Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
16/04/2023, 17:13
Static task
static1
General
-
Target
f26c64f64ddc778dbb2a43610108900f160cb599b91a211c1c8105d4a7757493.exe
-
Size
951KB
-
MD5
b9e06bf0bb584793b841aff9a07d37f5
-
SHA1
51c9f7dbbc4135d85282b552a32d8b58cda52fa4
-
SHA256
f26c64f64ddc778dbb2a43610108900f160cb599b91a211c1c8105d4a7757493
-
SHA512
32a17b6da0e9236a031b488c8fd4b9628157e8188caf4fcf0251398477a8fb91e393351482445c02957c43e39b676f0ab4e54ae747c828ece4bb3c19358ad9c4
-
SSDEEP
24576:qyEK5xUIHq08B72S1vCbYQd+Dion8Lq0:xEK5bHlybqbYWGio8Lq
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it375259.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it375259.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it375259.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it375259.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it375259.exe -
Executes dropped EXE 6 IoCs
pid Process 4152 ziEk8846.exe 4312 zidp1028.exe 4888 it375259.exe 2108 jr941354.exe 4008 kp995797.exe 4140 lr496387.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it375259.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziEk8846.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziEk8846.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zidp1028.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zidp1028.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f26c64f64ddc778dbb2a43610108900f160cb599b91a211c1c8105d4a7757493.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f26c64f64ddc778dbb2a43610108900f160cb599b91a211c1c8105d4a7757493.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 7 IoCs
pid pid_target Process procid_target 4892 4140 WerFault.exe 72 4968 4140 WerFault.exe 72 1728 4140 WerFault.exe 72 3908 4140 WerFault.exe 72 4584 4140 WerFault.exe 72 4580 4140 WerFault.exe 72 4776 4140 WerFault.exe 72 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4888 it375259.exe 4888 it375259.exe 2108 jr941354.exe 2108 jr941354.exe 4008 kp995797.exe 4008 kp995797.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4888 it375259.exe Token: SeDebugPrivilege 2108 jr941354.exe Token: SeDebugPrivilege 4008 kp995797.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4108 wrote to memory of 4152 4108 f26c64f64ddc778dbb2a43610108900f160cb599b91a211c1c8105d4a7757493.exe 66 PID 4108 wrote to memory of 4152 4108 f26c64f64ddc778dbb2a43610108900f160cb599b91a211c1c8105d4a7757493.exe 66 PID 4108 wrote to memory of 4152 4108 f26c64f64ddc778dbb2a43610108900f160cb599b91a211c1c8105d4a7757493.exe 66 PID 4152 wrote to memory of 4312 4152 ziEk8846.exe 67 PID 4152 wrote to memory of 4312 4152 ziEk8846.exe 67 PID 4152 wrote to memory of 4312 4152 ziEk8846.exe 67 PID 4312 wrote to memory of 4888 4312 zidp1028.exe 68 PID 4312 wrote to memory of 4888 4312 zidp1028.exe 68 PID 4312 wrote to memory of 2108 4312 zidp1028.exe 69 PID 4312 wrote to memory of 2108 4312 zidp1028.exe 69 PID 4312 wrote to memory of 2108 4312 zidp1028.exe 69 PID 4152 wrote to memory of 4008 4152 ziEk8846.exe 71 PID 4152 wrote to memory of 4008 4152 ziEk8846.exe 71 PID 4152 wrote to memory of 4008 4152 ziEk8846.exe 71 PID 4108 wrote to memory of 4140 4108 f26c64f64ddc778dbb2a43610108900f160cb599b91a211c1c8105d4a7757493.exe 72 PID 4108 wrote to memory of 4140 4108 f26c64f64ddc778dbb2a43610108900f160cb599b91a211c1c8105d4a7757493.exe 72 PID 4108 wrote to memory of 4140 4108 f26c64f64ddc778dbb2a43610108900f160cb599b91a211c1c8105d4a7757493.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\f26c64f64ddc778dbb2a43610108900f160cb599b91a211c1c8105d4a7757493.exe"C:\Users\Admin\AppData\Local\Temp\f26c64f64ddc778dbb2a43610108900f160cb599b91a211c1c8105d4a7757493.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEk8846.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEk8846.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zidp1028.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zidp1028.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it375259.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it375259.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr941354.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr941354.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp995797.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp995797.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4008
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr496387.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr496387.exe2⤵
- Executes dropped EXE
PID:4140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 6243⤵
- Program crash
PID:4892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 6963⤵
- Program crash
PID:4968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 8363⤵
- Program crash
PID:1728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 8443⤵
- Program crash
PID:3908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 8723⤵
- Program crash
PID:4584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 8203⤵
- Program crash
PID:4580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 10723⤵
- Program crash
PID:4776
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD52ce731ee01438f3a48219650c44e831f
SHA195f1fb31df09382f8b2672efa535e891740b8834
SHA2569494331643cabbbf55faf10961461f3b0a313f7e1b717c5d61e7d462ece71952
SHA512dbdb771b8ea18b1eccc759615ba938b73fa87e9216481c0f4c68f663cb862236f3029d9713f3202ddd244d1bd8990be3a57667853fe3b9dff9c96a8f7fe0b173
-
Filesize
397KB
MD52ce731ee01438f3a48219650c44e831f
SHA195f1fb31df09382f8b2672efa535e891740b8834
SHA2569494331643cabbbf55faf10961461f3b0a313f7e1b717c5d61e7d462ece71952
SHA512dbdb771b8ea18b1eccc759615ba938b73fa87e9216481c0f4c68f663cb862236f3029d9713f3202ddd244d1bd8990be3a57667853fe3b9dff9c96a8f7fe0b173
-
Filesize
624KB
MD55f1b903404a3b254b2f52eb8e9833f7d
SHA1a68dcb63080f927200582a0356ff4afd4e431020
SHA256d4e9a7b39d6c7595e264d0422e12a950a705b03b0bcb885807161938430aab8a
SHA512766aa6fdcbe810f590b9c39047c24af50de27d4c357280dcf5ae452415e91781924b13c73602f82d65f87bc03aceb3affb5718380521a8ad6de8fd8380c74b97
-
Filesize
624KB
MD55f1b903404a3b254b2f52eb8e9833f7d
SHA1a68dcb63080f927200582a0356ff4afd4e431020
SHA256d4e9a7b39d6c7595e264d0422e12a950a705b03b0bcb885807161938430aab8a
SHA512766aa6fdcbe810f590b9c39047c24af50de27d4c357280dcf5ae452415e91781924b13c73602f82d65f87bc03aceb3affb5718380521a8ad6de8fd8380c74b97
-
Filesize
136KB
MD5359db2338ae0f977dcf10e90cf9816fb
SHA194126cb670e5f434e555c991c967e0ee98fae552
SHA2565f9eff953d7ca49f594a864517dfdf37950a41693e53b79aa3a5c396613031bc
SHA512d2202c1f9dfe7c18993b834f3ccb34e9436c4bf814aca1ed38941ad41a4cf8326dda767389a5e39e64de74aacf76845464fdee73b61a926a1622a33c87382dbc
-
Filesize
136KB
MD5359db2338ae0f977dcf10e90cf9816fb
SHA194126cb670e5f434e555c991c967e0ee98fae552
SHA2565f9eff953d7ca49f594a864517dfdf37950a41693e53b79aa3a5c396613031bc
SHA512d2202c1f9dfe7c18993b834f3ccb34e9436c4bf814aca1ed38941ad41a4cf8326dda767389a5e39e64de74aacf76845464fdee73b61a926a1622a33c87382dbc
-
Filesize
469KB
MD56f8e0138f0d28f3833611d339a8e4324
SHA1c204d40635808c4d265f85f1d6cf158d75522467
SHA2568837e259114a6f01c2d480694c9a6e36f1a43f3542cd8fa83d5a2e95ca528339
SHA512d492e3fdfc5b30e424978e5f8a65337013710f008452a822d24f485d6a4950724893799a7058eb41aa2f74af4e149dbca3a7b6f2ddc2f316762530bf386edf2b
-
Filesize
469KB
MD56f8e0138f0d28f3833611d339a8e4324
SHA1c204d40635808c4d265f85f1d6cf158d75522467
SHA2568837e259114a6f01c2d480694c9a6e36f1a43f3542cd8fa83d5a2e95ca528339
SHA512d492e3fdfc5b30e424978e5f8a65337013710f008452a822d24f485d6a4950724893799a7058eb41aa2f74af4e149dbca3a7b6f2ddc2f316762530bf386edf2b
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
488KB
MD55e26b0cf02d49d7be1c6da93caf32725
SHA10c435c14c8b84b4f7a8dc52e5a5b8faae830d90d
SHA256fe7a99dd1f465359fd6255b68801bb2a6aec341c5aa9f0a834ff89ffbe07925f
SHA512fc037bf661ce5fe1eb463dd9a3dfccced07ae706c02fdd25063920c6527be21f95b550f058a93e8882f5fb9caa838d8952da137615a70cd0e34953dea2b08fa5
-
Filesize
488KB
MD55e26b0cf02d49d7be1c6da93caf32725
SHA10c435c14c8b84b4f7a8dc52e5a5b8faae830d90d
SHA256fe7a99dd1f465359fd6255b68801bb2a6aec341c5aa9f0a834ff89ffbe07925f
SHA512fc037bf661ce5fe1eb463dd9a3dfccced07ae706c02fdd25063920c6527be21f95b550f058a93e8882f5fb9caa838d8952da137615a70cd0e34953dea2b08fa5