Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
57s -
max time network
145s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
10/10/2022, 03:10
Static task
static1
General
-
Target
e2e3dc01e73cb2633905f26baf6d86f826033a2b085c4380b0034a14eec130af.exe
-
Size
5.3MB
-
MD5
24b34bfe59a97dea9850d39005a9b635
-
SHA1
6e19d47f444eaef2b117d57232753757466784d4
-
SHA256
e2e3dc01e73cb2633905f26baf6d86f826033a2b085c4380b0034a14eec130af
-
SHA512
914ba8a794d664d6ed432f1b933294d4457b6459cd224b0ad46d0bdf0754ab00cdcc18509654265ceb6f4a170f2657ede81453f1a61a279584277f4427d4aa66
-
SSDEEP
98304:ByIwfYjsOpKO+6PbFmS3VjVEOeTtJaAbLECnrZXJT7W:BaEsUbFmS3VjVEOeTtJHbdnrz7
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 10 IoCs
pid pid_target Process procid_target 352 388 WerFault.exe 65 4656 388 WerFault.exe 65 4720 388 WerFault.exe 65 4988 388 WerFault.exe 65 5084 388 WerFault.exe 65 4876 388 WerFault.exe 65 1796 388 WerFault.exe 65 4672 388 WerFault.exe 65 3952 388 WerFault.exe 65 3864 388 WerFault.exe 65 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2416 wmic.exe Token: SeSecurityPrivilege 2416 wmic.exe Token: SeTakeOwnershipPrivilege 2416 wmic.exe Token: SeLoadDriverPrivilege 2416 wmic.exe Token: SeSystemProfilePrivilege 2416 wmic.exe Token: SeSystemtimePrivilege 2416 wmic.exe Token: SeProfSingleProcessPrivilege 2416 wmic.exe Token: SeIncBasePriorityPrivilege 2416 wmic.exe Token: SeCreatePagefilePrivilege 2416 wmic.exe Token: SeBackupPrivilege 2416 wmic.exe Token: SeRestorePrivilege 2416 wmic.exe Token: SeShutdownPrivilege 2416 wmic.exe Token: SeDebugPrivilege 2416 wmic.exe Token: SeSystemEnvironmentPrivilege 2416 wmic.exe Token: SeRemoteShutdownPrivilege 2416 wmic.exe Token: SeUndockPrivilege 2416 wmic.exe Token: SeManageVolumePrivilege 2416 wmic.exe Token: 33 2416 wmic.exe Token: 34 2416 wmic.exe Token: 35 2416 wmic.exe Token: 36 2416 wmic.exe Token: SeIncreaseQuotaPrivilege 2416 wmic.exe Token: SeSecurityPrivilege 2416 wmic.exe Token: SeTakeOwnershipPrivilege 2416 wmic.exe Token: SeLoadDriverPrivilege 2416 wmic.exe Token: SeSystemProfilePrivilege 2416 wmic.exe Token: SeSystemtimePrivilege 2416 wmic.exe Token: SeProfSingleProcessPrivilege 2416 wmic.exe Token: SeIncBasePriorityPrivilege 2416 wmic.exe Token: SeCreatePagefilePrivilege 2416 wmic.exe Token: SeBackupPrivilege 2416 wmic.exe Token: SeRestorePrivilege 2416 wmic.exe Token: SeShutdownPrivilege 2416 wmic.exe Token: SeDebugPrivilege 2416 wmic.exe Token: SeSystemEnvironmentPrivilege 2416 wmic.exe Token: SeRemoteShutdownPrivilege 2416 wmic.exe Token: SeUndockPrivilege 2416 wmic.exe Token: SeManageVolumePrivilege 2416 wmic.exe Token: 33 2416 wmic.exe Token: 34 2416 wmic.exe Token: 35 2416 wmic.exe Token: 36 2416 wmic.exe Token: SeIncreaseQuotaPrivilege 4068 WMIC.exe Token: SeSecurityPrivilege 4068 WMIC.exe Token: SeTakeOwnershipPrivilege 4068 WMIC.exe Token: SeLoadDriverPrivilege 4068 WMIC.exe Token: SeSystemProfilePrivilege 4068 WMIC.exe Token: SeSystemtimePrivilege 4068 WMIC.exe Token: SeProfSingleProcessPrivilege 4068 WMIC.exe Token: SeIncBasePriorityPrivilege 4068 WMIC.exe Token: SeCreatePagefilePrivilege 4068 WMIC.exe Token: SeBackupPrivilege 4068 WMIC.exe Token: SeRestorePrivilege 4068 WMIC.exe Token: SeShutdownPrivilege 4068 WMIC.exe Token: SeDebugPrivilege 4068 WMIC.exe Token: SeSystemEnvironmentPrivilege 4068 WMIC.exe Token: SeRemoteShutdownPrivilege 4068 WMIC.exe Token: SeUndockPrivilege 4068 WMIC.exe Token: SeManageVolumePrivilege 4068 WMIC.exe Token: 33 4068 WMIC.exe Token: 34 4068 WMIC.exe Token: 35 4068 WMIC.exe Token: 36 4068 WMIC.exe Token: SeIncreaseQuotaPrivilege 4068 WMIC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 388 wrote to memory of 2416 388 e2e3dc01e73cb2633905f26baf6d86f826033a2b085c4380b0034a14eec130af.exe 73 PID 388 wrote to memory of 2416 388 e2e3dc01e73cb2633905f26baf6d86f826033a2b085c4380b0034a14eec130af.exe 73 PID 388 wrote to memory of 2416 388 e2e3dc01e73cb2633905f26baf6d86f826033a2b085c4380b0034a14eec130af.exe 73 PID 388 wrote to memory of 4264 388 e2e3dc01e73cb2633905f26baf6d86f826033a2b085c4380b0034a14eec130af.exe 78 PID 388 wrote to memory of 4264 388 e2e3dc01e73cb2633905f26baf6d86f826033a2b085c4380b0034a14eec130af.exe 78 PID 388 wrote to memory of 4264 388 e2e3dc01e73cb2633905f26baf6d86f826033a2b085c4380b0034a14eec130af.exe 78 PID 4264 wrote to memory of 4068 4264 cmd.exe 81 PID 4264 wrote to memory of 4068 4264 cmd.exe 81 PID 4264 wrote to memory of 4068 4264 cmd.exe 81 PID 388 wrote to memory of 4380 388 e2e3dc01e73cb2633905f26baf6d86f826033a2b085c4380b0034a14eec130af.exe 82 PID 388 wrote to memory of 4380 388 e2e3dc01e73cb2633905f26baf6d86f826033a2b085c4380b0034a14eec130af.exe 82 PID 388 wrote to memory of 4380 388 e2e3dc01e73cb2633905f26baf6d86f826033a2b085c4380b0034a14eec130af.exe 82 PID 4380 wrote to memory of 4316 4380 cmd.exe 84 PID 4380 wrote to memory of 4316 4380 cmd.exe 84 PID 4380 wrote to memory of 4316 4380 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2e3dc01e73cb2633905f26baf6d86f826033a2b085c4380b0034a14eec130af.exe"C:\Users\Admin\AppData\Local\Temp\e2e3dc01e73cb2633905f26baf6d86f826033a2b085c4380b0034a14eec130af.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 5442⤵
- Program crash
PID:352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 5242⤵
- Program crash
PID:4656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 5922⤵
- Program crash
PID:4720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 6402⤵
- Program crash
PID:4988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 7482⤵
- Program crash
PID:5084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 8802⤵
- Program crash
PID:4876
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 13282⤵
- Program crash
PID:1796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 13442⤵
- Program crash
PID:4672
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4068
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 13962⤵
- Program crash
PID:3952
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:4316
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 3122⤵
- Program crash
PID:3864
-