Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    95s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19/04/2023, 04:01

General

  • Target

    600b6100f250d50af844b130d038e60706be6392e635bdc4ca2ba65aee54b64a.exe

  • Size

    1.1MB

  • MD5

    0d9bc68752aa645bfc475dd57f44e44f

  • SHA1

    b83fe616ef87db187600515d662b76e85d05bebf

  • SHA256

    600b6100f250d50af844b130d038e60706be6392e635bdc4ca2ba65aee54b64a

  • SHA512

    e4c0f1c6a0e180ca8691c093129fc64f729c4e68a1e06a9770181a94660c424f2c6caeb0fc09adfc1f451b6d289f59562438bbf658c4efa391f01392d16676c7

  • SSDEEP

    24576:Wyaz5ATJUVS7AZuTrX596HBgLSI1wKRskUKCE3JEuc:lDJL1TrXLgBgWXKqkpCEu

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\600b6100f250d50af844b130d038e60706be6392e635bdc4ca2ba65aee54b64a.exe
    "C:\Users\Admin\AppData\Local\Temp\600b6100f250d50af844b130d038e60706be6392e635bdc4ca2ba65aee54b64a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un886445.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un886445.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2420
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un643096.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un643096.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2672
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr687922.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr687922.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3236
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu369886.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu369886.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4672
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk328445.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk328445.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2764
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si297350.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si297350.exe
      2⤵
      • Executes dropped EXE
      PID:4264
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 616
        3⤵
        • Program crash
        PID:4532
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 696
        3⤵
        • Program crash
        PID:3656
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 840
        3⤵
        • Program crash
        PID:5056
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 884
        3⤵
        • Program crash
        PID:1144
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 844
        3⤵
        • Program crash
        PID:2720
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 944
        3⤵
        • Program crash
        PID:2948
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 1076
        3⤵
        • Program crash
        PID:4744

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si297350.exe

    Filesize

    382KB

    MD5

    586c2c3c387038a375a60ed9253a87fc

    SHA1

    1c00f420f326a095a41ed7321cc7ddff83b18d07

    SHA256

    ec7299838fde22c26fbe9a523f23eed4c763178cacaf8c3c1477d1daace27f8c

    SHA512

    4652bd1bc436a497f45d2584186316abcbffd4cc607a622319f5727d75ef4277166fbd4064d08c54cfe80a1ff9aec4b946ac32616155a32ec346f1b3d07faeda

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si297350.exe

    Filesize

    382KB

    MD5

    586c2c3c387038a375a60ed9253a87fc

    SHA1

    1c00f420f326a095a41ed7321cc7ddff83b18d07

    SHA256

    ec7299838fde22c26fbe9a523f23eed4c763178cacaf8c3c1477d1daace27f8c

    SHA512

    4652bd1bc436a497f45d2584186316abcbffd4cc607a622319f5727d75ef4277166fbd4064d08c54cfe80a1ff9aec4b946ac32616155a32ec346f1b3d07faeda

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un886445.exe

    Filesize

    763KB

    MD5

    5d195d5ac0a038e91b1f2d9b001f4e85

    SHA1

    181ece2555abe5e7b105b3c0ac0d7a7c43c2bed3

    SHA256

    e2756f6dd041274661c1a06f7fab909942b5e51bac2805e768b097cde5c681e5

    SHA512

    b27b3c8efc54736ac18fee319b890e1b44d30504703b27fe36350b13650e7cfb84a36cc31b693310431fcc4cdcf9218302dbf3669292162109ee146f0f52d26b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un886445.exe

    Filesize

    763KB

    MD5

    5d195d5ac0a038e91b1f2d9b001f4e85

    SHA1

    181ece2555abe5e7b105b3c0ac0d7a7c43c2bed3

    SHA256

    e2756f6dd041274661c1a06f7fab909942b5e51bac2805e768b097cde5c681e5

    SHA512

    b27b3c8efc54736ac18fee319b890e1b44d30504703b27fe36350b13650e7cfb84a36cc31b693310431fcc4cdcf9218302dbf3669292162109ee146f0f52d26b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk328445.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk328445.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un643096.exe

    Filesize

    609KB

    MD5

    e3dc62bbce82b20fb4b70922069c5cc7

    SHA1

    9f8e00c6941d624aa93391a9b764e2c7aea87c02

    SHA256

    0b0c26bdabc8efef8ef14ea9c9c05f9be7226f7c4987e2b359ed32896d989d5d

    SHA512

    a922ad40513a0d80e0cc5a8f7329cc4919ccf7030e37a433ab87eeaa4f1bce499914d9b2e67f2bc68de9a187f75c4de033b77058b35f5459559d6f6130f6b2bb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un643096.exe

    Filesize

    609KB

    MD5

    e3dc62bbce82b20fb4b70922069c5cc7

    SHA1

    9f8e00c6941d624aa93391a9b764e2c7aea87c02

    SHA256

    0b0c26bdabc8efef8ef14ea9c9c05f9be7226f7c4987e2b359ed32896d989d5d

    SHA512

    a922ad40513a0d80e0cc5a8f7329cc4919ccf7030e37a433ab87eeaa4f1bce499914d9b2e67f2bc68de9a187f75c4de033b77058b35f5459559d6f6130f6b2bb

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr687922.exe

    Filesize

    403KB

    MD5

    a20fc5cf367e1c7c4ba24e7dc17fff07

    SHA1

    c614803789dfe533eaf2f30b35f756c406580cfa

    SHA256

    1cd07490d69faee61087dbd19dd5798f53c855ffacdfe413c5d0fc79ac88c1a2

    SHA512

    35dae61c7d9869700a5f55448eba18d4910f87ec0359472fce2041e0bd4c9ec36e418e090ba21011f2c6c4b8f63ce843faaad14c8bda186ed51cd196bc8b27c5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr687922.exe

    Filesize

    403KB

    MD5

    a20fc5cf367e1c7c4ba24e7dc17fff07

    SHA1

    c614803789dfe533eaf2f30b35f756c406580cfa

    SHA256

    1cd07490d69faee61087dbd19dd5798f53c855ffacdfe413c5d0fc79ac88c1a2

    SHA512

    35dae61c7d9869700a5f55448eba18d4910f87ec0359472fce2041e0bd4c9ec36e418e090ba21011f2c6c4b8f63ce843faaad14c8bda186ed51cd196bc8b27c5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu369886.exe

    Filesize

    486KB

    MD5

    4ab00fc447378d9038cbcc042fb05e7c

    SHA1

    56f5f55ab871977932e86312553faf6dbdea717c

    SHA256

    1e8bb35f7a98ddefd2b6d5e998d504367f19649b64960b12070a280b3f87818f

    SHA512

    ea19dfa550d2e792347bff51057484feee1e5902d9c81439c8a2528bf4c4ce7444224555039f6481992a33e56a3b6fca5e0c550eda081e64fd60ec85c965a47f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu369886.exe

    Filesize

    486KB

    MD5

    4ab00fc447378d9038cbcc042fb05e7c

    SHA1

    56f5f55ab871977932e86312553faf6dbdea717c

    SHA256

    1e8bb35f7a98ddefd2b6d5e998d504367f19649b64960b12070a280b3f87818f

    SHA512

    ea19dfa550d2e792347bff51057484feee1e5902d9c81439c8a2528bf4c4ce7444224555039f6481992a33e56a3b6fca5e0c550eda081e64fd60ec85c965a47f

  • memory/2764-1001-0x0000000000A30000-0x0000000000A58000-memory.dmp

    Filesize

    160KB

  • memory/2764-1003-0x0000000007AC0000-0x0000000007AD0000-memory.dmp

    Filesize

    64KB

  • memory/2764-1002-0x00000000077B0000-0x00000000077FB000-memory.dmp

    Filesize

    300KB

  • memory/3236-156-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/3236-172-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/3236-150-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/3236-152-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/3236-154-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/3236-147-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/3236-160-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/3236-162-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/3236-158-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/3236-168-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/3236-166-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/3236-170-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/3236-174-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/3236-148-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/3236-164-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/3236-175-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB

  • memory/3236-176-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB

  • memory/3236-177-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB

  • memory/3236-178-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/3236-180-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/3236-143-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/3236-146-0x00000000024C0000-0x00000000024D8000-memory.dmp

    Filesize

    96KB

  • memory/3236-145-0x0000000004EF0000-0x00000000053EE000-memory.dmp

    Filesize

    5.0MB

  • memory/3236-144-0x0000000000BD0000-0x0000000000BEA000-memory.dmp

    Filesize

    104KB

  • memory/4264-1009-0x00000000008E0000-0x0000000000915000-memory.dmp

    Filesize

    212KB

  • memory/4672-188-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/4672-189-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/4672-192-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4672-194-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4672-196-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4672-198-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4672-200-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4672-202-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4672-204-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4672-206-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4672-208-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4672-210-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4672-212-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4672-214-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4672-216-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4672-218-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4672-220-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4672-222-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4672-224-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4672-983-0x00000000077C0000-0x0000000007DC6000-memory.dmp

    Filesize

    6.0MB

  • memory/4672-984-0x0000000007E60000-0x0000000007E72000-memory.dmp

    Filesize

    72KB

  • memory/4672-985-0x0000000007E90000-0x0000000007F9A000-memory.dmp

    Filesize

    1.0MB

  • memory/4672-986-0x0000000007FB0000-0x0000000007FEE000-memory.dmp

    Filesize

    248KB

  • memory/4672-987-0x0000000008030000-0x000000000807B000-memory.dmp

    Filesize

    300KB

  • memory/4672-988-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/4672-989-0x00000000082C0000-0x0000000008326000-memory.dmp

    Filesize

    408KB

  • memory/4672-990-0x0000000008980000-0x0000000008A12000-memory.dmp

    Filesize

    584KB

  • memory/4672-991-0x0000000008B40000-0x0000000008BB6000-memory.dmp

    Filesize

    472KB

  • memory/4672-992-0x0000000008C00000-0x0000000008DC2000-memory.dmp

    Filesize

    1.8MB

  • memory/4672-190-0x0000000004D80000-0x0000000004DB5000-memory.dmp

    Filesize

    212KB

  • memory/4672-191-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/4672-187-0x0000000004D80000-0x0000000004DBA000-memory.dmp

    Filesize

    232KB

  • memory/4672-186-0x00000000008F0000-0x0000000000936000-memory.dmp

    Filesize

    280KB

  • memory/4672-185-0x00000000027A0000-0x00000000027DC000-memory.dmp

    Filesize

    240KB

  • memory/4672-993-0x0000000008DE0000-0x000000000930C000-memory.dmp

    Filesize

    5.2MB

  • memory/4672-994-0x0000000009420000-0x000000000943E000-memory.dmp

    Filesize

    120KB

  • memory/4672-995-0x0000000002740000-0x0000000002790000-memory.dmp

    Filesize

    320KB