138,112,152,245,240,101,248,210,103,126,78,189,177,23,119,125,33,62,133,57,50,6,248,115,241,146,151,179,22,122,131,2,173,67,64,232,52,160,148,232,154,228,4,97,45,41,113,104,139,91,33,174,101,33,130,65,111,46,244,195,39,204,194), $null, 'CurrentUser')"
      2⤵
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:544
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,61,28,111,48,103,192,200,74,187,56,57,175,169,46,187,15,16,0,0,0,28,0,0,0,71,0,111,0,111,0,103,0,108,0,101,0,32,0,67,0,104,0,114,0,111,0,109,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,8,218,122,81,177,48,95,253,108,218,130,13,112,190,161,148,54,196,50,90,193,158,228,91,46,204,167,254,123,58,18,139,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,214,140,72,70,183,16,203,205,43,205,4,153,236,226,150,108,139,243,20,224,114,19,84,193,11,208,124,197,196,61,82,169,48,0,0,0,8,76,156,179,198,169,195,116,34,32,0,17,1,81,169,82,33,38,0,5,199,59,97,116,172,20,214,91,152,86,96,192,206,198,241,87,169,221,33,132,89,174,201,177,80,202,153,147,64,0,0,0,200,138,112,152,245,240,101,248,210,103,126,78,189,177,23,119,125,33,62,133,57,50,6,248,115,241,146,151,179,22,122,131,2,173,67,64,232,52,160,148,232,154,228,4,97,45,41,113,104,139,91,33,174,101,33,130,65,111,46,244,195,39,204,194), $null, 'CurrentUser')
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2696
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,61,28,111,48,103,192,200,74,187,56,57,175,169,46,187,15,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,238,63,56,178,84,215,241,50,61,115,82,189,250,9,179,193,174,149,201,41,220,105,177,218,111,248,219,168,251,253,6,188,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,74,8,180,93,245,211,233,165,172,19,163,246,211,124,16,77,128,48,82,58,147,46,86,77,223,94,248,135,75,189,61,151,48,0,0,0,181,126,119,173,128,7,117,236,213,252,235,135,151,21,211,212,201,2,198,111,34,158,77,255,138,215,5,253,21,236,215,197,198,97,129,185,186,164,130,224,244,196,37,201,251,223,227,130,64,0,0,0,153,155,48,141,191,30,157,98,119,41,61,136,71,244,170,5,192,8,110,66,25,94,147,83,9,255,165,89,19,229,5,163,74,107,229,22,98,234,25,252,28,149,21,92,182,34,5,60,227,16,101,127,244,133,13,170,164,67,61,77,250,19,45,204), $null, 'CurrentUser')"
      2⤵
      • An obfuscated cmd.exe command-line is typically used to evade detection.
      • Suspicious use of WriteProcessMemory
      PID:2828
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,61,28,111,48,103,192,200,74,187,56,57,175,169,46,187,15,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,238,63,56,178,84,215,241,50,61,115,82,189,250,9,179,193,174,149,201,41,220,105,177,218,111,248,219,168,251,253,6,188,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,74,8,180,93,245,211,233,165,172,19,163,246,211,124,16,77,128,48,82,58,147,46,86,77,223,94,248,135,75,189,61,151,48,0,0,0,181,126,119,173,128,7,117,236,213,252,235,135,151,21,211,212,201,2,198,111,34,158,77,255,138,215,5,253,21,236,215,197,198,97,129,185,186,164,130,224,244,196,37,201,251,223,227,130,64,0,0,0,153,155,48,141,191,30,157,98,119,41,61,136,71,244,170,5,192,8,110,66,25,94,147,83,9,255,165,89,19,229,5,163,74,107,229,22,98,234,25,252,28,149,21,92,182,34,5,60,227,16,101,127,244,133,13,170,164,67,61,77,250,19,45,204), $null, 'CurrentUser')
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1932
    • C:\Users\Admin\AppData\Local\Temp\Pralevia.exe
      "C:\Users\Admin\AppData\Local\Temp\Pralevia.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Pralevia" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1884 --field-trial-handle=1888,i,3182818898159965021,13405437431254922181,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:2
      2⤵
        PID:4120
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "wmic OS get caption"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3920
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic OS get caption
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3576
      • C:\Users\Admin\AppData\Local\Temp\Pralevia.exe
        "C:\Users\Admin\AppData\Local\Temp\Pralevia.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Pralevia" --mojo-platform-channel-handle=2088 --field-trial-handle=1888,i,3182818898159965021,13405437431254922181,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:8
        2⤵
          PID:3952
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "hostname"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3004
          • C:\Windows\system32\HOSTNAME.EXE
            hostname
            3⤵
              PID:3860
          • C:\Users\Admin\AppData\Local\Temp\Pralevia.exe
            "C:\Users\Admin\AppData\Local\Temp\Pralevia.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\Pralevia" --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=908 --field-trial-handle=1888,i,3182818898159965021,13405437431254922181,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:8
            2⤵
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            PID:860

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

          Filesize

          3KB

          MD5

          f48896adf9a23882050cdff97f610a7f

          SHA1

          4c5a610df62834d43f470cae7e851946530e3086

          SHA256

          3ae35c2828715a2f9a5531d334a0cfffc81396c2dc058ca42a9943f3cdc22e78

          SHA512

          16644246f2a35a186fcb5c2b6456ed6a16e8db65ad1383109e06547f9b1f9358f071c30cca541ca4cf7bae66cb534535e88f75f6296a4bfc6c7b22b0684a6ba9

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          c3d0e052ba84a5a94a12f82b5523b45e

          SHA1

          18c9412da40f1d565c47dc150f782672a8913baa

          SHA256

          0937d02e49f29b26b70ae49a9709208b79a25cb2b927251e5ef2cce71942638d

          SHA512

          78a4c052734d4540e190e37c674302d1a234c9d83e0761b1337241519685dbe486b65a8d58919bc2e166c8a58395895fd1385b8a47f5fed4506dbf132ddfc607

        • C:\Users\Admin\AppData\Local\Temp\092eaf37-5c98-488e-ad8e-5adb06d36331.tmp.node

          Filesize

          1.4MB

          MD5

          56192831a7f808874207ba593f464415

          SHA1

          e0c18c72a62692d856da1f8988b0bc9c8088d2aa

          SHA256

          6aa8763714aa5199a4065259af792292c2a7d6a2c381aa27007255421e5c9d8c

          SHA512

          c82aa1ef569c232b4b4f98a3789f2390e5f7bf5cc7e73d199fe23a3f636817edfdc2fb49ce7f69169c028a9dd5ab9f63e8f64964bb22424fc08db71e85054a33

        • C:\Users\Admin\AppData\Local\Temp\Passwords.txt

          Filesize

          14B

          MD5

          b4b41665eb819824e886204a28cc610b

          SHA1

          e778edb6f635f665c0b512748b8fec6a2a23a88b

          SHA256

          635f814c1f34ee53ee62b67f989fec91eb0e08f63769ab4bd22cf4206a2cfff6

          SHA512

          37648652b1df14aa427382a4dac70d58a107d3dd77bd1977afc3acce8c56b7b6531b67d33f4b61b9fb8fbb9230ab0dfd461db07c1cc11a2923604e910a743d67

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_34xnj3jl.teo.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/860-65-0x000001FDF2E80000-0x000001FDF2E81000-memory.dmp

          Filesize

          4KB

        • memory/860-63-0x000001FDF2E80000-0x000001FDF2E81000-memory.dmp

          Filesize

          4KB

        • memory/860-64-0x000001FDF2E80000-0x000001FDF2E81000-memory.dmp

          Filesize

          4KB

        • memory/860-75-0x000001FDF2E80000-0x000001FDF2E81000-memory.dmp

          Filesize

          4KB

        • memory/860-74-0x000001FDF2E80000-0x000001FDF2E81000-memory.dmp

          Filesize

          4KB

        • memory/860-73-0x000001FDF2E80000-0x000001FDF2E81000-memory.dmp

          Filesize

          4KB

        • memory/860-72-0x000001FDF2E80000-0x000001FDF2E81000-memory.dmp

          Filesize

          4KB

        • memory/860-71-0x000001FDF2E80000-0x000001FDF2E81000-memory.dmp

          Filesize

          4KB

        • memory/860-70-0x000001FDF2E80000-0x000001FDF2E81000-memory.dmp

          Filesize

          4KB

        • memory/860-69-0x000001FDF2E80000-0x000001FDF2E81000-memory.dmp

          Filesize

          4KB

        • memory/2696-18-0x000001D53FB90000-0x000001D53FBE0000-memory.dmp

          Filesize

          320KB

        • memory/2696-8-0x000001D527550000-0x000001D527572000-memory.dmp

          Filesize

          136KB