Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    95s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/09/2024, 03:13

General

  • Target

    c0e0b04921939fa617c707b94b555b19ea737d6ee1606293d5b44f88a3ace74cN.exe

  • Size

    1005KB

  • MD5

    1386c886895587d556d849d374f99c00

  • SHA1

    af9a17f5fc3069af875d7e48d77f570f490c035e

  • SHA256

    c0e0b04921939fa617c707b94b555b19ea737d6ee1606293d5b44f88a3ace74c

  • SHA512

    46f60d55f0a6b28bd3fbd5846e8e02be1ea469475b90112b7bef058ff70dcffb6b1ad27ea6bb654f9941c9ed7d60ff712a6eb7d74e7d5d2eb505c6283b9cc22f

  • SSDEEP

    24576:T0m7MVyppWwUeY/vnS5QhJfgtwy+dFA0zq:RMwEeY//IQhJowy+Tq

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0e0b04921939fa617c707b94b555b19ea737d6ee1606293d5b44f88a3ace74cN.exe
    "C:\Users\Admin\AppData\Local\Temp\c0e0b04921939fa617c707b94b555b19ea737d6ee1606293d5b44f88a3ace74cN.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4296
    • C:\Users\Admin\AppData\Local\Temp\eqsC208.tmp
      "C:\Users\Admin\AppData\Local\Temp\c0e0b04921939fa617c707b94b555b19ea737d6ee1606293d5b44f88a3ace74cN.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2680
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\C0E0B0~1.EXE > nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.195.15\MicrosoftEdgeUpdateBroker.exe

    Filesize

    119KB

    MD5

    a24212d9ab9d14d6493152f554966301

    SHA1

    81196de6cdc48afa382d63b7a4dbb72a455bb319

    SHA256

    5c867ef483964ae3990dcf3faa9c16f42e8d69d8e63b247d8bcc351039eabcc0

    SHA512

    18b4288127800d9d947137c5b86615b3088ce931d2c611f78c3c1fc9370a7b75558d6a2cce47b3bd4b18767fe2e931ade0e24eb821347cc68dcbb660bbf86820

  • C:\Program Files\7-Zip\7z.exe

    Filesize

    1.1MB

    MD5

    5c53c82e46ddfc6c7dc39be7ed062aa9

    SHA1

    80680db2f1031f5a3e191a5695d2d9a9e5dadd6a

    SHA256

    66796c792bb916a7be23d664da2befc9faf7e6927d405c2c22c01ecd999b598b

    SHA512

    a393c944f0f103c79610df299827cf696be27d45e1afc99701b170dd71353b3960714d83efa05381130aa74eb08676bcf075b136396251ada1d70b4d11d39e16

  • C:\Program Files\7-Zip\RCXC22A.tmp

    Filesize

    9KB

    MD5

    fc80202a8fc434099a9449b2a14c2d75

    SHA1

    9ca544e9bd5f4bfd84e9b769a9adeea8c86d2555

    SHA256

    d3c794a3f404eb37cbf4038683a85678d04b28fc6f5d98f2a24116738de07b51

    SHA512

    98292dc9a96ff137205a7874d3495eae8baa0b51e968d616257a7e7ae4291fe010f47bef923039002827d0ff115f154aafe11bf321d534e0a7870faa40f6d2d4

  • C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\RCXCF91.tmp

    Filesize

    51KB

    MD5

    3b21ebb3e4f7c24edc64aaeb6f9e6774

    SHA1

    e3914189f76e3a5950fd3cf761ca20e22e90c044

    SHA256

    2a0ca5daf533d7d37b1b0f57f07fe4a4414b2f8840aedd73b4859672828fe0d7

    SHA512

    2b4c38fd8ff8db88ed02dee17a0d76fe7746bdad734189d1e503b7da07ed75a96cb8df09d4866edd1a3dd8a06ca896b2af3e634fd748f07cb35e7a5519f065b7

  • C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\pptico.exe

    Filesize

    7.7MB

    MD5

    17ac33197c63574ac04a32ed298698bb

    SHA1

    5dcbce62cd9027b3b04deecffb4372a06fd2a9bc

    SHA256

    27dec29b1aa2a3d1fd9544bd500dff6c944942675088196d0981be342fb7a2f2

    SHA512

    01996c844f6a912cdcb13c88fd5215682d87030f8c88db0eca1813dd00ab0feff8bbca1895481eeb50b7059711d27ad333e48372e090d7bf84a18cb22dfbd49d

  • C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\sscicons.exe

    Filesize

    148KB

    MD5

    ed1ff69349496c479da709c8b6efa019

    SHA1

    91a998512b413568724a8dd53b78f5164ba1882e

    SHA256

    e4adf160c9349fedcccbd309109785a0928a9a39ed847686cdd9a3e0a7adb3e4

    SHA512

    a367e682aadae620379763ceec7ed195530e30b96c0d90ec7212f199164d13eb8690c00ec93e28d4b027efd275bd0d446f07d1f509a3f4c8f79aa58ec98c9013

  • C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\xlicons.exe

    Filesize

    8.1MB

    MD5

    545c80c90f9b605640cc7956e95578ff

    SHA1

    251261702813c7e27e62b3a8673b6df8f0d961b8

    SHA256

    bf7148766d58d5de192794a9a91e546f452c1118c9e813744c015453c92be8eb

    SHA512

    0fd1cf21b4ead494df0512f728315e4b13c83725f515a6190938d838a92e6521038ffdf87f0145419672c1cf08105a37a64737aa0422d27d0ea1d07cbe615a62

  • C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-0409-1000-0000000FF1CE}\RCXD23A.tmp

    Filesize

    1004KB

    MD5

    cfdf29654da360dc586d65d4eb06179d

    SHA1

    5464f625f5aebe7fc3169309a9403e25ec09432a

    SHA256

    ac520da6b4a8e12c081ab9ea659fe5bd5eb076c40b203bd7156cb1ad9f8459d7

    SHA512

    30473bcb9ab74f4913c3a093a0626a915f09bd8067270f473924fcbde533a3eab3c9e5f97c1c56358fec054ceaf7f3ca3d707152d008e45c77f02deb46e18ce1

  • C:\ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\RCXE49F.tmp

    Filesize

    13KB

    MD5

    6c8697489ac9ac0cb6b4fae0242d7d4a

    SHA1

    e6e7152422c02294a6d8b174c50495830dbe0f07

    SHA256

    105c89aec69c449454284e23ff153cfff2e2421535b367891f8117a328aa2064

    SHA512

    6f75340014aadb11ae1937fdb8a94c106542e290a58baf84801d21cdb3d69746ec99ee4b4ecde1592f88d9b568eb95879cd99f0dca958b5ebb916524e29520a2

  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\OneDriveSetup.exe

    Filesize

    27.0MB

    MD5

    a7f700f4afd0c2693eab70e5b32753a6

    SHA1

    0eed3395dd7c1f16173035f2e7352eb4eaa2da56

    SHA256

    39cbf7bf33466813364c826e00af8d466755d98a0e37901e81584ece4930c187

    SHA512

    7ae91b742a5cda294a604ea3b99742315534b6dee6abf9809af9bf3fa061274fdf87a66e8a5ec7587bc23e0ca7acb0af40b625937e57d75cd3760e7ebd26f010

  • C:\Users\Admin\AppData\Local\Temp\eqsC208.tmp

    Filesize

    995KB

    MD5

    62db7ffc2db3a1c7d4157807fa62d599

    SHA1

    06ca6e1f814b74708566ce1e258c98d238cc8360

    SHA256

    d9f5f5a886e7b8af87dc34dea9b330fe0243cb481ba518765d7950f1c0aca08a

    SHA512

    aca34b834ee3b622965e928fa1773b5e0de5ad3c4f7591a833c3156bdfba30aca15921fe3697c5fe65b9a69358a2f5c63ea0c81d9062cb1bdfc13ed94732a9a5

  • memory/2680-26-0x0000000000400000-0x0000000000404000-memory.dmp

    Filesize

    16KB

  • memory/4296-0-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB