Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
50s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
18/10/2022, 01:20
Static task
static1
General
-
Target
78ee9bc942de8fd1d99e764265b3af6011f80f28bc2b20951d56513d9f318267.exe
-
Size
6.3MB
-
MD5
311c52a9229aac878706a5b00b12a39b
-
SHA1
c4fc771e3dc0aff7a02b8ff99755a5c753d93060
-
SHA256
78ee9bc942de8fd1d99e764265b3af6011f80f28bc2b20951d56513d9f318267
-
SHA512
cf969d02eb09e53aff95d5ace274c7f2f1a1ba37270a5ea9791164062549003a9cc84f1ec5cb097336c1b3be77868ef961a234d2b17a8d17d4854b89261b9a07
-
SSDEEP
49152:bkmZbQsxBXQbKXmuCFe6iRyhJ3jkqQVSfWVXqASv1x1dKO/5t7WGiocfGJDcjQcr:bkcbf6bKXlSjL+EnHOMz5ysZA5+bf6c
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Program crash 10 IoCs
pid pid_target Process procid_target 4872 2196 WerFault.exe 65 4892 2196 WerFault.exe 65 4112 2196 WerFault.exe 65 3268 2196 WerFault.exe 65 4320 2196 WerFault.exe 65 4372 2196 WerFault.exe 65 5088 2196 WerFault.exe 65 2744 2196 WerFault.exe 65 3764 2196 WerFault.exe 65 96 2196 WerFault.exe 65 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4500 wmic.exe Token: SeSecurityPrivilege 4500 wmic.exe Token: SeTakeOwnershipPrivilege 4500 wmic.exe Token: SeLoadDriverPrivilege 4500 wmic.exe Token: SeSystemProfilePrivilege 4500 wmic.exe Token: SeSystemtimePrivilege 4500 wmic.exe Token: SeProfSingleProcessPrivilege 4500 wmic.exe Token: SeIncBasePriorityPrivilege 4500 wmic.exe Token: SeCreatePagefilePrivilege 4500 wmic.exe Token: SeBackupPrivilege 4500 wmic.exe Token: SeRestorePrivilege 4500 wmic.exe Token: SeShutdownPrivilege 4500 wmic.exe Token: SeDebugPrivilege 4500 wmic.exe Token: SeSystemEnvironmentPrivilege 4500 wmic.exe Token: SeRemoteShutdownPrivilege 4500 wmic.exe Token: SeUndockPrivilege 4500 wmic.exe Token: SeManageVolumePrivilege 4500 wmic.exe Token: 33 4500 wmic.exe Token: 34 4500 wmic.exe Token: 35 4500 wmic.exe Token: 36 4500 wmic.exe Token: SeIncreaseQuotaPrivilege 4500 wmic.exe Token: SeSecurityPrivilege 4500 wmic.exe Token: SeTakeOwnershipPrivilege 4500 wmic.exe Token: SeLoadDriverPrivilege 4500 wmic.exe Token: SeSystemProfilePrivilege 4500 wmic.exe Token: SeSystemtimePrivilege 4500 wmic.exe Token: SeProfSingleProcessPrivilege 4500 wmic.exe Token: SeIncBasePriorityPrivilege 4500 wmic.exe Token: SeCreatePagefilePrivilege 4500 wmic.exe Token: SeBackupPrivilege 4500 wmic.exe Token: SeRestorePrivilege 4500 wmic.exe Token: SeShutdownPrivilege 4500 wmic.exe Token: SeDebugPrivilege 4500 wmic.exe Token: SeSystemEnvironmentPrivilege 4500 wmic.exe Token: SeRemoteShutdownPrivilege 4500 wmic.exe Token: SeUndockPrivilege 4500 wmic.exe Token: SeManageVolumePrivilege 4500 wmic.exe Token: 33 4500 wmic.exe Token: 34 4500 wmic.exe Token: 35 4500 wmic.exe Token: 36 4500 wmic.exe Token: SeIncreaseQuotaPrivilege 4568 WMIC.exe Token: SeSecurityPrivilege 4568 WMIC.exe Token: SeTakeOwnershipPrivilege 4568 WMIC.exe Token: SeLoadDriverPrivilege 4568 WMIC.exe Token: SeSystemProfilePrivilege 4568 WMIC.exe Token: SeSystemtimePrivilege 4568 WMIC.exe Token: SeProfSingleProcessPrivilege 4568 WMIC.exe Token: SeIncBasePriorityPrivilege 4568 WMIC.exe Token: SeCreatePagefilePrivilege 4568 WMIC.exe Token: SeBackupPrivilege 4568 WMIC.exe Token: SeRestorePrivilege 4568 WMIC.exe Token: SeShutdownPrivilege 4568 WMIC.exe Token: SeDebugPrivilege 4568 WMIC.exe Token: SeSystemEnvironmentPrivilege 4568 WMIC.exe Token: SeRemoteShutdownPrivilege 4568 WMIC.exe Token: SeUndockPrivilege 4568 WMIC.exe Token: SeManageVolumePrivilege 4568 WMIC.exe Token: 33 4568 WMIC.exe Token: 34 4568 WMIC.exe Token: 35 4568 WMIC.exe Token: 36 4568 WMIC.exe Token: SeIncreaseQuotaPrivilege 4568 WMIC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2196 wrote to memory of 4500 2196 78ee9bc942de8fd1d99e764265b3af6011f80f28bc2b20951d56513d9f318267.exe 73 PID 2196 wrote to memory of 4500 2196 78ee9bc942de8fd1d99e764265b3af6011f80f28bc2b20951d56513d9f318267.exe 73 PID 2196 wrote to memory of 4500 2196 78ee9bc942de8fd1d99e764265b3af6011f80f28bc2b20951d56513d9f318267.exe 73 PID 2196 wrote to memory of 3928 2196 78ee9bc942de8fd1d99e764265b3af6011f80f28bc2b20951d56513d9f318267.exe 79 PID 2196 wrote to memory of 3928 2196 78ee9bc942de8fd1d99e764265b3af6011f80f28bc2b20951d56513d9f318267.exe 79 PID 2196 wrote to memory of 3928 2196 78ee9bc942de8fd1d99e764265b3af6011f80f28bc2b20951d56513d9f318267.exe 79 PID 3928 wrote to memory of 4568 3928 cmd.exe 81 PID 3928 wrote to memory of 4568 3928 cmd.exe 81 PID 3928 wrote to memory of 4568 3928 cmd.exe 81 PID 2196 wrote to memory of 4728 2196 78ee9bc942de8fd1d99e764265b3af6011f80f28bc2b20951d56513d9f318267.exe 82 PID 2196 wrote to memory of 4728 2196 78ee9bc942de8fd1d99e764265b3af6011f80f28bc2b20951d56513d9f318267.exe 82 PID 2196 wrote to memory of 4728 2196 78ee9bc942de8fd1d99e764265b3af6011f80f28bc2b20951d56513d9f318267.exe 82 PID 4728 wrote to memory of 4684 4728 cmd.exe 84 PID 4728 wrote to memory of 4684 4728 cmd.exe 84 PID 4728 wrote to memory of 4684 4728 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\78ee9bc942de8fd1d99e764265b3af6011f80f28bc2b20951d56513d9f318267.exe"C:\Users\Admin\AppData\Local\Temp\78ee9bc942de8fd1d99e764265b3af6011f80f28bc2b20951d56513d9f318267.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 5442⤵
- Program crash
PID:4872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 5242⤵
- Program crash
PID:4892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 5882⤵
- Program crash
PID:4112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 6442⤵
- Program crash
PID:3268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 6122⤵
- Program crash
PID:4320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 8882⤵
- Program crash
PID:4372
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 13402⤵
- Program crash
PID:5088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 13882⤵
- Program crash
PID:2744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 14042⤵
- Program crash
PID:3764
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:4684
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 3122⤵
- Program crash
PID:96
-