Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 08:53
Static task
static1
Behavioral task
behavioral1
Sample
aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe
Resource
win10v2004-20240802-en
General
-
Target
aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe
-
Size
1.2MB
-
MD5
77f8da00f3632972d585ff7efb0bea8c
-
SHA1
987ce549f5b8bb619bd78e5f88ae3cd132bb8f34
-
SHA256
aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9
-
SHA512
5b18f05dcb866aad05c25f792f3646c75444a3daf7abb52b2b5331c2a6764c9affea90735d0061d615f0a2c55226262d08b59c98c3c7cbe44528c621fd1fac16
-
SSDEEP
24576:fqDEvCTbMWu7rQYlBQcBiT6rprG8aEnfOYbNoY5cap:fTvC/MTQYxsWR7aEfOYbNs
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1768 set thread context of 884 1768 aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe 87 PID 884 set thread context of 3548 884 svchost.exe 56 PID 884 set thread context of 220 884 svchost.exe 98 PID 220 set thread context of 3548 220 clip.exe 56 PID 220 set thread context of 1932 220 clip.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language clip.exe -
description ioc Process Key created \Registry\User\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 clip.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 884 svchost.exe 884 svchost.exe 884 svchost.exe 884 svchost.exe 884 svchost.exe 884 svchost.exe 884 svchost.exe 884 svchost.exe 884 svchost.exe 884 svchost.exe 884 svchost.exe 884 svchost.exe 884 svchost.exe 884 svchost.exe 884 svchost.exe 884 svchost.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 1768 aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe 884 svchost.exe 3548 Explorer.EXE 3548 Explorer.EXE 220 clip.exe 220 clip.exe 220 clip.exe 220 clip.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 3548 Explorer.EXE Token: SeCreatePagefilePrivilege 3548 Explorer.EXE Token: SeShutdownPrivilege 3548 Explorer.EXE Token: SeCreatePagefilePrivilege 3548 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1768 aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe 1768 aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1768 aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe 1768 aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3548 Explorer.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1768 wrote to memory of 884 1768 aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe 87 PID 1768 wrote to memory of 884 1768 aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe 87 PID 1768 wrote to memory of 884 1768 aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe 87 PID 1768 wrote to memory of 884 1768 aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe 87 PID 3548 wrote to memory of 220 3548 Explorer.EXE 98 PID 3548 wrote to memory of 220 3548 Explorer.EXE 98 PID 3548 wrote to memory of 220 3548 Explorer.EXE 98 PID 220 wrote to memory of 1932 220 clip.exe 111 PID 220 wrote to memory of 1932 220 clip.exe 111
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe"C:\Users\Admin\AppData\Local\Temp\aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:884
-
-
-
C:\Windows\SysWOW64\clip.exe"C:\Windows\SysWOW64\clip.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1932
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD581d057b1ac360dd8069e3f2bd4733088
SHA10fa44cb9a89c387909409c7f4c4e1fe16522b572
SHA25683bf3620fbe8c97f5df54a87fad458c0cac9cf30162e7e4e474398fb980ca667
SHA51217f04d2c81713ff251469fb383988b34c5bf2538d686a7ff2809bf950a608752fc4205d60daad552935eee87ceb40a7e71b92fa93eba351515a136eacefe6414