Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
53s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
07/10/2022, 03:35
Static task
static1
General
-
Target
0970780e105c1aae8ea697381409d51c9b25c6447aad7e14a4d4e899290ebebf.exe
-
Size
4.8MB
-
MD5
c10a8aba397a07fb19f1140b63f2da91
-
SHA1
a73fa0ed35b5165283557575d30e6190a5f19f6d
-
SHA256
0970780e105c1aae8ea697381409d51c9b25c6447aad7e14a4d4e899290ebebf
-
SHA512
f19f0281559eabdc9a7bc647dbe1f759bfcf540fb8cddb06cb5233c0bb452903aca0ea2bdf81f05bc824893777fb90b6809a605ed539a83daf24d483f0f5f9cf
-
SSDEEP
98304:F6aKpKO+6PbFmS3VjVEOeTtJaAbLECnrZXJT7W:FibFmS3VjVEOeTtJHbdnrz7
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 10 IoCs
pid pid_target Process procid_target 3428 4328 WerFault.exe 65 3728 4328 WerFault.exe 65 1544 4328 WerFault.exe 65 4268 4328 WerFault.exe 65 4628 4328 WerFault.exe 65 2900 4328 WerFault.exe 65 2752 4328 WerFault.exe 65 4548 4328 WerFault.exe 65 5104 4328 WerFault.exe 65 192 4328 WerFault.exe 65 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3376 wmic.exe Token: SeSecurityPrivilege 3376 wmic.exe Token: SeTakeOwnershipPrivilege 3376 wmic.exe Token: SeLoadDriverPrivilege 3376 wmic.exe Token: SeSystemProfilePrivilege 3376 wmic.exe Token: SeSystemtimePrivilege 3376 wmic.exe Token: SeProfSingleProcessPrivilege 3376 wmic.exe Token: SeIncBasePriorityPrivilege 3376 wmic.exe Token: SeCreatePagefilePrivilege 3376 wmic.exe Token: SeBackupPrivilege 3376 wmic.exe Token: SeRestorePrivilege 3376 wmic.exe Token: SeShutdownPrivilege 3376 wmic.exe Token: SeDebugPrivilege 3376 wmic.exe Token: SeSystemEnvironmentPrivilege 3376 wmic.exe Token: SeRemoteShutdownPrivilege 3376 wmic.exe Token: SeUndockPrivilege 3376 wmic.exe Token: SeManageVolumePrivilege 3376 wmic.exe Token: 33 3376 wmic.exe Token: 34 3376 wmic.exe Token: 35 3376 wmic.exe Token: 36 3376 wmic.exe Token: SeIncreaseQuotaPrivilege 3376 wmic.exe Token: SeSecurityPrivilege 3376 wmic.exe Token: SeTakeOwnershipPrivilege 3376 wmic.exe Token: SeLoadDriverPrivilege 3376 wmic.exe Token: SeSystemProfilePrivilege 3376 wmic.exe Token: SeSystemtimePrivilege 3376 wmic.exe Token: SeProfSingleProcessPrivilege 3376 wmic.exe Token: SeIncBasePriorityPrivilege 3376 wmic.exe Token: SeCreatePagefilePrivilege 3376 wmic.exe Token: SeBackupPrivilege 3376 wmic.exe Token: SeRestorePrivilege 3376 wmic.exe Token: SeShutdownPrivilege 3376 wmic.exe Token: SeDebugPrivilege 3376 wmic.exe Token: SeSystemEnvironmentPrivilege 3376 wmic.exe Token: SeRemoteShutdownPrivilege 3376 wmic.exe Token: SeUndockPrivilege 3376 wmic.exe Token: SeManageVolumePrivilege 3376 wmic.exe Token: 33 3376 wmic.exe Token: 34 3376 wmic.exe Token: 35 3376 wmic.exe Token: 36 3376 wmic.exe Token: SeIncreaseQuotaPrivilege 500 WMIC.exe Token: SeSecurityPrivilege 500 WMIC.exe Token: SeTakeOwnershipPrivilege 500 WMIC.exe Token: SeLoadDriverPrivilege 500 WMIC.exe Token: SeSystemProfilePrivilege 500 WMIC.exe Token: SeSystemtimePrivilege 500 WMIC.exe Token: SeProfSingleProcessPrivilege 500 WMIC.exe Token: SeIncBasePriorityPrivilege 500 WMIC.exe Token: SeCreatePagefilePrivilege 500 WMIC.exe Token: SeBackupPrivilege 500 WMIC.exe Token: SeRestorePrivilege 500 WMIC.exe Token: SeShutdownPrivilege 500 WMIC.exe Token: SeDebugPrivilege 500 WMIC.exe Token: SeSystemEnvironmentPrivilege 500 WMIC.exe Token: SeRemoteShutdownPrivilege 500 WMIC.exe Token: SeUndockPrivilege 500 WMIC.exe Token: SeManageVolumePrivilege 500 WMIC.exe Token: 33 500 WMIC.exe Token: 34 500 WMIC.exe Token: 35 500 WMIC.exe Token: 36 500 WMIC.exe Token: SeIncreaseQuotaPrivilege 500 WMIC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4328 wrote to memory of 3376 4328 0970780e105c1aae8ea697381409d51c9b25c6447aad7e14a4d4e899290ebebf.exe 73 PID 4328 wrote to memory of 3376 4328 0970780e105c1aae8ea697381409d51c9b25c6447aad7e14a4d4e899290ebebf.exe 73 PID 4328 wrote to memory of 3376 4328 0970780e105c1aae8ea697381409d51c9b25c6447aad7e14a4d4e899290ebebf.exe 73 PID 4328 wrote to memory of 2724 4328 0970780e105c1aae8ea697381409d51c9b25c6447aad7e14a4d4e899290ebebf.exe 78 PID 4328 wrote to memory of 2724 4328 0970780e105c1aae8ea697381409d51c9b25c6447aad7e14a4d4e899290ebebf.exe 78 PID 4328 wrote to memory of 2724 4328 0970780e105c1aae8ea697381409d51c9b25c6447aad7e14a4d4e899290ebebf.exe 78 PID 2724 wrote to memory of 500 2724 cmd.exe 81 PID 2724 wrote to memory of 500 2724 cmd.exe 81 PID 2724 wrote to memory of 500 2724 cmd.exe 81 PID 4328 wrote to memory of 4996 4328 0970780e105c1aae8ea697381409d51c9b25c6447aad7e14a4d4e899290ebebf.exe 82 PID 4328 wrote to memory of 4996 4328 0970780e105c1aae8ea697381409d51c9b25c6447aad7e14a4d4e899290ebebf.exe 82 PID 4328 wrote to memory of 4996 4328 0970780e105c1aae8ea697381409d51c9b25c6447aad7e14a4d4e899290ebebf.exe 82 PID 4996 wrote to memory of 892 4996 cmd.exe 84 PID 4996 wrote to memory of 892 4996 cmd.exe 84 PID 4996 wrote to memory of 892 4996 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\0970780e105c1aae8ea697381409d51c9b25c6447aad7e14a4d4e899290ebebf.exe"C:\Users\Admin\AppData\Local\Temp\0970780e105c1aae8ea697381409d51c9b25c6447aad7e14a4d4e899290ebebf.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 5442⤵
- Program crash
PID:3428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 5762⤵
- Program crash
PID:3728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 5162⤵
- Program crash
PID:1544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 6402⤵
- Program crash
PID:4268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 7482⤵
- Program crash
PID:4628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 8802⤵
- Program crash
PID:2900
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 13282⤵
- Program crash
PID:2752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 13762⤵
- Program crash
PID:4548
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:500
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 13922⤵
- Program crash
PID:5104
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:892
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 3122⤵
- Program crash
PID:192
-