Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19/04/2023, 13:26

General

  • Target

    45f15425b43fba2cef1e7424c3a83198f330709fb8a644302de69219df6b8a8e.exe

  • Size

    828KB

  • MD5

    7c939b3c38052bcc4f43793e00078f32

  • SHA1

    a9876566ff5f649ca835f55daa4a7a9553e70c70

  • SHA256

    45f15425b43fba2cef1e7424c3a83198f330709fb8a644302de69219df6b8a8e

  • SHA512

    5eca80a8204f4750576bd65c24e7f7fbecea619a5af8f6ce16cf74937d528afd3f55df967e9bf83c126965fc3238444ca2d3a1a687e325932c12da4ecaf8a5df

  • SSDEEP

    12288:Xy90J2VwiFT4bUnrJkD9C0Le6pCJGJWpux2fZSPKsc+ZIjbLeDG++:XygS2gB0Le6pqFfYPKsc+Zoqa

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45f15425b43fba2cef1e7424c3a83198f330709fb8a644302de69219df6b8a8e.exe
    "C:\Users\Admin\AppData\Local\Temp\45f15425b43fba2cef1e7424c3a83198f330709fb8a644302de69219df6b8a8e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3532
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLD3651.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLD3651.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3996
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zijM5447.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zijM5447.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3508
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it444913.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it444913.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2104
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr941120.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr941120.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1448
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp744372.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp744372.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3580
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr954740.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr954740.exe
      2⤵
      • Executes dropped EXE
      PID:3980
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 640
        3⤵
        • Program crash
        PID:3456
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 716
        3⤵
        • Program crash
        PID:2100
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 840
        3⤵
        • Program crash
        PID:60
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 852
        3⤵
        • Program crash
        PID:3876
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 880
        3⤵
        • Program crash
        PID:4432
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 856
        3⤵
        • Program crash
        PID:4716
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 1088
        3⤵
        • Program crash
        PID:4216

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr954740.exe

    Filesize

    256KB

    MD5

    fe3be727f630a8480fe1b4db0d250c44

    SHA1

    2d6c4af10703a269d27551f9f67abf55fa70040a

    SHA256

    d46f8e8555f30330a38053ef7ea7762652c6c4e2332348970be93218c8fba88c

    SHA512

    7cdf8a89f409df39151c7f58abcdbb56ae9ef75adce626462729205c2b1afdd4205b62016342a6ce777870af2b9d710f285e0db74a072e994bf3166ad666c545

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr954740.exe

    Filesize

    256KB

    MD5

    fe3be727f630a8480fe1b4db0d250c44

    SHA1

    2d6c4af10703a269d27551f9f67abf55fa70040a

    SHA256

    d46f8e8555f30330a38053ef7ea7762652c6c4e2332348970be93218c8fba88c

    SHA512

    7cdf8a89f409df39151c7f58abcdbb56ae9ef75adce626462729205c2b1afdd4205b62016342a6ce777870af2b9d710f285e0db74a072e994bf3166ad666c545

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLD3651.exe

    Filesize

    569KB

    MD5

    c16023841e63fcf5249ae80f18384c26

    SHA1

    c883137202d6b190105bc7b56754828ffbadbda0

    SHA256

    11f30854b40093d724b337caf10705d0073c34bb2f420320ff47bdc2cc5f21e6

    SHA512

    94c1969e225ade291934c191ed72a555c2a6ca82b2ceef746276be75a99a892fef0d70a95bb0bceaac308d985aaf6e8975cd777a24df4ad2db871968942d8c2c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLD3651.exe

    Filesize

    569KB

    MD5

    c16023841e63fcf5249ae80f18384c26

    SHA1

    c883137202d6b190105bc7b56754828ffbadbda0

    SHA256

    11f30854b40093d724b337caf10705d0073c34bb2f420320ff47bdc2cc5f21e6

    SHA512

    94c1969e225ade291934c191ed72a555c2a6ca82b2ceef746276be75a99a892fef0d70a95bb0bceaac308d985aaf6e8975cd777a24df4ad2db871968942d8c2c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp744372.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp744372.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zijM5447.exe

    Filesize

    415KB

    MD5

    e6ae79a1d8ceb66ead163b33ddaeba24

    SHA1

    d5800f73be84df34eac10940f94491efa3ae50e2

    SHA256

    9a7b4ee5f5b6f1b402b0f3d27121f072ce0147694331894011ea7bf08fab471c

    SHA512

    30361f42fd78189eaba1456a78681b408d4fff97ba43de1c1be2b06cbc47e43be5274e35d7b8476f2e69088fb3831600e21f2380d4673d86a2f30beccd9188a4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zijM5447.exe

    Filesize

    415KB

    MD5

    e6ae79a1d8ceb66ead163b33ddaeba24

    SHA1

    d5800f73be84df34eac10940f94491efa3ae50e2

    SHA256

    9a7b4ee5f5b6f1b402b0f3d27121f072ce0147694331894011ea7bf08fab471c

    SHA512

    30361f42fd78189eaba1456a78681b408d4fff97ba43de1c1be2b06cbc47e43be5274e35d7b8476f2e69088fb3831600e21f2380d4673d86a2f30beccd9188a4

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it444913.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it444913.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr941120.exe

    Filesize

    360KB

    MD5

    5745b4474ab76eb2d43b9f9ee207123e

    SHA1

    7c08e5fac32b10894c84ce5f99034e74e9091b19

    SHA256

    63ecc2f70d5332c626e4854d442902c1c68559d7bb4cf50a63a8211a93445cf2

    SHA512

    7c4b18e50a64b8c5c46132e2d7b9343255767b6f0dc1629e41883b5fdd51831aa68d7302a2b29588d4cee529f8aaae1d8f717a5b129046c08196e411fc3ea903

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr941120.exe

    Filesize

    360KB

    MD5

    5745b4474ab76eb2d43b9f9ee207123e

    SHA1

    7c08e5fac32b10894c84ce5f99034e74e9091b19

    SHA256

    63ecc2f70d5332c626e4854d442902c1c68559d7bb4cf50a63a8211a93445cf2

    SHA512

    7c4b18e50a64b8c5c46132e2d7b9343255767b6f0dc1629e41883b5fdd51831aa68d7302a2b29588d4cee529f8aaae1d8f717a5b129046c08196e411fc3ea903

  • memory/1448-180-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-194-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-146-0x0000000007680000-0x00000000076BA000-memory.dmp

    Filesize

    232KB

  • memory/1448-147-0x0000000002F30000-0x0000000002F76000-memory.dmp

    Filesize

    280KB

  • memory/1448-148-0x0000000007170000-0x0000000007180000-memory.dmp

    Filesize

    64KB

  • memory/1448-149-0x0000000007170000-0x0000000007180000-memory.dmp

    Filesize

    64KB

  • memory/1448-150-0x0000000007170000-0x0000000007180000-memory.dmp

    Filesize

    64KB

  • memory/1448-151-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-152-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-154-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-156-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-158-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-160-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-162-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-164-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-166-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-168-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-170-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-172-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-174-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-176-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-178-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-144-0x00000000070F0000-0x000000000712C000-memory.dmp

    Filesize

    240KB

  • memory/1448-182-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-184-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-186-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-188-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-190-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-192-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-145-0x0000000007180000-0x000000000767E000-memory.dmp

    Filesize

    5.0MB

  • memory/1448-196-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-198-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-200-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-202-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-204-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-206-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-208-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-210-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-212-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-214-0x0000000007680000-0x00000000076B5000-memory.dmp

    Filesize

    212KB

  • memory/1448-943-0x0000000009B80000-0x000000000A186000-memory.dmp

    Filesize

    6.0MB

  • memory/1448-944-0x000000000A200000-0x000000000A212000-memory.dmp

    Filesize

    72KB

  • memory/1448-945-0x000000000A230000-0x000000000A33A000-memory.dmp

    Filesize

    1.0MB

  • memory/1448-946-0x000000000A350000-0x000000000A38E000-memory.dmp

    Filesize

    248KB

  • memory/1448-947-0x000000000A3D0000-0x000000000A41B000-memory.dmp

    Filesize

    300KB

  • memory/1448-948-0x0000000007170000-0x0000000007180000-memory.dmp

    Filesize

    64KB

  • memory/1448-949-0x000000000A660000-0x000000000A6C6000-memory.dmp

    Filesize

    408KB

  • memory/1448-950-0x000000000AD10000-0x000000000ADA2000-memory.dmp

    Filesize

    584KB

  • memory/1448-951-0x000000000ADE0000-0x000000000AE56000-memory.dmp

    Filesize

    472KB

  • memory/1448-952-0x000000000AEA0000-0x000000000B062000-memory.dmp

    Filesize

    1.8MB

  • memory/1448-953-0x000000000B080000-0x000000000B5AC000-memory.dmp

    Filesize

    5.2MB

  • memory/1448-954-0x000000000B6C0000-0x000000000B6DE000-memory.dmp

    Filesize

    120KB

  • memory/1448-955-0x0000000004BC0000-0x0000000004C10000-memory.dmp

    Filesize

    320KB

  • memory/2104-138-0x0000000000580000-0x000000000058A000-memory.dmp

    Filesize

    40KB

  • memory/3580-961-0x00000000006D0000-0x00000000006F8000-memory.dmp

    Filesize

    160KB

  • memory/3580-962-0x0000000007400000-0x000000000744B000-memory.dmp

    Filesize

    300KB

  • memory/3580-963-0x0000000007450000-0x0000000007460000-memory.dmp

    Filesize

    64KB

  • memory/3980-969-0x0000000002CE0000-0x0000000002D15000-memory.dmp

    Filesize

    212KB