Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23/11/2024, 03:24 UTC

General

  • Target

    c1e76af376454bab05e44634ca4e017e7607e41c9df6e067162d28064a1c7cd6.exe

  • Size

    145KB

  • MD5

    913458a5e9eb4026c62609375b534227

  • SHA1

    9739ae38effef090b3b558531e01bf2252bd018f

  • SHA256

    c1e76af376454bab05e44634ca4e017e7607e41c9df6e067162d28064a1c7cd6

  • SHA512

    5b653989cafdbd586216ccd11d243001b066b044df93478f574577f170b72a84b3831c89933c023ac458d8c2d4fb2fe4cdfcac0608806258150c3df101a79275

  • SSDEEP

    1536:DzICS4AAwczUUf8y8gvMH+1zGSNAojMP95D1xDXcl74OOjAp31AyNpCSV6O9xv2T:cqJogYkcSNm9V7DG98YlXjCSV6O9R2T

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1e76af376454bab05e44634ca4e017e7607e41c9df6e067162d28064a1c7cd6.exe
    "C:\Users\Admin\AppData\Local\Temp\c1e76af376454bab05e44634ca4e017e7607e41c9df6e067162d28064a1c7cd6.exe"
    1⤵
    • Loads dropped DLL
    • Drops desktop.ini file(s)
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\ProgramData\696D.tmp
      "C:\ProgramData\696D.tmp"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1424
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\696D.tmp >> NUL
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1720
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x148
    1⤵
      PID:1356

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini

      Filesize

      129B

      MD5

      0500a39f0d8cf6782b5e63a652b8a338

      SHA1

      46b32c170be5d2b89f873887c62f86cffbae6a3c

      SHA256

      3ad34fa656a974764608f5c9e83ca6e555e1461f383f58f800c29f931725dd54

      SHA512

      27740a7c6a87a0ba6ebf11d9ef578f5d468eed793cc22a58c330b36ed873be39dee02723f0829b4755649771063a5d846b19328cf8acde7a44421b1319adaa93

    • C:\88keWj8Nu.README.txt

      Filesize

      452B

      MD5

      c3ca0b5b87b140b357e8aa5927b8bdfe

      SHA1

      e0d1c1c8edb7ce192218f0181a210d64ef2c005b

      SHA256

      496392d3bf85b48fc8c199e59d3d77848c496bc600d4df51331f2302b2910ed2

      SHA512

      b1f881d06206cc564a1b07bd1d7ab1967740c12533a67cf3bd7397e9520430a36111dae90bad5a575aa94b595cb84246bc8d5bea54e8159da3d69817d9766b97

    • F:\$RECYCLE.BIN\S-1-5-21-3290804112-2823094203-3137964600-1000\DDDDDDDDDDD

      Filesize

      129B

      MD5

      e7285403e50be7c96e4ea878d7a5c842

      SHA1

      e0926e790dd0fb8a438e1a2ec8692e43b72a8ccc

      SHA256

      e25dcdf37d3c69a1518e176f343c37534102f55dc97c523759b643d6e14595c0

      SHA512

      b7f6f7a2849c03c00c24c04011b88ad8f424f858a2842bd9df4fe4f036015c8cc123c0cf5f03e7e9405b669eccd79c1b6e2151c42c245123cbaad6d84ae58ee2

    • \ProgramData\696D.tmp

      Filesize

      14KB

      MD5

      294e9f64cb1642dd89229fff0592856b

      SHA1

      97b148c27f3da29ba7b18d6aee8a0db9102f47c9

      SHA256

      917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

      SHA512

      b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

    • memory/1424-868-0x0000000000401000-0x0000000000404000-memory.dmp

      Filesize

      12KB

    • memory/1424-870-0x0000000000400000-0x0000000000407000-memory.dmp

      Filesize

      28KB

    • memory/1424-871-0x0000000000400000-0x0000000000407000-memory.dmp

      Filesize

      28KB

    • memory/1424-874-0x0000000000400000-0x0000000000407000-memory.dmp

      Filesize

      28KB

    • memory/2288-0-0x0000000000890000-0x00000000008D0000-memory.dmp

      Filesize

      256KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.