Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    103s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 05:51

General

  • Target

    83462c00333b20021fbb408da39ca430N.exe

  • Size

    159KB

  • MD5

    83462c00333b20021fbb408da39ca430

  • SHA1

    71a7255f72440bdc88e8da73540ec411761f02bb

  • SHA256

    ecdc8ca79cbc5d4e2f8ab1ddc00dbfe193b75b9206ea5d74e3a44b51754c33cb

  • SHA512

    1d215a568c07164e3e12bc52eb08937e5ef760ac0ab1da2c06048253744c67f2f478dca163bdba0d77d9bc26072ec3dd589728db92aa46e9149343e35969b2b9

  • SSDEEP

    3072:9jh85+KsoQLHMoZDcLwdM8a5Dpv+P02T/y2IvGWdd5yAcK:9jhw+7RF+IML/vi02T/y2IPEAf

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83462c00333b20021fbb408da39ca430N.exe
    "C:\Users\Admin\AppData\Local\Temp\83462c00333b20021fbb408da39ca430N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Users\Admin\AppData\Local\Temp\phll4eLmndwNZb5.exe
      C:\Users\Admin\AppData\Local\Temp\phll4eLmndwNZb5.exe
      2⤵
      • Executes dropped EXE
      PID:4912
    • C:\Windows\svhost.exe
      "C:\Windows\svhost.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    339KB

    MD5

    91e3b31980f0a2a6bc26fe683d76ea90

    SHA1

    ac29280920c771024b6dd085fe612fc08d0e75b2

    SHA256

    26b777792d55b37d419fadf343ae1001538a54797a8c05113bf9a2d834007f8a

    SHA512

    00d3d801ebb987c19d11ee03b305b51b404f95903bbd2c623bf598c03c05477361917c0ba5019bc205dd25f51306f3aec9e91d757299d34467bb401b6d942551

  • C:\Users\Admin\AppData\Local\Temp\phll4eLmndwNZb5.exe

    Filesize

    143KB

    MD5

    38f108cddb6619fba80f8382d5227ece

    SHA1

    12fd277bf756f22cfae3043900e4aff8b9f05ed9

    SHA256

    8296fe257b8c34398e3f291764454ec3cd9cbe06d60989b632ef4ba6c73ae5dc

    SHA512

    3db732c23f10122c78cffc6b6a5b11836ade1a23f5c6f9a192f2be2fa99c5bd7afb7a9e29c5d518a888cdd2091f9ac41b244214be226152830e96f5ec2cca424

  • C:\Windows\svhost.exe

    Filesize

    16KB

    MD5

    5e7c375139b7453abd0b91a8a220f8e5

    SHA1

    88a3d645fab0f4129c1e485c90b593ab60e469ae

    SHA256

    36ec99991653fa54be6f638d0b95eeac3e3f5e3006e4320318c4aa6fc2e330a8

    SHA512

    0805763fe788e0edeb69747d2f419842dc093c2d871d39f25afe2cd27867d54f90fa15892ff5e8c7148280c1ca9b90a0a375f56c277e5d442257c9e77295f1b2

  • memory/4912-11-0x00007FFDB9DB3000-0x00007FFDB9DB5000-memory.dmp

    Filesize

    8KB

  • memory/4912-10-0x0000000000960000-0x0000000000988000-memory.dmp

    Filesize

    160KB

  • memory/4912-20-0x00007FFDB9DB0000-0x00007FFDBA871000-memory.dmp

    Filesize

    10.8MB

  • memory/4912-34-0x00007FFDB9DB0000-0x00007FFDBA871000-memory.dmp

    Filesize

    10.8MB