Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2024, 22:54

General

  • Target

    5a87a704d0e2e7bc2213db0e6298f125c080c468ed8ea3680d7d7e2ecf626a9d.exe

  • Size

    1.4MB

  • MD5

    8b56e049371d0ad4667839b19abad608

  • SHA1

    3b1f8dd9568dd6a905d2b0aa65f6886970649cde

  • SHA256

    5a87a704d0e2e7bc2213db0e6298f125c080c468ed8ea3680d7d7e2ecf626a9d

  • SHA512

    ca59335f0cd508c201011e61a8ae653aec989922afe4c85e403ea77d56608fecc1b7e0727be2c06fed0ad95477aace7d1a3dfc813f8285de0ce1bd6be0b1a191

  • SSDEEP

    24576:h+SFQyRru2P6TW+/OMiFhTCRQwG6F5/xsSSBl76xPbdHURIcNTKarBI:NZubTWLb33s/xkl76FZUKaKarB

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 2 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3516
      • C:\Users\Admin\AppData\Local\Temp\5a87a704d0e2e7bc2213db0e6298f125c080c468ed8ea3680d7d7e2ecf626a9d.exe
        "C:\Users\Admin\AppData\Local\Temp\5a87a704d0e2e7bc2213db0e6298f125c080c468ed8ea3680d7d7e2ecf626a9d.exe"
        2⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2512
        • C:\Windows\SysWOW64\SaKKXIH\5a87a704d0e2e7bc2213db0e6298f125c080c468ed8ea380d7d7e2ecf626a9d.exe
          "C:\Windows\SysWOW64\SaKKXIH\5a87a704d0e2e7bc2213db0e6298f125c080c468ed8ea380d7d7e2ecf626a9d.exe"
          3⤵
          • Sets service image path in registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Modifies Internet Explorer start page
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: LoadsDriver
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2536

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\EGFugJTN\OTUGsHGY.dll

      Filesize

      864KB

      MD5

      887a721cfb5a0828a381d0e2f850c90b

      SHA1

      ac099688b7b41cf5762d968fd30c8cb9062312dd

      SHA256

      5170d792808b7a4c517f67788e93ea5891ad17776513fd310b9bd1d7d7968f05

      SHA512

      05a479d22fcaf6cd5fb0e5c07bc835d407ecd34b65e766fe8df4e9cf98fd2368c194c0114f803b1c5e0d790cafde294ba8073a5de7560e492800efe938956f9c

    • C:\Windows\EGFugJTN\VhEgMiVo.dll

      Filesize

      483KB

      MD5

      88c4820aa1ecfa3017963db6a60952a0

      SHA1

      95aeaa84e38c62059a703c6a8ce8712df9c990f9

      SHA256

      bb3c682d5bbe59a63dd8fad19466f8c9f770df15acdbed580012be7cea62acbd

      SHA512

      bde8c85f4232f24f415289e1aab61ce090cbd06442d774908a86ede135e74834e4c964c1a584df7a8d37fb56559126de24ff42c8497df7602534cb5d6100f5ee

    • C:\Windows\SysWOW64\SaKKXIH\5a87a704d0e2e7bc2213db0e6298f125c080c468ed8ea380d7d7e2ecf626a9d.exe

      Filesize

      1.4MB

      MD5

      686bf654c190b86c125faa6ba3182101

      SHA1

      6663a23b08282f61a2d3e6b6516d28c7f13c39cd

      SHA256

      607a446af56bacff69951c83e6b0e19fc243299e4d8cc7823c1e9cc5d718d1ad

      SHA512

      c8c0d07ff48a37d8f606b5d89bb9cf6c55faeeb94ade7a2b7864f598c50ba9ed058ed8897cf36d44e2ef740751e92fadaba435f2a392e3345aec401d1d390f8a

    • memory/2512-9-0x0000000000400000-0x0000000000535000-memory.dmp

      Filesize

      1.2MB

    • memory/2512-0-0x0000000000400000-0x0000000000535000-memory.dmp

      Filesize

      1.2MB

    • memory/2536-8-0x0000000000400000-0x0000000000535000-memory.dmp

      Filesize

      1.2MB

    • memory/2536-55-0x0000000002ED0000-0x0000000003058000-memory.dmp

      Filesize

      1.5MB

    • memory/2536-25-0x0000000002ED0000-0x0000000003058000-memory.dmp

      Filesize

      1.5MB

    • memory/2536-29-0x0000000002470000-0x0000000002473000-memory.dmp

      Filesize

      12KB

    • memory/2536-12-0x0000000000400000-0x0000000000535000-memory.dmp

      Filesize

      1.2MB

    • memory/2536-34-0x0000000002ED0000-0x0000000003058000-memory.dmp

      Filesize

      1.5MB

    • memory/2536-56-0x0000000002ED0000-0x0000000003058000-memory.dmp

      Filesize

      1.5MB

    • memory/2536-27-0x0000000002ED0000-0x0000000003058000-memory.dmp

      Filesize

      1.5MB

    • memory/2536-49-0x00000000747D0000-0x0000000074859000-memory.dmp

      Filesize

      548KB

    • memory/2536-57-0x0000000002470000-0x0000000002473000-memory.dmp

      Filesize

      12KB

    • memory/2536-70-0x00000000747D0000-0x0000000074859000-memory.dmp

      Filesize

      548KB

    • memory/2536-69-0x0000000002ED0000-0x0000000003058000-memory.dmp

      Filesize

      1.5MB

    • memory/2536-73-0x0000000002ED0000-0x0000000003058000-memory.dmp

      Filesize

      1.5MB

    • memory/2536-75-0x0000000002ED0000-0x0000000003058000-memory.dmp

      Filesize

      1.5MB

    • memory/2536-77-0x0000000002ED0000-0x0000000003058000-memory.dmp

      Filesize

      1.5MB

    • memory/2536-79-0x0000000002ED0000-0x0000000003058000-memory.dmp

      Filesize

      1.5MB