Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19/04/2023, 07:30

General

  • Target

    ad06c652144f5f7b08d23ea4c76b961813924e6548fe993893fb9b12bd2882dd.exe

  • Size

    963KB

  • MD5

    69808b3deb70126b774d619da011d3ad

  • SHA1

    2307f1208e75ddd1046b0d9118c8a3b101d66495

  • SHA256

    ad06c652144f5f7b08d23ea4c76b961813924e6548fe993893fb9b12bd2882dd

  • SHA512

    bd311868c440d69a9012843a728a6563b6aec548ee88baaec0b8fb9f8b57b9e8cbaa4e0cdca74f7d8f142b593560827a972365f83d59c42846c7c11191ebfda8

  • SSDEEP

    24576:NyXu2iDGd2/5/4UhzxVqHgCRPTlQDgix3bA4G+prdc:ovqiUhNVqHgigxLA4GO

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad06c652144f5f7b08d23ea4c76b961813924e6548fe993893fb9b12bd2882dd.exe
    "C:\Users\Admin\AppData\Local\Temp\ad06c652144f5f7b08d23ea4c76b961813924e6548fe993893fb9b12bd2882dd.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4212
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un029605.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un029605.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4272
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un842951.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un842951.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4616
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr604650.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr604650.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3924
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu511213.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu511213.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1480
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk493954.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk493954.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4848
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si862143.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si862143.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:4156
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 648
        3⤵
        • Program crash
        PID:4164
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 724
        3⤵
        • Program crash
        PID:5032
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 852
        3⤵
        • Program crash
        PID:5020
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 840
        3⤵
        • Program crash
        PID:1204
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 900
        3⤵
        • Program crash
        PID:4492
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 952
        3⤵
        • Program crash
        PID:5116
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 1128
        3⤵
        • Program crash
        PID:3508
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 1160
        3⤵
        • Program crash
        PID:4452
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 1164
        3⤵
        • Program crash
        PID:4532

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si862143.exe

    Filesize

    255KB

    MD5

    52c8d88080f3b880e0069039afe3789c

    SHA1

    5ed21c4848963a502e42d79d83112cc21e011ad0

    SHA256

    d4d4b2046cb3530b50a2df1b32e1007fbd48765edb16172ff0d66e25760d6b7f

    SHA512

    2483edd417dddea08dce66ad25af0f96928fd7cf071eb49b2ab989f40b880bb8039aab7aa97547c6ae67567b21bee71e20f14c09597f6c7869196db2014f5ddf

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si862143.exe

    Filesize

    255KB

    MD5

    52c8d88080f3b880e0069039afe3789c

    SHA1

    5ed21c4848963a502e42d79d83112cc21e011ad0

    SHA256

    d4d4b2046cb3530b50a2df1b32e1007fbd48765edb16172ff0d66e25760d6b7f

    SHA512

    2483edd417dddea08dce66ad25af0f96928fd7cf071eb49b2ab989f40b880bb8039aab7aa97547c6ae67567b21bee71e20f14c09597f6c7869196db2014f5ddf

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un029605.exe

    Filesize

    705KB

    MD5

    dfbfdddae32041881f83829d5c14a64a

    SHA1

    865201b287d8f0d5e08d50d4771e50f077cf2221

    SHA256

    7538569c28e2860f6a8b6c6d401ea0eb7c043ad1e9bea8fa3549539052c8478e

    SHA512

    dd3446f6f46b1db8660d39e94268cd1eb001d365c848e62d984dbb36d0d736d39e446b237ebc0f2da7d34a066737a0480c765ab7405744938b124437d915d2e7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un029605.exe

    Filesize

    705KB

    MD5

    dfbfdddae32041881f83829d5c14a64a

    SHA1

    865201b287d8f0d5e08d50d4771e50f077cf2221

    SHA256

    7538569c28e2860f6a8b6c6d401ea0eb7c043ad1e9bea8fa3549539052c8478e

    SHA512

    dd3446f6f46b1db8660d39e94268cd1eb001d365c848e62d984dbb36d0d736d39e446b237ebc0f2da7d34a066737a0480c765ab7405744938b124437d915d2e7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk493954.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk493954.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un842951.exe

    Filesize

    550KB

    MD5

    f2d0f002c8c4feab402abee2cfc6cb1c

    SHA1

    b0de04cbbf0b23dce99f6e4948a2708f37babed1

    SHA256

    87046a0c950d84cf24790f6d8c3e126cf5b7a41df384fccbb04495a769e38bf3

    SHA512

    9a7b91ea5a421f48e295db14259da701a7c0dcefd5496b75edfc20b9091a232f4ccea663c92be9271fd77013a715dfb10f723e31726a4db338d5625c9e32f7dd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un842951.exe

    Filesize

    550KB

    MD5

    f2d0f002c8c4feab402abee2cfc6cb1c

    SHA1

    b0de04cbbf0b23dce99f6e4948a2708f37babed1

    SHA256

    87046a0c950d84cf24790f6d8c3e126cf5b7a41df384fccbb04495a769e38bf3

    SHA512

    9a7b91ea5a421f48e295db14259da701a7c0dcefd5496b75edfc20b9091a232f4ccea663c92be9271fd77013a715dfb10f723e31726a4db338d5625c9e32f7dd

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr604650.exe

    Filesize

    277KB

    MD5

    582d07a0c025f7f2d194a3c27b41bb4e

    SHA1

    98da2c006d09b3ddf3aacb9cde8697a955785419

    SHA256

    abb0ba723851b9f9b76b65ab46432f520b30f753c298774ff9441e9db0cbc13e

    SHA512

    3bacffd52ca0d78de6c06f869b4b1d3fd6c96790dfae7667d2216c35bc603c5d3c2400117e5ea4b31f64e1f7577c6cd47501bfabf09be66110ed5eaee7ff41b1

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr604650.exe

    Filesize

    277KB

    MD5

    582d07a0c025f7f2d194a3c27b41bb4e

    SHA1

    98da2c006d09b3ddf3aacb9cde8697a955785419

    SHA256

    abb0ba723851b9f9b76b65ab46432f520b30f753c298774ff9441e9db0cbc13e

    SHA512

    3bacffd52ca0d78de6c06f869b4b1d3fd6c96790dfae7667d2216c35bc603c5d3c2400117e5ea4b31f64e1f7577c6cd47501bfabf09be66110ed5eaee7ff41b1

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu511213.exe

    Filesize

    360KB

    MD5

    266350a0bd1d37f0484c8788676a4a79

    SHA1

    62ecac3eddd5dceb5287638d315e936722c96e3e

    SHA256

    3f9a17a5ddb5acf7ff09bf8a727fc1b6800f1fe0efba245927008e5e9bda9e11

    SHA512

    1ebe864949c170d8361c28e29d933b472a6b20d65af2e81ddc06ee63845cc6bc93b09f61edf5280fce006dc2b64a4b07d6ec553c5024f67b00811e0c7878b8be

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu511213.exe

    Filesize

    360KB

    MD5

    266350a0bd1d37f0484c8788676a4a79

    SHA1

    62ecac3eddd5dceb5287638d315e936722c96e3e

    SHA256

    3f9a17a5ddb5acf7ff09bf8a727fc1b6800f1fe0efba245927008e5e9bda9e11

    SHA512

    1ebe864949c170d8361c28e29d933b472a6b20d65af2e81ddc06ee63845cc6bc93b09f61edf5280fce006dc2b64a4b07d6ec553c5024f67b00811e0c7878b8be

  • memory/1480-986-0x0000000004B30000-0x0000000004B42000-memory.dmp

    Filesize

    72KB

  • memory/1480-988-0x0000000009D40000-0x0000000009D7E000-memory.dmp

    Filesize

    248KB

  • memory/1480-997-0x0000000006C60000-0x0000000006CB0000-memory.dmp

    Filesize

    320KB

  • memory/1480-996-0x000000000B6D0000-0x000000000B6EE000-memory.dmp

    Filesize

    120KB

  • memory/1480-995-0x000000000B080000-0x000000000B5AC000-memory.dmp

    Filesize

    5.2MB

  • memory/1480-994-0x000000000AEA0000-0x000000000B062000-memory.dmp

    Filesize

    1.8MB

  • memory/1480-993-0x000000000ADE0000-0x000000000AE56000-memory.dmp

    Filesize

    472KB

  • memory/1480-992-0x000000000AD20000-0x000000000ADB2000-memory.dmp

    Filesize

    584KB

  • memory/1480-991-0x000000000A050000-0x000000000A0B6000-memory.dmp

    Filesize

    408KB

  • memory/1480-990-0x00000000071D0000-0x00000000071E0000-memory.dmp

    Filesize

    64KB

  • memory/1480-989-0x0000000009EC0000-0x0000000009F0B000-memory.dmp

    Filesize

    300KB

  • memory/1480-987-0x0000000009C20000-0x0000000009D2A000-memory.dmp

    Filesize

    1.0MB

  • memory/1480-985-0x000000000A1F0000-0x000000000A7F6000-memory.dmp

    Filesize

    6.0MB

  • memory/1480-226-0x00000000076E0000-0x0000000007715000-memory.dmp

    Filesize

    212KB

  • memory/1480-224-0x00000000076E0000-0x0000000007715000-memory.dmp

    Filesize

    212KB

  • memory/1480-222-0x00000000076E0000-0x0000000007715000-memory.dmp

    Filesize

    212KB

  • memory/1480-220-0x00000000076E0000-0x0000000007715000-memory.dmp

    Filesize

    212KB

  • memory/1480-214-0x00000000071D0000-0x00000000071E0000-memory.dmp

    Filesize

    64KB

  • memory/1480-218-0x00000000071D0000-0x00000000071E0000-memory.dmp

    Filesize

    64KB

  • memory/1480-217-0x00000000076E0000-0x0000000007715000-memory.dmp

    Filesize

    212KB

  • memory/1480-216-0x00000000071D0000-0x00000000071E0000-memory.dmp

    Filesize

    64KB

  • memory/1480-213-0x0000000004890000-0x00000000048D6000-memory.dmp

    Filesize

    280KB

  • memory/1480-212-0x00000000076E0000-0x0000000007715000-memory.dmp

    Filesize

    212KB

  • memory/1480-187-0x0000000007140000-0x000000000717C000-memory.dmp

    Filesize

    240KB

  • memory/1480-188-0x00000000076E0000-0x000000000771A000-memory.dmp

    Filesize

    232KB

  • memory/1480-189-0x00000000076E0000-0x0000000007715000-memory.dmp

    Filesize

    212KB

  • memory/1480-190-0x00000000076E0000-0x0000000007715000-memory.dmp

    Filesize

    212KB

  • memory/1480-194-0x00000000076E0000-0x0000000007715000-memory.dmp

    Filesize

    212KB

  • memory/1480-192-0x00000000076E0000-0x0000000007715000-memory.dmp

    Filesize

    212KB

  • memory/1480-196-0x00000000076E0000-0x0000000007715000-memory.dmp

    Filesize

    212KB

  • memory/1480-198-0x00000000076E0000-0x0000000007715000-memory.dmp

    Filesize

    212KB

  • memory/1480-200-0x00000000076E0000-0x0000000007715000-memory.dmp

    Filesize

    212KB

  • memory/1480-202-0x00000000076E0000-0x0000000007715000-memory.dmp

    Filesize

    212KB

  • memory/1480-204-0x00000000076E0000-0x0000000007715000-memory.dmp

    Filesize

    212KB

  • memory/1480-206-0x00000000076E0000-0x0000000007715000-memory.dmp

    Filesize

    212KB

  • memory/1480-208-0x00000000076E0000-0x0000000007715000-memory.dmp

    Filesize

    212KB

  • memory/1480-210-0x00000000076E0000-0x0000000007715000-memory.dmp

    Filesize

    212KB

  • memory/3924-169-0x0000000007200000-0x0000000007212000-memory.dmp

    Filesize

    72KB

  • memory/3924-165-0x0000000007200000-0x0000000007212000-memory.dmp

    Filesize

    72KB

  • memory/3924-179-0x0000000000400000-0x0000000002B9F000-memory.dmp

    Filesize

    39.6MB

  • memory/3924-182-0x00000000073D0000-0x00000000073E0000-memory.dmp

    Filesize

    64KB

  • memory/3924-181-0x00000000073D0000-0x00000000073E0000-memory.dmp

    Filesize

    64KB

  • memory/3924-180-0x00000000073D0000-0x00000000073E0000-memory.dmp

    Filesize

    64KB

  • memory/3924-177-0x0000000000400000-0x0000000002B9F000-memory.dmp

    Filesize

    39.6MB

  • memory/3924-176-0x00000000073D0000-0x00000000073E0000-memory.dmp

    Filesize

    64KB

  • memory/3924-175-0x00000000073D0000-0x00000000073E0000-memory.dmp

    Filesize

    64KB

  • memory/3924-174-0x00000000073D0000-0x00000000073E0000-memory.dmp

    Filesize

    64KB

  • memory/3924-173-0x0000000007200000-0x0000000007212000-memory.dmp

    Filesize

    72KB

  • memory/3924-146-0x0000000007200000-0x0000000007212000-memory.dmp

    Filesize

    72KB

  • memory/3924-171-0x0000000007200000-0x0000000007212000-memory.dmp

    Filesize

    72KB

  • memory/3924-151-0x0000000007200000-0x0000000007212000-memory.dmp

    Filesize

    72KB

  • memory/3924-149-0x0000000007200000-0x0000000007212000-memory.dmp

    Filesize

    72KB

  • memory/3924-147-0x0000000007200000-0x0000000007212000-memory.dmp

    Filesize

    72KB

  • memory/3924-161-0x0000000007200000-0x0000000007212000-memory.dmp

    Filesize

    72KB

  • memory/3924-163-0x0000000007200000-0x0000000007212000-memory.dmp

    Filesize

    72KB

  • memory/3924-167-0x0000000007200000-0x0000000007212000-memory.dmp

    Filesize

    72KB

  • memory/3924-159-0x0000000007200000-0x0000000007212000-memory.dmp

    Filesize

    72KB

  • memory/3924-157-0x0000000007200000-0x0000000007212000-memory.dmp

    Filesize

    72KB

  • memory/3924-155-0x0000000007200000-0x0000000007212000-memory.dmp

    Filesize

    72KB

  • memory/3924-153-0x0000000007200000-0x0000000007212000-memory.dmp

    Filesize

    72KB

  • memory/3924-145-0x0000000007200000-0x0000000007218000-memory.dmp

    Filesize

    96KB

  • memory/3924-144-0x00000000073E0000-0x00000000078DE000-memory.dmp

    Filesize

    5.0MB

  • memory/3924-142-0x0000000002CF0000-0x0000000002D1D000-memory.dmp

    Filesize

    180KB

  • memory/3924-143-0x0000000004B30000-0x0000000004B4A000-memory.dmp

    Filesize

    104KB

  • memory/4156-1011-0x00000000047C0000-0x00000000047F5000-memory.dmp

    Filesize

    212KB

  • memory/4848-1005-0x0000000006DD0000-0x0000000006DE0000-memory.dmp

    Filesize

    64KB

  • memory/4848-1004-0x0000000006F30000-0x0000000006F7B000-memory.dmp

    Filesize

    300KB

  • memory/4848-1003-0x0000000000010000-0x0000000000038000-memory.dmp

    Filesize

    160KB