Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    62s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2024, 06:05

General

  • Target

    2f48478d6e129ed9b142eec7b8d2063f85e8296bfbaca5a1da8ebea26e344958N.exe

  • Size

    5.0MB

  • MD5

    83fcb5ac7f852a8c55ecad65d83e8450

  • SHA1

    72504900c20f1c186fb582867392caf31dabc545

  • SHA256

    2f48478d6e129ed9b142eec7b8d2063f85e8296bfbaca5a1da8ebea26e344958

  • SHA512

    1c1abc3c9d3ebbf5577090fc506513cfdcb08544a8e4e12a4f881f8db4b5c52966590a8dd4a26f8d9ceba2f26241d19f597633a1aa28fa783f56700a6db270a2

  • SSDEEP

    24576:qIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII3:

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in Drivers directory 5 IoCs
  • Drops startup file 8 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f48478d6e129ed9b142eec7b8d2063f85e8296bfbaca5a1da8ebea26e344958N.exe
    "C:\Users\Admin\AppData\Local\Temp\2f48478d6e129ed9b142eec7b8d2063f85e8296bfbaca5a1da8ebea26e344958N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in Drivers directory
    • Drops startup file
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:4944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_79125\java.exe

    Filesize

    5.0MB

    MD5

    83fcb5ac7f852a8c55ecad65d83e8450

    SHA1

    72504900c20f1c186fb582867392caf31dabc545

    SHA256

    2f48478d6e129ed9b142eec7b8d2063f85e8296bfbaca5a1da8ebea26e344958

    SHA512

    1c1abc3c9d3ebbf5577090fc506513cfdcb08544a8e4e12a4f881f8db4b5c52966590a8dd4a26f8d9ceba2f26241d19f597633a1aa28fa783f56700a6db270a2

  • C:\Windows\System32\drivers\etc\networks

    Filesize

    79B

    MD5

    8b20ea0476a4ef666ffde47cf8d160b1

    SHA1

    528db63e91e4c53a7b591dae179b501ed1b567e6

    SHA256

    8fd9c10a4641311464f5a6529b4d2b23c5727d44cf735b05336d63fb905c9173

    SHA512

    8286bfcfe07695ba7aa5a3f75e6ae80643fc3b7c72f21246a9f3c614c1fe5eed70a438227335f0dce8a4014e0fc8975718efd13c3316314ebd28d88b065ab844

  • memory/4944-0-0x0000000074F5E000-0x0000000074F5F000-memory.dmp

    Filesize

    4KB

  • memory/4944-1-0x0000000000460000-0x000000000046A000-memory.dmp

    Filesize

    40KB

  • memory/4944-2-0x00000000053E0000-0x0000000005984000-memory.dmp

    Filesize

    5.6MB

  • memory/4944-3-0x0000000004ED0000-0x0000000004F62000-memory.dmp

    Filesize

    584KB

  • memory/4944-4-0x0000000074F50000-0x0000000075700000-memory.dmp

    Filesize

    7.7MB

  • memory/4944-5-0x0000000004EC0000-0x0000000004ECA000-memory.dmp

    Filesize

    40KB

  • memory/4944-634-0x0000000074F5E000-0x0000000074F5F000-memory.dmp

    Filesize

    4KB

  • memory/4944-958-0x0000000074F50000-0x0000000075700000-memory.dmp

    Filesize

    7.7MB