Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/10/2024, 21:24

General

  • Target

    SeedGen.exe

  • Size

    3.1MB

  • MD5

    b878c132078f58a60bd258eb3998ac83

  • SHA1

    a3e6003e2651b540f8abcb54281a3a5285654186

  • SHA256

    3cfbcfba218eac5d9f083109d9266689d87199eda0471c5f2363a7350e153db9

  • SHA512

    61485b96012e9272e1ec9ffa1deb3ab3e65f197fbc73f21cbfb77c3e23fa86e1abcdd9e29aa89e7142f5197e2336f8444c11ab76c675826f4f693c7e95bb07cb

  • SSDEEP

    49152:BQqiJtsQvt06KRSl4248pzKfMU3hSwWGlMCf2Jer8:nbEl4248pzKfMU3hSwWGlMCf2Jer8

Malware Config

Signatures

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SeedGen.exe
    "C:\Users\Admin\AppData\Local\Temp\SeedGen.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c cls
      2⤵
        PID:1748

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1952-0-0x000001E836BD0000-0x000001E836BD2000-memory.dmp

      Filesize

      8KB

    • memory/1952-1-0x000001E836D80000-0x000001E836EE4000-memory.dmp

      Filesize

      1.4MB

    • memory/1952-8-0x000001E836D80000-0x000001E836EE4000-memory.dmp

      Filesize

      1.4MB

    • memory/1952-9-0x000001E836D80000-0x000001E836EE4000-memory.dmp

      Filesize

      1.4MB