Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    131s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18/04/2023, 14:46

General

  • Target

    5296f60cd4696a1b74d252fe6f0e1055042caa8bfc4f27c0133c2ec2834793a3.exe

  • Size

    939KB

  • MD5

    d5750ce2f6d4ca98b59b2aa17b0068a8

  • SHA1

    45eefe4ef836e5234b1559891bfa0978c68a11d8

  • SHA256

    5296f60cd4696a1b74d252fe6f0e1055042caa8bfc4f27c0133c2ec2834793a3

  • SHA512

    eca3783da2730b3b6126488f5d44bc844782217223648123bab830496c06527ef03425bdd6764d8810702e70e109670047fa9d250a42e43694633961aad51248

  • SSDEEP

    24576:4ycclQthND3pFYIS6KfZkPLaFdXjPP/3yNYpZ:/ohd5Kh6KxkjaFdXjPn

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5296f60cd4696a1b74d252fe6f0e1055042caa8bfc4f27c0133c2ec2834793a3.exe
    "C:\Users\Admin\AppData\Local\Temp\5296f60cd4696a1b74d252fe6f0e1055042caa8bfc4f27c0133c2ec2834793a3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1560
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYe2860.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYe2860.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziUv9567.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziUv9567.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2456
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it100129.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it100129.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2736
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr468069.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr468069.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4988
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp511093.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp511093.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2852
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr220354.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr220354.exe
      2⤵
      • Executes dropped EXE
      PID:1628
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 616
        3⤵
        • Program crash
        PID:2392
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 696
        3⤵
        • Program crash
        PID:2724
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 836
        3⤵
        • Program crash
        PID:3096
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 824
        3⤵
        • Program crash
        PID:2784
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 872
        3⤵
        • Program crash
        PID:5092
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 816
        3⤵
        • Program crash
        PID:2256
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 1068
        3⤵
        • Program crash
        PID:4440

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr220354.exe

    Filesize

    382KB

    MD5

    3e530e673db591c189b1cd85031e348d

    SHA1

    43785739a819c9b94e6e24efbbe1203215e0dbb0

    SHA256

    3800ba8e047a5fe5641f3c4c6a6a8fd576397c161a71de06f553988d03a64501

    SHA512

    5a19bc57a003e73314a3d5a8756cce5799ef227c563ac05eee5fff0dc2d124918add91a0aadf168c49d8eddb48a75544db14a7071ed4fe0978e23ea714dd0d0b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr220354.exe

    Filesize

    382KB

    MD5

    3e530e673db591c189b1cd85031e348d

    SHA1

    43785739a819c9b94e6e24efbbe1203215e0dbb0

    SHA256

    3800ba8e047a5fe5641f3c4c6a6a8fd576397c161a71de06f553988d03a64501

    SHA512

    5a19bc57a003e73314a3d5a8756cce5799ef227c563ac05eee5fff0dc2d124918add91a0aadf168c49d8eddb48a75544db14a7071ed4fe0978e23ea714dd0d0b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYe2860.exe

    Filesize

    624KB

    MD5

    ed5492102471c5f86fb6096d0da96d1d

    SHA1

    8cfea869bd7bbe49e7c9f6100a612ce49aba57de

    SHA256

    d5603fa3c2745f7a69e6e360bd8c8341097f8289f5cd21a020afcfe01e9db081

    SHA512

    eb45114e9c94b5debe542690f8cd231989a8e7cf78d981aa7cf0f5585840dd77e0a82f5de7180018cd634655b6814b1d7e348cbd3bde09b0667de25024e15b3c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYe2860.exe

    Filesize

    624KB

    MD5

    ed5492102471c5f86fb6096d0da96d1d

    SHA1

    8cfea869bd7bbe49e7c9f6100a612ce49aba57de

    SHA256

    d5603fa3c2745f7a69e6e360bd8c8341097f8289f5cd21a020afcfe01e9db081

    SHA512

    eb45114e9c94b5debe542690f8cd231989a8e7cf78d981aa7cf0f5585840dd77e0a82f5de7180018cd634655b6814b1d7e348cbd3bde09b0667de25024e15b3c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp511093.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp511093.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziUv9567.exe

    Filesize

    470KB

    MD5

    eb706b26da4c2f3e586ae42b496c8073

    SHA1

    8079c63e65d38b10ce8804b81029e2968b0f15ee

    SHA256

    4eeb95c4cbecfda742b05362aa5b3ead429645ec5cd73ae26af53e3a3f0bfebd

    SHA512

    45014144cef7870912aaaedb666d5976b4a7544d6f84e0e7f4f09df4695067839f2bc3b8b1aac14014321c19d0f45d0bb7705b16c36ef00bc469594070d39a1f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziUv9567.exe

    Filesize

    470KB

    MD5

    eb706b26da4c2f3e586ae42b496c8073

    SHA1

    8079c63e65d38b10ce8804b81029e2968b0f15ee

    SHA256

    4eeb95c4cbecfda742b05362aa5b3ead429645ec5cd73ae26af53e3a3f0bfebd

    SHA512

    45014144cef7870912aaaedb666d5976b4a7544d6f84e0e7f4f09df4695067839f2bc3b8b1aac14014321c19d0f45d0bb7705b16c36ef00bc469594070d39a1f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it100129.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it100129.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr468069.exe

    Filesize

    486KB

    MD5

    2527d47d78c46e42e2ec925c455cafc7

    SHA1

    2952abf9bdddac8fb6bf258bf0731442a4318c5a

    SHA256

    cc1d04aacf5cc0f260bbda5c8fd4d55b0261814a3a7891deb82f8851bf13f0a7

    SHA512

    a61615893d4c914596cd12fed4e2aa86b3fa010fe0975066d0dfb54d14abf466a9e124b8c3eda804882e18524301b41db088ec833e3fda2642ee43b855304e49

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr468069.exe

    Filesize

    486KB

    MD5

    2527d47d78c46e42e2ec925c455cafc7

    SHA1

    2952abf9bdddac8fb6bf258bf0731442a4318c5a

    SHA256

    cc1d04aacf5cc0f260bbda5c8fd4d55b0261814a3a7891deb82f8851bf13f0a7

    SHA512

    a61615893d4c914596cd12fed4e2aa86b3fa010fe0975066d0dfb54d14abf466a9e124b8c3eda804882e18524301b41db088ec833e3fda2642ee43b855304e49

  • memory/1628-973-0x0000000000810000-0x0000000000845000-memory.dmp

    Filesize

    212KB

  • memory/2736-142-0x0000000000690000-0x000000000069A000-memory.dmp

    Filesize

    40KB

  • memory/2852-965-0x0000000000B30000-0x0000000000B58000-memory.dmp

    Filesize

    160KB

  • memory/2852-966-0x00000000078D0000-0x000000000791B000-memory.dmp

    Filesize

    300KB

  • memory/2852-967-0x0000000007880000-0x0000000007890000-memory.dmp

    Filesize

    64KB

  • memory/4988-183-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-199-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-154-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-155-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-157-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-159-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-161-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-163-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-165-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-167-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-169-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-171-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-173-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-175-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-177-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-179-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-181-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-151-0x0000000005040000-0x0000000005050000-memory.dmp

    Filesize

    64KB

  • memory/4988-185-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-187-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-189-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-193-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-195-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-191-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-197-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-150-0x00000000008F0000-0x0000000000936000-memory.dmp

    Filesize

    280KB

  • memory/4988-201-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-203-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-205-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-207-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-209-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-211-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-213-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-215-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-217-0x0000000002880000-0x00000000028B5000-memory.dmp

    Filesize

    212KB

  • memory/4988-946-0x00000000078D0000-0x0000000007ED6000-memory.dmp

    Filesize

    6.0MB

  • memory/4988-947-0x0000000004FC0000-0x0000000004FD2000-memory.dmp

    Filesize

    72KB

  • memory/4988-948-0x0000000007EE0000-0x0000000007FEA000-memory.dmp

    Filesize

    1.0MB

  • memory/4988-949-0x0000000005000000-0x000000000503E000-memory.dmp

    Filesize

    248KB

  • memory/4988-950-0x0000000008030000-0x000000000807B000-memory.dmp

    Filesize

    300KB

  • memory/4988-951-0x0000000005040000-0x0000000005050000-memory.dmp

    Filesize

    64KB

  • memory/4988-952-0x00000000082C0000-0x0000000008326000-memory.dmp

    Filesize

    408KB

  • memory/4988-953-0x0000000008980000-0x0000000008A12000-memory.dmp

    Filesize

    584KB

  • memory/4988-954-0x0000000008A20000-0x0000000008A70000-memory.dmp

    Filesize

    320KB

  • memory/4988-152-0x0000000002880000-0x00000000028BA000-memory.dmp

    Filesize

    232KB

  • memory/4988-153-0x0000000005040000-0x0000000005050000-memory.dmp

    Filesize

    64KB

  • memory/4988-149-0x0000000005050000-0x000000000554E000-memory.dmp

    Filesize

    5.0MB

  • memory/4988-148-0x00000000026B0000-0x00000000026EC000-memory.dmp

    Filesize

    240KB

  • memory/4988-955-0x0000000008A90000-0x0000000008B06000-memory.dmp

    Filesize

    472KB

  • memory/4988-956-0x0000000008C40000-0x0000000008C5E000-memory.dmp

    Filesize

    120KB

  • memory/4988-957-0x0000000008CF0000-0x0000000008EB2000-memory.dmp

    Filesize

    1.8MB

  • memory/4988-958-0x0000000008ED0000-0x00000000093FC000-memory.dmp

    Filesize

    5.2MB