Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
131s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
18/04/2023, 14:46
Static task
static1
General
-
Target
5296f60cd4696a1b74d252fe6f0e1055042caa8bfc4f27c0133c2ec2834793a3.exe
-
Size
939KB
-
MD5
d5750ce2f6d4ca98b59b2aa17b0068a8
-
SHA1
45eefe4ef836e5234b1559891bfa0978c68a11d8
-
SHA256
5296f60cd4696a1b74d252fe6f0e1055042caa8bfc4f27c0133c2ec2834793a3
-
SHA512
eca3783da2730b3b6126488f5d44bc844782217223648123bab830496c06527ef03425bdd6764d8810702e70e109670047fa9d250a42e43694633961aad51248
-
SSDEEP
24576:4ycclQthND3pFYIS6KfZkPLaFdXjPP/3yNYpZ:/ohd5Kh6KxkjaFdXjPn
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it100129.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it100129.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it100129.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it100129.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it100129.exe -
Executes dropped EXE 6 IoCs
pid Process 2272 ziYe2860.exe 2456 ziUv9567.exe 2736 it100129.exe 4988 jr468069.exe 2852 kp511093.exe 1628 lr220354.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it100129.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziYe2860.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziYe2860.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziUv9567.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziUv9567.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5296f60cd4696a1b74d252fe6f0e1055042caa8bfc4f27c0133c2ec2834793a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5296f60cd4696a1b74d252fe6f0e1055042caa8bfc4f27c0133c2ec2834793a3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 7 IoCs
pid pid_target Process procid_target 2392 1628 WerFault.exe 72 2724 1628 WerFault.exe 72 3096 1628 WerFault.exe 72 2784 1628 WerFault.exe 72 5092 1628 WerFault.exe 72 2256 1628 WerFault.exe 72 4440 1628 WerFault.exe 72 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2736 it100129.exe 2736 it100129.exe 4988 jr468069.exe 4988 jr468069.exe 2852 kp511093.exe 2852 kp511093.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2736 it100129.exe Token: SeDebugPrivilege 4988 jr468069.exe Token: SeDebugPrivilege 2852 kp511093.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1560 wrote to memory of 2272 1560 5296f60cd4696a1b74d252fe6f0e1055042caa8bfc4f27c0133c2ec2834793a3.exe 66 PID 1560 wrote to memory of 2272 1560 5296f60cd4696a1b74d252fe6f0e1055042caa8bfc4f27c0133c2ec2834793a3.exe 66 PID 1560 wrote to memory of 2272 1560 5296f60cd4696a1b74d252fe6f0e1055042caa8bfc4f27c0133c2ec2834793a3.exe 66 PID 2272 wrote to memory of 2456 2272 ziYe2860.exe 67 PID 2272 wrote to memory of 2456 2272 ziYe2860.exe 67 PID 2272 wrote to memory of 2456 2272 ziYe2860.exe 67 PID 2456 wrote to memory of 2736 2456 ziUv9567.exe 68 PID 2456 wrote to memory of 2736 2456 ziUv9567.exe 68 PID 2456 wrote to memory of 4988 2456 ziUv9567.exe 69 PID 2456 wrote to memory of 4988 2456 ziUv9567.exe 69 PID 2456 wrote to memory of 4988 2456 ziUv9567.exe 69 PID 2272 wrote to memory of 2852 2272 ziYe2860.exe 71 PID 2272 wrote to memory of 2852 2272 ziYe2860.exe 71 PID 2272 wrote to memory of 2852 2272 ziYe2860.exe 71 PID 1560 wrote to memory of 1628 1560 5296f60cd4696a1b74d252fe6f0e1055042caa8bfc4f27c0133c2ec2834793a3.exe 72 PID 1560 wrote to memory of 1628 1560 5296f60cd4696a1b74d252fe6f0e1055042caa8bfc4f27c0133c2ec2834793a3.exe 72 PID 1560 wrote to memory of 1628 1560 5296f60cd4696a1b74d252fe6f0e1055042caa8bfc4f27c0133c2ec2834793a3.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\5296f60cd4696a1b74d252fe6f0e1055042caa8bfc4f27c0133c2ec2834793a3.exe"C:\Users\Admin\AppData\Local\Temp\5296f60cd4696a1b74d252fe6f0e1055042caa8bfc4f27c0133c2ec2834793a3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYe2860.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYe2860.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziUv9567.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziUv9567.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it100129.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it100129.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr468069.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr468069.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4988
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp511093.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp511093.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr220354.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr220354.exe2⤵
- Executes dropped EXE
PID:1628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 6163⤵
- Program crash
PID:2392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 6963⤵
- Program crash
PID:2724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 8363⤵
- Program crash
PID:3096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 8243⤵
- Program crash
PID:2784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 8723⤵
- Program crash
PID:5092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 8163⤵
- Program crash
PID:2256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 10683⤵
- Program crash
PID:4440
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD53e530e673db591c189b1cd85031e348d
SHA143785739a819c9b94e6e24efbbe1203215e0dbb0
SHA2563800ba8e047a5fe5641f3c4c6a6a8fd576397c161a71de06f553988d03a64501
SHA5125a19bc57a003e73314a3d5a8756cce5799ef227c563ac05eee5fff0dc2d124918add91a0aadf168c49d8eddb48a75544db14a7071ed4fe0978e23ea714dd0d0b
-
Filesize
382KB
MD53e530e673db591c189b1cd85031e348d
SHA143785739a819c9b94e6e24efbbe1203215e0dbb0
SHA2563800ba8e047a5fe5641f3c4c6a6a8fd576397c161a71de06f553988d03a64501
SHA5125a19bc57a003e73314a3d5a8756cce5799ef227c563ac05eee5fff0dc2d124918add91a0aadf168c49d8eddb48a75544db14a7071ed4fe0978e23ea714dd0d0b
-
Filesize
624KB
MD5ed5492102471c5f86fb6096d0da96d1d
SHA18cfea869bd7bbe49e7c9f6100a612ce49aba57de
SHA256d5603fa3c2745f7a69e6e360bd8c8341097f8289f5cd21a020afcfe01e9db081
SHA512eb45114e9c94b5debe542690f8cd231989a8e7cf78d981aa7cf0f5585840dd77e0a82f5de7180018cd634655b6814b1d7e348cbd3bde09b0667de25024e15b3c
-
Filesize
624KB
MD5ed5492102471c5f86fb6096d0da96d1d
SHA18cfea869bd7bbe49e7c9f6100a612ce49aba57de
SHA256d5603fa3c2745f7a69e6e360bd8c8341097f8289f5cd21a020afcfe01e9db081
SHA512eb45114e9c94b5debe542690f8cd231989a8e7cf78d981aa7cf0f5585840dd77e0a82f5de7180018cd634655b6814b1d7e348cbd3bde09b0667de25024e15b3c
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
470KB
MD5eb706b26da4c2f3e586ae42b496c8073
SHA18079c63e65d38b10ce8804b81029e2968b0f15ee
SHA2564eeb95c4cbecfda742b05362aa5b3ead429645ec5cd73ae26af53e3a3f0bfebd
SHA51245014144cef7870912aaaedb666d5976b4a7544d6f84e0e7f4f09df4695067839f2bc3b8b1aac14014321c19d0f45d0bb7705b16c36ef00bc469594070d39a1f
-
Filesize
470KB
MD5eb706b26da4c2f3e586ae42b496c8073
SHA18079c63e65d38b10ce8804b81029e2968b0f15ee
SHA2564eeb95c4cbecfda742b05362aa5b3ead429645ec5cd73ae26af53e3a3f0bfebd
SHA51245014144cef7870912aaaedb666d5976b4a7544d6f84e0e7f4f09df4695067839f2bc3b8b1aac14014321c19d0f45d0bb7705b16c36ef00bc469594070d39a1f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
486KB
MD52527d47d78c46e42e2ec925c455cafc7
SHA12952abf9bdddac8fb6bf258bf0731442a4318c5a
SHA256cc1d04aacf5cc0f260bbda5c8fd4d55b0261814a3a7891deb82f8851bf13f0a7
SHA512a61615893d4c914596cd12fed4e2aa86b3fa010fe0975066d0dfb54d14abf466a9e124b8c3eda804882e18524301b41db088ec833e3fda2642ee43b855304e49
-
Filesize
486KB
MD52527d47d78c46e42e2ec925c455cafc7
SHA12952abf9bdddac8fb6bf258bf0731442a4318c5a
SHA256cc1d04aacf5cc0f260bbda5c8fd4d55b0261814a3a7891deb82f8851bf13f0a7
SHA512a61615893d4c914596cd12fed4e2aa86b3fa010fe0975066d0dfb54d14abf466a9e124b8c3eda804882e18524301b41db088ec833e3fda2642ee43b855304e49