Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 19:56

General

  • Target

    f11c7bce06ba3ffcb49c370e81607da0N.exe

  • Size

    538KB

  • MD5

    f11c7bce06ba3ffcb49c370e81607da0

  • SHA1

    43c21f0230ed183d9da37d68411dff6002bc8907

  • SHA256

    86e32debc724ab505081f11fd3fc8088cdf26654411053deb76a4aec3d7e665a

  • SHA512

    e59b0ba543ca9fa6b457f578481072745a4571f2cd3f351226ecaa513b6260e189cc5af9811d6f0c7373e3c9902b3ef632d8b6c9cae18663932697f4ec20f453

  • SSDEEP

    12288:/n8yN0Mr8ZJJw1jm0Uq+pnWHDiZPWho5hWcrIm+xM/EWGKWYuaP:vPuZJK1Kbgq+h2rdjWYb

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f11c7bce06ba3ffcb49c370e81607da0N.exe
    "C:\Users\Admin\AppData\Local\Temp\f11c7bce06ba3ffcb49c370e81607da0N.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4428
    • C:\Users\Public\Microsoft Build\Isass.exe
      "C:\Users\Public\Microsoft Build\Isass.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:708
    • C:\Users\Public\Microsoft Build\Isass.exe
      "C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\f11c7bce06ba3ffcb49c370e81607da0N.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:5080
      • C:\Users\Admin\AppData\Local\Temp\f11c7bce06ba3ffcb49c370e81607da0N.exe
        "C:\Users\Admin\AppData\Local\Temp\f11c7bce06ba3ffcb49c370e81607da0N.exe"
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2212
        • C:\Users\Public\Microsoft Build\Isass.exe
          "C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\f11c7bce06ba3ffcb49c370e81607da0N.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:244
          • C:\Users\Admin\AppData\Local\Temp\f11c7bce06ba3ffcb49c370e81607da0N.exe
            "C:\Users\Admin\AppData\Local\Temp\f11c7bce06ba3ffcb49c370e81607da0N.exe"
            5⤵
            • Checks computer location settings
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1368
            • C:\Users\Public\Microsoft Build\Isass.exe
              "C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\f11c7bce06ba3ffcb49c370e81607da0N.exe
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2224
              • C:\Users\Admin\AppData\Local\Temp\f11c7bce06ba3ffcb49c370e81607da0N.exe
                "C:\Users\Admin\AppData\Local\Temp\f11c7bce06ba3ffcb49c370e81607da0N.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:3228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe

    Filesize

    679KB

    MD5

    abe14d1bf5f0ebc716a7aade4efe24e9

    SHA1

    b930a32e3b0ef87e73dcf8f21457c2d201ad3100

    SHA256

    6f9e3b08ed77d07ccec21ff45b4cbc66a2bf6e41a2dbf5ba6d98486d0be6764e

    SHA512

    ae0e612e7349de7c818902f4811f7e5258a5d7dd8f324fe1209d6b18b829090d0e179fa3161fbcfe16a740e9919f51a7aaf712bf698d57af8fdbb136097383ec

  • C:\Users\Admin\AppData\Local\Temp\f11c7bce06ba3ffcb49c370e81607da0N.exe

    Filesize

    284KB

    MD5

    a42b35f975d88c1370a7aff084ee57a7

    SHA1

    bee1408fe0b15f6f719f003e46aee5ec424cf608

    SHA256

    56cc9e7e3767c0cffae8161bf0ad13457487c1b422e2879b897dbd4bab115776

    SHA512

    b92d05515e18277db660118934e70678ee2a3bb66005bad19bb417ffaedb22a63727a5a697ca3ac0f6c48f6f5593ba45ab80f4ebdc0eaed10d80b7af04d45b23

  • C:\Users\Public\Microsoft Build\Isass.exe

    Filesize

    216KB

    MD5

    0609171772ed1682bd6adb41673f32b2

    SHA1

    75456deb7fe05cc2a5806623b6b216bc4fc47243

    SHA256

    de84bb36c0b33b5ddc3f6d54c8b087649b51e8cf8a80bace4fd92258d46443e3

    SHA512

    693c912a8253c62a446f072035f9775dfce0c45b0160710ee4bf8a0c296af0f9fcda24b22bc24050d837338b22371bc6eecd6f3e8ed7e0bde8b13b56e83ce778

  • memory/244-16-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/244-18-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/708-57-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/708-47-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/708-67-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/708-66-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/708-58-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/708-7-0x00000000019F0000-0x00000000019F1000-memory.dmp

    Filesize

    4KB

  • memory/708-32-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/708-51-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/708-6-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/708-42-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/708-41-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/708-36-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/708-37-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/708-33-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/1368-20-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/2212-15-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/2224-31-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/4428-1-0x0000000003D30000-0x0000000003D31000-memory.dmp

    Filesize

    4KB

  • memory/4428-11-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/4428-0-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/5080-10-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB

  • memory/5080-13-0x0000000000400000-0x00000000016A8E52-memory.dmp

    Filesize

    18.7MB