Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2022, 19:31
Static task
static1
General
-
Target
94a7c90413c582871880588b2cb0ef7132c32950d6a3767a69be93b748af6547.exe
-
Size
4.8MB
-
MD5
28a4b256eb461df0d7ea3fe052efbbb8
-
SHA1
62d7e4bb583cbd71d072f9f9e921bf1adc9604ed
-
SHA256
94a7c90413c582871880588b2cb0ef7132c32950d6a3767a69be93b748af6547
-
SHA512
28c1c88844458bc961bb5a4309148a3a0dfff5014d39cc6dc5704689c2ee16a99900bd9dd25e18ee8b49093bf147059901160fadc192d2ffc6e793d393d66cbc
-
SSDEEP
98304:F6aWpKO+6PbFmS3VjVEOeTtJaAbLECnrZXJT7W:FebFmS3VjVEOeTtJHbdnrz7
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 9 IoCs
pid pid_target Process procid_target 364 2124 WerFault.exe 80 2676 2124 WerFault.exe 80 1960 2124 WerFault.exe 80 380 2124 WerFault.exe 80 212 2124 WerFault.exe 80 1436 2124 WerFault.exe 80 3800 2124 WerFault.exe 80 3968 2124 WerFault.exe 80 2620 2124 WerFault.exe 80 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4696 wmic.exe Token: SeSecurityPrivilege 4696 wmic.exe Token: SeTakeOwnershipPrivilege 4696 wmic.exe Token: SeLoadDriverPrivilege 4696 wmic.exe Token: SeSystemProfilePrivilege 4696 wmic.exe Token: SeSystemtimePrivilege 4696 wmic.exe Token: SeProfSingleProcessPrivilege 4696 wmic.exe Token: SeIncBasePriorityPrivilege 4696 wmic.exe Token: SeCreatePagefilePrivilege 4696 wmic.exe Token: SeBackupPrivilege 4696 wmic.exe Token: SeRestorePrivilege 4696 wmic.exe Token: SeShutdownPrivilege 4696 wmic.exe Token: SeDebugPrivilege 4696 wmic.exe Token: SeSystemEnvironmentPrivilege 4696 wmic.exe Token: SeRemoteShutdownPrivilege 4696 wmic.exe Token: SeUndockPrivilege 4696 wmic.exe Token: SeManageVolumePrivilege 4696 wmic.exe Token: 33 4696 wmic.exe Token: 34 4696 wmic.exe Token: 35 4696 wmic.exe Token: 36 4696 wmic.exe Token: SeIncreaseQuotaPrivilege 4696 wmic.exe Token: SeSecurityPrivilege 4696 wmic.exe Token: SeTakeOwnershipPrivilege 4696 wmic.exe Token: SeLoadDriverPrivilege 4696 wmic.exe Token: SeSystemProfilePrivilege 4696 wmic.exe Token: SeSystemtimePrivilege 4696 wmic.exe Token: SeProfSingleProcessPrivilege 4696 wmic.exe Token: SeIncBasePriorityPrivilege 4696 wmic.exe Token: SeCreatePagefilePrivilege 4696 wmic.exe Token: SeBackupPrivilege 4696 wmic.exe Token: SeRestorePrivilege 4696 wmic.exe Token: SeShutdownPrivilege 4696 wmic.exe Token: SeDebugPrivilege 4696 wmic.exe Token: SeSystemEnvironmentPrivilege 4696 wmic.exe Token: SeRemoteShutdownPrivilege 4696 wmic.exe Token: SeUndockPrivilege 4696 wmic.exe Token: SeManageVolumePrivilege 4696 wmic.exe Token: 33 4696 wmic.exe Token: 34 4696 wmic.exe Token: 35 4696 wmic.exe Token: 36 4696 wmic.exe Token: SeIncreaseQuotaPrivilege 4836 WMIC.exe Token: SeSecurityPrivilege 4836 WMIC.exe Token: SeTakeOwnershipPrivilege 4836 WMIC.exe Token: SeLoadDriverPrivilege 4836 WMIC.exe Token: SeSystemProfilePrivilege 4836 WMIC.exe Token: SeSystemtimePrivilege 4836 WMIC.exe Token: SeProfSingleProcessPrivilege 4836 WMIC.exe Token: SeIncBasePriorityPrivilege 4836 WMIC.exe Token: SeCreatePagefilePrivilege 4836 WMIC.exe Token: SeBackupPrivilege 4836 WMIC.exe Token: SeRestorePrivilege 4836 WMIC.exe Token: SeShutdownPrivilege 4836 WMIC.exe Token: SeDebugPrivilege 4836 WMIC.exe Token: SeSystemEnvironmentPrivilege 4836 WMIC.exe Token: SeRemoteShutdownPrivilege 4836 WMIC.exe Token: SeUndockPrivilege 4836 WMIC.exe Token: SeManageVolumePrivilege 4836 WMIC.exe Token: 33 4836 WMIC.exe Token: 34 4836 WMIC.exe Token: 35 4836 WMIC.exe Token: 36 4836 WMIC.exe Token: SeIncreaseQuotaPrivilege 4836 WMIC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2124 wrote to memory of 4696 2124 94a7c90413c582871880588b2cb0ef7132c32950d6a3767a69be93b748af6547.exe 100 PID 2124 wrote to memory of 4696 2124 94a7c90413c582871880588b2cb0ef7132c32950d6a3767a69be93b748af6547.exe 100 PID 2124 wrote to memory of 4696 2124 94a7c90413c582871880588b2cb0ef7132c32950d6a3767a69be93b748af6547.exe 100 PID 2124 wrote to memory of 1888 2124 94a7c90413c582871880588b2cb0ef7132c32950d6a3767a69be93b748af6547.exe 106 PID 2124 wrote to memory of 1888 2124 94a7c90413c582871880588b2cb0ef7132c32950d6a3767a69be93b748af6547.exe 106 PID 2124 wrote to memory of 1888 2124 94a7c90413c582871880588b2cb0ef7132c32950d6a3767a69be93b748af6547.exe 106 PID 1888 wrote to memory of 4836 1888 cmd.exe 108 PID 1888 wrote to memory of 4836 1888 cmd.exe 108 PID 1888 wrote to memory of 4836 1888 cmd.exe 108 PID 2124 wrote to memory of 4504 2124 94a7c90413c582871880588b2cb0ef7132c32950d6a3767a69be93b748af6547.exe 109 PID 2124 wrote to memory of 4504 2124 94a7c90413c582871880588b2cb0ef7132c32950d6a3767a69be93b748af6547.exe 109 PID 2124 wrote to memory of 4504 2124 94a7c90413c582871880588b2cb0ef7132c32950d6a3767a69be93b748af6547.exe 109 PID 4504 wrote to memory of 2560 4504 cmd.exe 111 PID 4504 wrote to memory of 2560 4504 cmd.exe 111 PID 4504 wrote to memory of 2560 4504 cmd.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\94a7c90413c582871880588b2cb0ef7132c32950d6a3767a69be93b748af6547.exe"C:\Users\Admin\AppData\Local\Temp\94a7c90413c582871880588b2cb0ef7132c32950d6a3767a69be93b748af6547.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 5602⤵
- Program crash
PID:364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 5842⤵
- Program crash
PID:2676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 6082⤵
- Program crash
PID:1960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 6482⤵
- Program crash
PID:380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 7922⤵
- Program crash
PID:212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 8762⤵
- Program crash
PID:1436
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 13202⤵
- Program crash
PID:3800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 13442⤵
- Program crash
PID:3968
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4836
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:2560
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 1402⤵
- Program crash
PID:2620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2124 -ip 21241⤵PID:1956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2124 -ip 21241⤵PID:2164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2124 -ip 21241⤵PID:3028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2124 -ip 21241⤵PID:3740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2124 -ip 21241⤵PID:32
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2124 -ip 21241⤵PID:2328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2124 -ip 21241⤵PID:5008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2124 -ip 21241⤵PID:3456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2124 -ip 21241⤵PID:3112