Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    136s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 10:12

General

  • Target

    PasswordScan.exe

  • Size

    579KB

  • MD5

    9c1ffaf6015e5ed56a981cea5f0937a9

  • SHA1

    34e8b64c9cb5dacdca2e98cc4050fa7f3469b19a

  • SHA256

    32e9052bfcf8ebbe86164ef29e58b293b505c9101d1ee9c3bc04a508a3a9a7fc

  • SHA512

    4ce58f5bceb3b5efba44c0f53ea084a5538634a589c6b80aef7d86afe8629c0136d4478ec58e366ac5d192d344b1d3961bd0f8cafba391ce7c7d6d515d784065

  • SSDEEP

    12288:b2l6mBtnALzuOfPv3tzRSRnblGhCVRxFWxksg:qtnAmOfH3tVSRnJKCh49g

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\lsass.exe
    C:\Windows\system32\lsass.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:668
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
    1⤵
      PID:2148
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
      1⤵
        PID:2556
      • C:\Windows\sysmon.exe
        C:\Windows\sysmon.exe
        1⤵
          PID:2576
        • C:\Users\Admin\AppData\Local\Temp\PasswordScan.exe
          "C:\Users\Admin\AppData\Local\Temp\PasswordScan.exe"
          1⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:428
        • C:\Windows\System32\WaaSMedicAgent.exe
          C:\Windows\System32\WaaSMedicAgent.exe e6755c7f92647cc238e66a16a2446bce yQPxoEKSMU2S1GBBlo5sag.0.1.0.0.0
          1⤵
            PID:2644
          • C:\Windows\system32\wbem\wmiprvse.exe
            C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
            1⤵
              PID:3320
            • C:\Windows\System32\mousocoreworker.exe
              C:\Windows\System32\mousocoreworker.exe -Embedding
              1⤵
                PID:824
              • C:\Windows\system32\backgroundTaskHost.exe
                "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                1⤵
                  PID:2288
                • C:\Windows\system32\backgroundTaskHost.exe
                  "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                  1⤵
                    PID:2384
                  • C:\Windows\system32\BackgroundTransferHost.exe
                    "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                    1⤵
                      PID:4228

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • memory/668-11-0x000001D3055E0000-0x000001D3055E1000-memory.dmp

                      Filesize

                      4KB

                    • memory/668-10-0x000001D3055E0000-0x000001D3055E1000-memory.dmp

                      Filesize

                      4KB

                    • memory/668-3-0x000001D3055E0000-0x000001D3055E1000-memory.dmp

                      Filesize

                      4KB

                    • memory/668-9-0x000001D3055E0000-0x000001D3055E1000-memory.dmp

                      Filesize

                      4KB

                    • memory/668-13-0x000001D3055E0000-0x000001D3055E1000-memory.dmp

                      Filesize

                      4KB

                    • memory/668-12-0x000001D3055E0000-0x000001D3055E1000-memory.dmp

                      Filesize

                      4KB