Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19/04/2023, 11:29

General

  • Target

    36f368c63585c831c716d9f744e56672ac90b37c46de4694592f77398a29e664.exe

  • Size

    828KB

  • MD5

    20d723124eea7c1f676c01c2e16442b7

  • SHA1

    0906a0f25c804a3f75a76f37628f8b318189e8f7

  • SHA256

    36f368c63585c831c716d9f744e56672ac90b37c46de4694592f77398a29e664

  • SHA512

    915380786debfdd7728f9a5b4ff0a22219a206aedcda72b2519aff20dea27c0771dc5fb4452f1974f1c112ffe7b7a73107d2380f6c37b4eceb0c45098564532f

  • SSDEEP

    12288:ey904Gn2ZhEkCllnGNdsgw6nz5yel9xrMgDcKuNt0iEvF3CaLGpA4P07St:eyxtZevD6lyelPEK4GCogNISt

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36f368c63585c831c716d9f744e56672ac90b37c46de4694592f77398a29e664.exe
    "C:\Users\Admin\AppData\Local\Temp\36f368c63585c831c716d9f744e56672ac90b37c46de4694592f77398a29e664.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRI7615.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRI7615.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2372
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zixC5814.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zixC5814.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2536
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it589957.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it589957.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3104
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr183766.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr183766.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4864
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp461057.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp461057.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2424
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr869710.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr869710.exe
      2⤵
      • Executes dropped EXE
      PID:4032
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 648
        3⤵
        • Program crash
        PID:2592
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 712
        3⤵
        • Program crash
        PID:2136
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 840
        3⤵
        • Program crash
        PID:4256
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 848
        3⤵
        • Program crash
        PID:4284
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 900
        3⤵
        • Program crash
        PID:1452
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 684
        3⤵
        • Program crash
        PID:3960
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 1092
        3⤵
        • Program crash
        PID:4632

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr869710.exe

    Filesize

    256KB

    MD5

    7338d970230a13097d35182f582f2474

    SHA1

    cd827f19c0a4adb31448b4bacae9268eca9fc878

    SHA256

    d8d0e00bfdab5d37bcbf56ad28041056aa4697a2e856d514f31bc6e01c4287ce

    SHA512

    814aa74c048de217f889ea481f4038b274d83401f8aee85c92b9e44b8213b9999737fbbb345f11fc41c252a8fd81133e7bbc8b7db45fdbc8c6cf6516292e19e8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr869710.exe

    Filesize

    256KB

    MD5

    7338d970230a13097d35182f582f2474

    SHA1

    cd827f19c0a4adb31448b4bacae9268eca9fc878

    SHA256

    d8d0e00bfdab5d37bcbf56ad28041056aa4697a2e856d514f31bc6e01c4287ce

    SHA512

    814aa74c048de217f889ea481f4038b274d83401f8aee85c92b9e44b8213b9999737fbbb345f11fc41c252a8fd81133e7bbc8b7db45fdbc8c6cf6516292e19e8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRI7615.exe

    Filesize

    569KB

    MD5

    b826083a9675cd9de720b0125785678f

    SHA1

    c835acfda58890e5614a9e3052bbb96af8af70bb

    SHA256

    ebe720bb34eac3a23504952dcde6e42c4d108e7ea011d17e0824eb7e4c684093

    SHA512

    778d639815265887d383ff2c443ca65877dd437aca1df3da9b615ee79380449c1dd0137d19e30e44f45d611f78dd3361dfe9c6b4ff5c8fb043179d49d5d36ff4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRI7615.exe

    Filesize

    569KB

    MD5

    b826083a9675cd9de720b0125785678f

    SHA1

    c835acfda58890e5614a9e3052bbb96af8af70bb

    SHA256

    ebe720bb34eac3a23504952dcde6e42c4d108e7ea011d17e0824eb7e4c684093

    SHA512

    778d639815265887d383ff2c443ca65877dd437aca1df3da9b615ee79380449c1dd0137d19e30e44f45d611f78dd3361dfe9c6b4ff5c8fb043179d49d5d36ff4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp461057.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp461057.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zixC5814.exe

    Filesize

    415KB

    MD5

    5dbd340670a7ff85b94bfbf76da420a5

    SHA1

    d5032dbd2b16e9621dfa2e65151372b1a85385fd

    SHA256

    99d4479923deb8bced59a0fc8ef3b9c28ab67feb846141cc918add4a9d6bd7f2

    SHA512

    ef85747feead53069d0ff210935181b79a4bbfe7f56dc1874281d664b0f0a7ad0f5a4c5dfed07324b416f86fb05b4ec135d3acf5707b68c19ac7dd63a144c964

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zixC5814.exe

    Filesize

    415KB

    MD5

    5dbd340670a7ff85b94bfbf76da420a5

    SHA1

    d5032dbd2b16e9621dfa2e65151372b1a85385fd

    SHA256

    99d4479923deb8bced59a0fc8ef3b9c28ab67feb846141cc918add4a9d6bd7f2

    SHA512

    ef85747feead53069d0ff210935181b79a4bbfe7f56dc1874281d664b0f0a7ad0f5a4c5dfed07324b416f86fb05b4ec135d3acf5707b68c19ac7dd63a144c964

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it589957.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it589957.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr183766.exe

    Filesize

    360KB

    MD5

    f9a1825ed741d512790a5a858287dcc8

    SHA1

    aab6fef216bb9e7938e4d6b1917bfb6c4c4e16f9

    SHA256

    e64e372a544849c95c458cb93c51773e1fd3f3477948dc0c3757d6a044fa725f

    SHA512

    ce2f33dd0cb1f1be64997ae1e3f0f98edc8c1b714aef83e5958906dcfe0ddac81e8830fb6a6430b2524d3ef8dca32a657e1fe3a559fcc8769ac94b82ffd580c8

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr183766.exe

    Filesize

    360KB

    MD5

    f9a1825ed741d512790a5a858287dcc8

    SHA1

    aab6fef216bb9e7938e4d6b1917bfb6c4c4e16f9

    SHA256

    e64e372a544849c95c458cb93c51773e1fd3f3477948dc0c3757d6a044fa725f

    SHA512

    ce2f33dd0cb1f1be64997ae1e3f0f98edc8c1b714aef83e5958906dcfe0ddac81e8830fb6a6430b2524d3ef8dca32a657e1fe3a559fcc8769ac94b82ffd580c8

  • memory/2424-966-0x00000000075D0000-0x000000000761B000-memory.dmp

    Filesize

    300KB

  • memory/2424-965-0x0000000000820000-0x0000000000848000-memory.dmp

    Filesize

    160KB

  • memory/2424-967-0x00000000075C0000-0x00000000075D0000-memory.dmp

    Filesize

    64KB

  • memory/3104-142-0x0000000000770000-0x000000000077A000-memory.dmp

    Filesize

    40KB

  • memory/4032-973-0x00000000046D0000-0x0000000004705000-memory.dmp

    Filesize

    212KB

  • memory/4864-182-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-202-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-154-0x00000000073A0000-0x00000000073B0000-memory.dmp

    Filesize

    64KB

  • memory/4864-155-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-158-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-156-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-160-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-162-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-164-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-166-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-168-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-170-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-172-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-174-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-176-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-178-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-180-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-153-0x00000000073A0000-0x00000000073B0000-memory.dmp

    Filesize

    64KB

  • memory/4864-184-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-186-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-188-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-190-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-192-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-194-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-196-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-198-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-200-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-152-0x00000000073A0000-0x00000000073B0000-memory.dmp

    Filesize

    64KB

  • memory/4864-204-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-206-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-208-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-210-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-212-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-214-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-216-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-218-0x0000000004BB0000-0x0000000004BE5000-memory.dmp

    Filesize

    212KB

  • memory/4864-947-0x0000000009C30000-0x000000000A236000-memory.dmp

    Filesize

    6.0MB

  • memory/4864-948-0x0000000007370000-0x0000000007382000-memory.dmp

    Filesize

    72KB

  • memory/4864-949-0x000000000A240000-0x000000000A34A000-memory.dmp

    Filesize

    1.0MB

  • memory/4864-950-0x000000000A350000-0x000000000A38E000-memory.dmp

    Filesize

    248KB

  • memory/4864-951-0x00000000073A0000-0x00000000073B0000-memory.dmp

    Filesize

    64KB

  • memory/4864-952-0x000000000A3D0000-0x000000000A41B000-memory.dmp

    Filesize

    300KB

  • memory/4864-953-0x000000000A660000-0x000000000A6C6000-memory.dmp

    Filesize

    408KB

  • memory/4864-954-0x000000000AD20000-0x000000000ADB2000-memory.dmp

    Filesize

    584KB

  • memory/4864-955-0x000000000ADC0000-0x000000000AE36000-memory.dmp

    Filesize

    472KB

  • memory/4864-151-0x0000000002CD0000-0x0000000002D16000-memory.dmp

    Filesize

    280KB

  • memory/4864-150-0x0000000004BB0000-0x0000000004BEA000-memory.dmp

    Filesize

    232KB

  • memory/4864-149-0x00000000073B0000-0x00000000078AE000-memory.dmp

    Filesize

    5.0MB

  • memory/4864-148-0x00000000048E0000-0x000000000491C000-memory.dmp

    Filesize

    240KB

  • memory/4864-956-0x000000000AE80000-0x000000000AE9E000-memory.dmp

    Filesize

    120KB

  • memory/4864-957-0x000000000AF50000-0x000000000AFA0000-memory.dmp

    Filesize

    320KB

  • memory/4864-958-0x000000000B1E0000-0x000000000B3A2000-memory.dmp

    Filesize

    1.8MB

  • memory/4864-959-0x000000000B3B0000-0x000000000B8DC000-memory.dmp

    Filesize

    5.2MB