Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
49s -
max time network
57s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
15/10/2022, 16:32
Static task
static1
General
-
Target
5acdb82f3b2c97f084da766dc59bd0ed2ee8adafa01b5bac79a999e0c3dad123.exe
-
Size
5.8MB
-
MD5
8410dda4fde43f507c9f7b9f7b570c95
-
SHA1
409d2d804151f9fbae2ca8efdb40f745ef0f7199
-
SHA256
5acdb82f3b2c97f084da766dc59bd0ed2ee8adafa01b5bac79a999e0c3dad123
-
SHA512
c6496f1c5d1e804137ca2a779fb095061b9e72f21d5d9590696035d29ca2142447ddf21e2669bdfdf5b4bf4fc65d253cd9b0c45ac31c9419a8be67ff516c45d2
-
SSDEEP
49152:qnV9xa3Fe6iRyhJ3jkqQVSfWVXqASv1x1dKO/5t7WGiocfGJDcjQcy20RHrzKgiR:qnV9xhSjL+EnHOMz5ysZA5+bf6c
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 10 IoCs
pid pid_target Process procid_target 4420 2796 WerFault.exe 65 1332 2796 WerFault.exe 65 2196 2796 WerFault.exe 65 3788 2796 WerFault.exe 65 4424 2796 WerFault.exe 65 5064 2796 WerFault.exe 65 4240 2796 WerFault.exe 65 4272 2796 WerFault.exe 65 5084 2796 WerFault.exe 65 312 2796 WerFault.exe 65 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1296 wmic.exe Token: SeSecurityPrivilege 1296 wmic.exe Token: SeTakeOwnershipPrivilege 1296 wmic.exe Token: SeLoadDriverPrivilege 1296 wmic.exe Token: SeSystemProfilePrivilege 1296 wmic.exe Token: SeSystemtimePrivilege 1296 wmic.exe Token: SeProfSingleProcessPrivilege 1296 wmic.exe Token: SeIncBasePriorityPrivilege 1296 wmic.exe Token: SeCreatePagefilePrivilege 1296 wmic.exe Token: SeBackupPrivilege 1296 wmic.exe Token: SeRestorePrivilege 1296 wmic.exe Token: SeShutdownPrivilege 1296 wmic.exe Token: SeDebugPrivilege 1296 wmic.exe Token: SeSystemEnvironmentPrivilege 1296 wmic.exe Token: SeRemoteShutdownPrivilege 1296 wmic.exe Token: SeUndockPrivilege 1296 wmic.exe Token: SeManageVolumePrivilege 1296 wmic.exe Token: 33 1296 wmic.exe Token: 34 1296 wmic.exe Token: 35 1296 wmic.exe Token: 36 1296 wmic.exe Token: SeIncreaseQuotaPrivilege 1296 wmic.exe Token: SeSecurityPrivilege 1296 wmic.exe Token: SeTakeOwnershipPrivilege 1296 wmic.exe Token: SeLoadDriverPrivilege 1296 wmic.exe Token: SeSystemProfilePrivilege 1296 wmic.exe Token: SeSystemtimePrivilege 1296 wmic.exe Token: SeProfSingleProcessPrivilege 1296 wmic.exe Token: SeIncBasePriorityPrivilege 1296 wmic.exe Token: SeCreatePagefilePrivilege 1296 wmic.exe Token: SeBackupPrivilege 1296 wmic.exe Token: SeRestorePrivilege 1296 wmic.exe Token: SeShutdownPrivilege 1296 wmic.exe Token: SeDebugPrivilege 1296 wmic.exe Token: SeSystemEnvironmentPrivilege 1296 wmic.exe Token: SeRemoteShutdownPrivilege 1296 wmic.exe Token: SeUndockPrivilege 1296 wmic.exe Token: SeManageVolumePrivilege 1296 wmic.exe Token: 33 1296 wmic.exe Token: 34 1296 wmic.exe Token: 35 1296 wmic.exe Token: 36 1296 wmic.exe Token: SeIncreaseQuotaPrivilege 3204 WMIC.exe Token: SeSecurityPrivilege 3204 WMIC.exe Token: SeTakeOwnershipPrivilege 3204 WMIC.exe Token: SeLoadDriverPrivilege 3204 WMIC.exe Token: SeSystemProfilePrivilege 3204 WMIC.exe Token: SeSystemtimePrivilege 3204 WMIC.exe Token: SeProfSingleProcessPrivilege 3204 WMIC.exe Token: SeIncBasePriorityPrivilege 3204 WMIC.exe Token: SeCreatePagefilePrivilege 3204 WMIC.exe Token: SeBackupPrivilege 3204 WMIC.exe Token: SeRestorePrivilege 3204 WMIC.exe Token: SeShutdownPrivilege 3204 WMIC.exe Token: SeDebugPrivilege 3204 WMIC.exe Token: SeSystemEnvironmentPrivilege 3204 WMIC.exe Token: SeRemoteShutdownPrivilege 3204 WMIC.exe Token: SeUndockPrivilege 3204 WMIC.exe Token: SeManageVolumePrivilege 3204 WMIC.exe Token: 33 3204 WMIC.exe Token: 34 3204 WMIC.exe Token: 35 3204 WMIC.exe Token: 36 3204 WMIC.exe Token: SeIncreaseQuotaPrivilege 3204 WMIC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2796 wrote to memory of 1296 2796 5acdb82f3b2c97f084da766dc59bd0ed2ee8adafa01b5bac79a999e0c3dad123.exe 73 PID 2796 wrote to memory of 1296 2796 5acdb82f3b2c97f084da766dc59bd0ed2ee8adafa01b5bac79a999e0c3dad123.exe 73 PID 2796 wrote to memory of 1296 2796 5acdb82f3b2c97f084da766dc59bd0ed2ee8adafa01b5bac79a999e0c3dad123.exe 73 PID 2796 wrote to memory of 4028 2796 5acdb82f3b2c97f084da766dc59bd0ed2ee8adafa01b5bac79a999e0c3dad123.exe 78 PID 2796 wrote to memory of 4028 2796 5acdb82f3b2c97f084da766dc59bd0ed2ee8adafa01b5bac79a999e0c3dad123.exe 78 PID 2796 wrote to memory of 4028 2796 5acdb82f3b2c97f084da766dc59bd0ed2ee8adafa01b5bac79a999e0c3dad123.exe 78 PID 4028 wrote to memory of 3204 4028 cmd.exe 81 PID 4028 wrote to memory of 3204 4028 cmd.exe 81 PID 4028 wrote to memory of 3204 4028 cmd.exe 81 PID 2796 wrote to memory of 4840 2796 5acdb82f3b2c97f084da766dc59bd0ed2ee8adafa01b5bac79a999e0c3dad123.exe 82 PID 2796 wrote to memory of 4840 2796 5acdb82f3b2c97f084da766dc59bd0ed2ee8adafa01b5bac79a999e0c3dad123.exe 82 PID 2796 wrote to memory of 4840 2796 5acdb82f3b2c97f084da766dc59bd0ed2ee8adafa01b5bac79a999e0c3dad123.exe 82 PID 4840 wrote to memory of 4824 4840 cmd.exe 84 PID 4840 wrote to memory of 4824 4840 cmd.exe 84 PID 4840 wrote to memory of 4824 4840 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\5acdb82f3b2c97f084da766dc59bd0ed2ee8adafa01b5bac79a999e0c3dad123.exe"C:\Users\Admin\AppData\Local\Temp\5acdb82f3b2c97f084da766dc59bd0ed2ee8adafa01b5bac79a999e0c3dad123.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 5442⤵
- Program crash
PID:4420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 5202⤵
- Program crash
PID:1332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 5882⤵
- Program crash
PID:2196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 6402⤵
- Program crash
PID:3788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 7482⤵
- Program crash
PID:4424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 8802⤵
- Program crash
PID:5064
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 13322⤵
- Program crash
PID:4240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 13522⤵
- Program crash
PID:4272
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3204
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 14522⤵
- Program crash
PID:5084
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:4824
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 3202⤵
- Program crash
PID:312
-