Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18/04/2023, 14:37

General

  • Target

    2c64d47928d456eba1913a0d1389c7f673449c685f9160158b94674e24b013b4.exe

  • Size

    1.1MB

  • MD5

    09c74acfa3120f007de1985be0436bb4

  • SHA1

    362e0a2cca919c63a088b19cd08b4d456f29007f

  • SHA256

    2c64d47928d456eba1913a0d1389c7f673449c685f9160158b94674e24b013b4

  • SHA512

    0b22747174e1caa8c6301458f5b71c46785cd90a0a6f615f535e8c03afef4c62f8fc284dd31a87d58d1285845917ef5142ac4475b134f2cbe94c6cc8d9041dda

  • SSDEEP

    24576:DyfzPgNCEbQZCSOWnWR3GD+9ZmIUMeH7Qj0mt:WfzP6C0QZCknWZk+TmOEQQ

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c64d47928d456eba1913a0d1389c7f673449c685f9160158b94674e24b013b4.exe
    "C:\Users\Admin\AppData\Local\Temp\2c64d47928d456eba1913a0d1389c7f673449c685f9160158b94674e24b013b4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un027304.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un027304.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4684
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un627370.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un627370.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4064
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr742332.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr742332.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4204
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu804067.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu804067.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2788
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk456022.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk456022.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3164
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si863205.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si863205.exe
      2⤵
      • Executes dropped EXE
      PID:2932
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 616
        3⤵
        • Program crash
        PID:4828
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 696
        3⤵
        • Program crash
        PID:4060
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 844
        3⤵
        • Program crash
        PID:4164
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 820
        3⤵
        • Program crash
        PID:4176
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 872
        3⤵
        • Program crash
        PID:4748
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 876
        3⤵
        • Program crash
        PID:772
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 1080
        3⤵
        • Program crash
        PID:4860

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si863205.exe

    Filesize

    382KB

    MD5

    3e530e673db591c189b1cd85031e348d

    SHA1

    43785739a819c9b94e6e24efbbe1203215e0dbb0

    SHA256

    3800ba8e047a5fe5641f3c4c6a6a8fd576397c161a71de06f553988d03a64501

    SHA512

    5a19bc57a003e73314a3d5a8756cce5799ef227c563ac05eee5fff0dc2d124918add91a0aadf168c49d8eddb48a75544db14a7071ed4fe0978e23ea714dd0d0b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si863205.exe

    Filesize

    382KB

    MD5

    3e530e673db591c189b1cd85031e348d

    SHA1

    43785739a819c9b94e6e24efbbe1203215e0dbb0

    SHA256

    3800ba8e047a5fe5641f3c4c6a6a8fd576397c161a71de06f553988d03a64501

    SHA512

    5a19bc57a003e73314a3d5a8756cce5799ef227c563ac05eee5fff0dc2d124918add91a0aadf168c49d8eddb48a75544db14a7071ed4fe0978e23ea714dd0d0b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un027304.exe

    Filesize

    763KB

    MD5

    cfffbcca6a73cfc31b45b85c6fa42081

    SHA1

    0acd6b03764a7e7511f5953793fada870b8c68c6

    SHA256

    bc4a4dd7ccf505a12a0c6c45fe391d55e666a6b203a3e09f7313ed9d70f7e8e5

    SHA512

    99b2da07f4b09a8cbcaabb6f5b3a08898641dc1e94355d0bfccb781961893f366f583c15d59346fe29fdc9af4f874b2159420f6939eabeb10ae4d345bb74b024

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un027304.exe

    Filesize

    763KB

    MD5

    cfffbcca6a73cfc31b45b85c6fa42081

    SHA1

    0acd6b03764a7e7511f5953793fada870b8c68c6

    SHA256

    bc4a4dd7ccf505a12a0c6c45fe391d55e666a6b203a3e09f7313ed9d70f7e8e5

    SHA512

    99b2da07f4b09a8cbcaabb6f5b3a08898641dc1e94355d0bfccb781961893f366f583c15d59346fe29fdc9af4f874b2159420f6939eabeb10ae4d345bb74b024

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk456022.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk456022.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un627370.exe

    Filesize

    609KB

    MD5

    2d54fcf0c3155933a382841d0e363751

    SHA1

    56518088c6269e592d105a6c7bb93103fa100536

    SHA256

    f6c9feec67a0c4b4e38c73d5e58969d8087cc85e9f320485e2207fc828124f1b

    SHA512

    d49c8f7e9b9948540bbcc08a2c3e2528c5b85d243f9df1804110314058b6a2e02e4f7cbce4369988c7138a8f26c133bddfd894d4fcadf388cf85b81e4821428d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un627370.exe

    Filesize

    609KB

    MD5

    2d54fcf0c3155933a382841d0e363751

    SHA1

    56518088c6269e592d105a6c7bb93103fa100536

    SHA256

    f6c9feec67a0c4b4e38c73d5e58969d8087cc85e9f320485e2207fc828124f1b

    SHA512

    d49c8f7e9b9948540bbcc08a2c3e2528c5b85d243f9df1804110314058b6a2e02e4f7cbce4369988c7138a8f26c133bddfd894d4fcadf388cf85b81e4821428d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr742332.exe

    Filesize

    403KB

    MD5

    eb2503a70eb7a1fda9d8f583465eaaf6

    SHA1

    39195d2380c704ee7db204e5aeae699d6b3061c5

    SHA256

    896429e56a86cf9745f94bb8d72023738015366218b89bddd8d3652b2fc3ab44

    SHA512

    9a835797bcbe66f250d88f47281673a2aa9270a91aa2548956207973fc0d386bc1bbaa3ed0d9a99ab2790b041bc96c023ef304dc8c7060c1deacc65d6488526a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr742332.exe

    Filesize

    403KB

    MD5

    eb2503a70eb7a1fda9d8f583465eaaf6

    SHA1

    39195d2380c704ee7db204e5aeae699d6b3061c5

    SHA256

    896429e56a86cf9745f94bb8d72023738015366218b89bddd8d3652b2fc3ab44

    SHA512

    9a835797bcbe66f250d88f47281673a2aa9270a91aa2548956207973fc0d386bc1bbaa3ed0d9a99ab2790b041bc96c023ef304dc8c7060c1deacc65d6488526a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu804067.exe

    Filesize

    486KB

    MD5

    9e903d5d31320565bcf58dd8c47adb35

    SHA1

    98c25db9aa0c2ae6f43abdb215b71003c05b7ba6

    SHA256

    cd67eba7dbd03fe3417445f82aeaf7e185427fe3c3f4961345bc6696d674619c

    SHA512

    b35b5d288a01bc7697974e8f726ec6942b67952b4688ed33169866209520105070705ad4e29d68efc0f4d2b6ba112e51216f7ef821555ed25fdc9d36481b0544

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu804067.exe

    Filesize

    486KB

    MD5

    9e903d5d31320565bcf58dd8c47adb35

    SHA1

    98c25db9aa0c2ae6f43abdb215b71003c05b7ba6

    SHA256

    cd67eba7dbd03fe3417445f82aeaf7e185427fe3c3f4961345bc6696d674619c

    SHA512

    b35b5d288a01bc7697974e8f726ec6942b67952b4688ed33169866209520105070705ad4e29d68efc0f4d2b6ba112e51216f7ef821555ed25fdc9d36481b0544

  • memory/2788-984-0x0000000007E00000-0x0000000008406000-memory.dmp

    Filesize

    6.0MB

  • memory/2788-987-0x0000000004E60000-0x0000000004E70000-memory.dmp

    Filesize

    64KB

  • memory/2788-996-0x00000000028B0000-0x0000000002900000-memory.dmp

    Filesize

    320KB

  • memory/2788-995-0x0000000008E80000-0x00000000093AC000-memory.dmp

    Filesize

    5.2MB

  • memory/2788-994-0x0000000008CB0000-0x0000000008E72000-memory.dmp

    Filesize

    1.8MB

  • memory/2788-993-0x0000000008AE0000-0x0000000008AFE000-memory.dmp

    Filesize

    120KB

  • memory/2788-992-0x0000000008A20000-0x0000000008A96000-memory.dmp

    Filesize

    472KB

  • memory/2788-991-0x0000000008980000-0x0000000008A12000-memory.dmp

    Filesize

    584KB

  • memory/2788-990-0x0000000007CB0000-0x0000000007D16000-memory.dmp

    Filesize

    408KB

  • memory/2788-989-0x0000000007B20000-0x0000000007B6B000-memory.dmp

    Filesize

    300KB

  • memory/2788-988-0x00000000079A0000-0x00000000079DE000-memory.dmp

    Filesize

    248KB

  • memory/2788-986-0x0000000007880000-0x000000000798A000-memory.dmp

    Filesize

    1.0MB

  • memory/2788-985-0x0000000007850000-0x0000000007862000-memory.dmp

    Filesize

    72KB

  • memory/2788-376-0x0000000004E60000-0x0000000004E70000-memory.dmp

    Filesize

    64KB

  • memory/2788-378-0x0000000004E60000-0x0000000004E70000-memory.dmp

    Filesize

    64KB

  • memory/2788-374-0x0000000004E60000-0x0000000004E70000-memory.dmp

    Filesize

    64KB

  • memory/2788-373-0x0000000000860000-0x00000000008A6000-memory.dmp

    Filesize

    280KB

  • memory/2788-221-0x0000000004DE0000-0x0000000004E15000-memory.dmp

    Filesize

    212KB

  • memory/2788-219-0x0000000004DE0000-0x0000000004E15000-memory.dmp

    Filesize

    212KB

  • memory/2788-217-0x0000000004DE0000-0x0000000004E15000-memory.dmp

    Filesize

    212KB

  • memory/2788-215-0x0000000004DE0000-0x0000000004E15000-memory.dmp

    Filesize

    212KB

  • memory/2788-186-0x0000000002460000-0x000000000249C000-memory.dmp

    Filesize

    240KB

  • memory/2788-187-0x0000000004DE0000-0x0000000004E1A000-memory.dmp

    Filesize

    232KB

  • memory/2788-189-0x0000000004DE0000-0x0000000004E15000-memory.dmp

    Filesize

    212KB

  • memory/2788-188-0x0000000004DE0000-0x0000000004E15000-memory.dmp

    Filesize

    212KB

  • memory/2788-191-0x0000000004DE0000-0x0000000004E15000-memory.dmp

    Filesize

    212KB

  • memory/2788-193-0x0000000004DE0000-0x0000000004E15000-memory.dmp

    Filesize

    212KB

  • memory/2788-195-0x0000000004DE0000-0x0000000004E15000-memory.dmp

    Filesize

    212KB

  • memory/2788-197-0x0000000004DE0000-0x0000000004E15000-memory.dmp

    Filesize

    212KB

  • memory/2788-199-0x0000000004DE0000-0x0000000004E15000-memory.dmp

    Filesize

    212KB

  • memory/2788-201-0x0000000004DE0000-0x0000000004E15000-memory.dmp

    Filesize

    212KB

  • memory/2788-203-0x0000000004DE0000-0x0000000004E15000-memory.dmp

    Filesize

    212KB

  • memory/2788-205-0x0000000004DE0000-0x0000000004E15000-memory.dmp

    Filesize

    212KB

  • memory/2788-207-0x0000000004DE0000-0x0000000004E15000-memory.dmp

    Filesize

    212KB

  • memory/2788-209-0x0000000004DE0000-0x0000000004E15000-memory.dmp

    Filesize

    212KB

  • memory/2788-211-0x0000000004DE0000-0x0000000004E15000-memory.dmp

    Filesize

    212KB

  • memory/2788-213-0x0000000004DE0000-0x0000000004E15000-memory.dmp

    Filesize

    212KB

  • memory/2932-1010-0x00000000008E0000-0x0000000000915000-memory.dmp

    Filesize

    212KB

  • memory/3164-1002-0x0000000000350000-0x0000000000378000-memory.dmp

    Filesize

    160KB

  • memory/3164-1004-0x00000000073E0000-0x00000000073F0000-memory.dmp

    Filesize

    64KB

  • memory/3164-1003-0x00000000070D0000-0x000000000711B000-memory.dmp

    Filesize

    300KB

  • memory/4204-165-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/4204-159-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/4204-176-0x0000000002710000-0x0000000002720000-memory.dmp

    Filesize

    64KB

  • memory/4204-175-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/4204-147-0x00000000026D0000-0x00000000026E8000-memory.dmp

    Filesize

    96KB

  • memory/4204-173-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/4204-171-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/4204-169-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/4204-151-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/4204-167-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/4204-148-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/4204-163-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/4204-161-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/4204-177-0x0000000002710000-0x0000000002720000-memory.dmp

    Filesize

    64KB

  • memory/4204-157-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/4204-155-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/4204-153-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/4204-146-0x0000000004E40000-0x000000000533E000-memory.dmp

    Filesize

    5.0MB

  • memory/4204-144-0x0000000002710000-0x0000000002720000-memory.dmp

    Filesize

    64KB

  • memory/4204-178-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/4204-180-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/4204-181-0x0000000002710000-0x0000000002720000-memory.dmp

    Filesize

    64KB

  • memory/4204-145-0x0000000002410000-0x000000000242A000-memory.dmp

    Filesize

    104KB

  • memory/4204-143-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4204-149-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB