Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2022, 16:51 UTC
Static task
static1
General
-
Target
647d1fef53a2ebd44f8066a070dca4f38ffe8cb3759c2088dbee8dfd551bac08.exe
-
Size
4.8MB
-
MD5
49dcbf0def88962f118a2a03e441fe54
-
SHA1
7779b3c6f5c9ca5486cbc71b98d436f920d16538
-
SHA256
647d1fef53a2ebd44f8066a070dca4f38ffe8cb3759c2088dbee8dfd551bac08
-
SHA512
3ad2ed520323d92291ed112542391950f7cc3353ff0604e8f35a8f6a1e6a9b84817562de944df68e45e72bd02cb97d7f66b928daa6494bf57507634e09f578d3
-
SSDEEP
98304:GDR/pKO+6PbFmS3VjVEOeTtJaAbLECnrZXJT7W:GDVbFmS3VjVEOeTtJHbdnrz7
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 9 IoCs
pid pid_target Process procid_target 2164 3488 WerFault.exe 79 3132 3488 WerFault.exe 79 4792 3488 WerFault.exe 79 2624 3488 WerFault.exe 79 1732 3488 WerFault.exe 79 4660 3488 WerFault.exe 79 3208 3488 WerFault.exe 79 1268 3488 WerFault.exe 79 2408 3488 WerFault.exe 79 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2052 wmic.exe Token: SeSecurityPrivilege 2052 wmic.exe Token: SeTakeOwnershipPrivilege 2052 wmic.exe Token: SeLoadDriverPrivilege 2052 wmic.exe Token: SeSystemProfilePrivilege 2052 wmic.exe Token: SeSystemtimePrivilege 2052 wmic.exe Token: SeProfSingleProcessPrivilege 2052 wmic.exe Token: SeIncBasePriorityPrivilege 2052 wmic.exe Token: SeCreatePagefilePrivilege 2052 wmic.exe Token: SeBackupPrivilege 2052 wmic.exe Token: SeRestorePrivilege 2052 wmic.exe Token: SeShutdownPrivilege 2052 wmic.exe Token: SeDebugPrivilege 2052 wmic.exe Token: SeSystemEnvironmentPrivilege 2052 wmic.exe Token: SeRemoteShutdownPrivilege 2052 wmic.exe Token: SeUndockPrivilege 2052 wmic.exe Token: SeManageVolumePrivilege 2052 wmic.exe Token: 33 2052 wmic.exe Token: 34 2052 wmic.exe Token: 35 2052 wmic.exe Token: 36 2052 wmic.exe Token: SeIncreaseQuotaPrivilege 2052 wmic.exe Token: SeSecurityPrivilege 2052 wmic.exe Token: SeTakeOwnershipPrivilege 2052 wmic.exe Token: SeLoadDriverPrivilege 2052 wmic.exe Token: SeSystemProfilePrivilege 2052 wmic.exe Token: SeSystemtimePrivilege 2052 wmic.exe Token: SeProfSingleProcessPrivilege 2052 wmic.exe Token: SeIncBasePriorityPrivilege 2052 wmic.exe Token: SeCreatePagefilePrivilege 2052 wmic.exe Token: SeBackupPrivilege 2052 wmic.exe Token: SeRestorePrivilege 2052 wmic.exe Token: SeShutdownPrivilege 2052 wmic.exe Token: SeDebugPrivilege 2052 wmic.exe Token: SeSystemEnvironmentPrivilege 2052 wmic.exe Token: SeRemoteShutdownPrivilege 2052 wmic.exe Token: SeUndockPrivilege 2052 wmic.exe Token: SeManageVolumePrivilege 2052 wmic.exe Token: 33 2052 wmic.exe Token: 34 2052 wmic.exe Token: 35 2052 wmic.exe Token: 36 2052 wmic.exe Token: SeIncreaseQuotaPrivilege 3688 WMIC.exe Token: SeSecurityPrivilege 3688 WMIC.exe Token: SeTakeOwnershipPrivilege 3688 WMIC.exe Token: SeLoadDriverPrivilege 3688 WMIC.exe Token: SeSystemProfilePrivilege 3688 WMIC.exe Token: SeSystemtimePrivilege 3688 WMIC.exe Token: SeProfSingleProcessPrivilege 3688 WMIC.exe Token: SeIncBasePriorityPrivilege 3688 WMIC.exe Token: SeCreatePagefilePrivilege 3688 WMIC.exe Token: SeBackupPrivilege 3688 WMIC.exe Token: SeRestorePrivilege 3688 WMIC.exe Token: SeShutdownPrivilege 3688 WMIC.exe Token: SeDebugPrivilege 3688 WMIC.exe Token: SeSystemEnvironmentPrivilege 3688 WMIC.exe Token: SeRemoteShutdownPrivilege 3688 WMIC.exe Token: SeUndockPrivilege 3688 WMIC.exe Token: SeManageVolumePrivilege 3688 WMIC.exe Token: 33 3688 WMIC.exe Token: 34 3688 WMIC.exe Token: 35 3688 WMIC.exe Token: 36 3688 WMIC.exe Token: SeIncreaseQuotaPrivilege 3688 WMIC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3488 wrote to memory of 2052 3488 647d1fef53a2ebd44f8066a070dca4f38ffe8cb3759c2088dbee8dfd551bac08.exe 100 PID 3488 wrote to memory of 2052 3488 647d1fef53a2ebd44f8066a070dca4f38ffe8cb3759c2088dbee8dfd551bac08.exe 100 PID 3488 wrote to memory of 2052 3488 647d1fef53a2ebd44f8066a070dca4f38ffe8cb3759c2088dbee8dfd551bac08.exe 100 PID 3488 wrote to memory of 4428 3488 647d1fef53a2ebd44f8066a070dca4f38ffe8cb3759c2088dbee8dfd551bac08.exe 107 PID 3488 wrote to memory of 4428 3488 647d1fef53a2ebd44f8066a070dca4f38ffe8cb3759c2088dbee8dfd551bac08.exe 107 PID 3488 wrote to memory of 4428 3488 647d1fef53a2ebd44f8066a070dca4f38ffe8cb3759c2088dbee8dfd551bac08.exe 107 PID 4428 wrote to memory of 3688 4428 cmd.exe 109 PID 4428 wrote to memory of 3688 4428 cmd.exe 109 PID 4428 wrote to memory of 3688 4428 cmd.exe 109 PID 3488 wrote to memory of 2792 3488 647d1fef53a2ebd44f8066a070dca4f38ffe8cb3759c2088dbee8dfd551bac08.exe 110 PID 3488 wrote to memory of 2792 3488 647d1fef53a2ebd44f8066a070dca4f38ffe8cb3759c2088dbee8dfd551bac08.exe 110 PID 3488 wrote to memory of 2792 3488 647d1fef53a2ebd44f8066a070dca4f38ffe8cb3759c2088dbee8dfd551bac08.exe 110 PID 2792 wrote to memory of 3084 2792 cmd.exe 112 PID 2792 wrote to memory of 3084 2792 cmd.exe 112 PID 2792 wrote to memory of 3084 2792 cmd.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\647d1fef53a2ebd44f8066a070dca4f38ffe8cb3759c2088dbee8dfd551bac08.exe"C:\Users\Admin\AppData\Local\Temp\647d1fef53a2ebd44f8066a070dca4f38ffe8cb3759c2088dbee8dfd551bac08.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 5362⤵
- Program crash
PID:2164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 5402⤵
- Program crash
PID:3132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 5402⤵
- Program crash
PID:4792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 6122⤵
- Program crash
PID:2624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 7922⤵
- Program crash
PID:1732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 8122⤵
- Program crash
PID:4660
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 13042⤵
- Program crash
PID:3208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 12922⤵
- Program crash
PID:1268
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3688
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:3084
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 1402⤵
- Program crash
PID:2408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3488 -ip 34881⤵PID:5008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3488 -ip 34881⤵PID:2508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3488 -ip 34881⤵PID:428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3488 -ip 34881⤵PID:3640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3488 -ip 34881⤵PID:1248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3488 -ip 34881⤵PID:3108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3488 -ip 34881⤵PID:808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3488 -ip 34881⤵PID:1668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3488 -ip 34881⤵PID:4624
Network
-
Remote address:8.8.8.8:53Requestget.geojs.ioIN AResponseget.geojs.ioIN A172.67.70.233get.geojs.ioIN A104.26.1.100get.geojs.ioIN A104.26.0.100
-
322 B 7
-
322 B 7
-
868.7kB 10.5kB 587 262
-
172.67.70.233:443get.geojs.iotls647d1fef53a2ebd44f8066a070dca4f38ffe8cb3759c2088dbee8dfd551bac08.exe1.1kB 4.4kB 12 13