Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    102s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2024, 07:19

General

  • Target

    8af91aea81f38caf2d413ae700c50bd9b6b5ed2e05d27da3cb77ddf0e2393de6N.exe

  • Size

    3.7MB

  • MD5

    bf3563405a32f8b97fc315896270dff0

  • SHA1

    96d268a515392022545142b879a1a1612d2b5278

  • SHA256

    8af91aea81f38caf2d413ae700c50bd9b6b5ed2e05d27da3cb77ddf0e2393de6

  • SHA512

    3f590eaf6b630eda761997f128c10ce72fbf86bdd5ed77e3b99c63e499b6ae4916818b38cc8958146f38ae9e365338309182f91a9d8c6a8332cdc76c3697dab1

  • SSDEEP

    49152:g/O6/G/I0vxB5NQNO5xrHUu5q7ixruTjWo0U7CUZ+ctb9BFPiKK/ykxYF/OpoCwk:g/O6/G/IixB5+OI48SPx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8af91aea81f38caf2d413ae700c50bd9b6b5ed2e05d27da3cb77ddf0e2393de6N.exe
    "C:\Users\Admin\AppData\Local\Temp\8af91aea81f38caf2d413ae700c50bd9b6b5ed2e05d27da3cb77ddf0e2393de6N.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3460
    • C:\Users\Admin\AppData\Local\Temp\tmp8432\8af91aea81f38caf2d413ae700c50bd9b6b5ed2e05d27da3cb77ddf0e2393de6N.exe
      C:\Users\Admin\AppData\Local\Temp\tmp8432\8af91aea81f38caf2d413ae700c50bd9b6b5ed2e05d27da3cb77ddf0e2393de6N.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe

    Filesize

    674KB

    MD5

    0e52a8215012052d9c633778de5fdf27

    SHA1

    0abb5785385c3d584faf56c2e099d5d77fd5bb27

    SHA256

    b49e53cb15c09a2e2eab42f830e62e7314a06138222c441c7d0a3e1dec577b89

    SHA512

    e1c3f9153adb6d8d80fa9bbe88cb6d0b3acb76a648831ec12d5bda8b4dd99082bb0b10a02428548358850755d74d476b77cebe3657023f785bd1705d42eaaa2a

  • C:\Users\Admin\AppData\Local\Temp\tmp8432\8af91aea81f38caf2d413ae700c50bd9b6b5ed2e05d27da3cb77ddf0e2393de6N.exe

    Filesize

    3.7MB

    MD5

    21c57937b5920dc68eb86051426422de

    SHA1

    926312c45991b3f4cf7a61f5e7dd77cbee985469

    SHA256

    0c045e633b70990f2ed932138bdcc2301a540c3ca86cd616b75d3d5a2c4b03b9

    SHA512

    b8bd00b9a61bfdc140b8891857476d69fd370fcc02310f0bb6e01a35c752852af89b5b8dcfd860cff5518122136fd1f03d60839c8895da35fd7a057db6f54713

  • memory/3460-65-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/3460-67-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/3460-69-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB