Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    131s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20/04/2023, 21:47

General

  • Target

    26b9cab8db789c5323c3a67d1c0b6026a4252697eeb9e75e0f834c9addc527cb.exe

  • Size

    920KB

  • MD5

    01347664a06c221bbabc608d99fee8e3

  • SHA1

    9e48ad944a719b086417e1c625161c94d01ec00f

  • SHA256

    26b9cab8db789c5323c3a67d1c0b6026a4252697eeb9e75e0f834c9addc527cb

  • SHA512

    90443f8ce66b4cf7bb25a2240dde7b763e6a9b40270ae4a5eef12af91293a67d012b4f63d951cea6ce6451c46724a13a122edecf0d8efda79912d0d90e66dd31

  • SSDEEP

    12288:4y90Hn8E6SdHZsWSfOK4TCyNg3NI3eBZaZKb0MFVeCPs4RcbX+FyNQly6jUqv:4yinOi0OgmknaZKoMFYSsveuQWqv

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26b9cab8db789c5323c3a67d1c0b6026a4252697eeb9e75e0f834c9addc527cb.exe
    "C:\Users\Admin\AppData\Local\Temp\26b9cab8db789c5323c3a67d1c0b6026a4252697eeb9e75e0f834c9addc527cb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwr7394.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwr7394.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2368
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziHC3316.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziHC3316.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2664
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it576829.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it576829.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2740
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr475406.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr475406.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1604
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp891483.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp891483.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1844
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr042329.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr042329.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:1624
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 616
        3⤵
        • Program crash
        PID:2624
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 696
        3⤵
        • Program crash
        PID:2784
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 836
        3⤵
        • Program crash
        PID:4988
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 844
        3⤵
        • Program crash
        PID:2832
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 872
        3⤵
        • Program crash
        PID:3828
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 884
        3⤵
        • Program crash
        PID:4648
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 1116
        3⤵
        • Program crash
        PID:2248
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 1156
        3⤵
        • Program crash
        PID:4776
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 1176
        3⤵
        • Program crash
        PID:4788

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr042329.exe

    Filesize

    367KB

    MD5

    a5bd798014efe448fee5c92495a84101

    SHA1

    2ca9671b113b8a314e1bfc17f1f03705113d8e49

    SHA256

    536cc1ee59430364a21ee6eff9f198aa608474b041737983dc47e30ac10a6e96

    SHA512

    86cc99689946026536f6ebd4f77b5fc97f9a033a8db09a8dac735bd3eb414574b2190c1a4a5888350ffe321bc178eeaf6bbcb556ea82c3a9621e05f08a36482e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr042329.exe

    Filesize

    367KB

    MD5

    a5bd798014efe448fee5c92495a84101

    SHA1

    2ca9671b113b8a314e1bfc17f1f03705113d8e49

    SHA256

    536cc1ee59430364a21ee6eff9f198aa608474b041737983dc47e30ac10a6e96

    SHA512

    86cc99689946026536f6ebd4f77b5fc97f9a033a8db09a8dac735bd3eb414574b2190c1a4a5888350ffe321bc178eeaf6bbcb556ea82c3a9621e05f08a36482e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwr7394.exe

    Filesize

    616KB

    MD5

    b52d073f0287a59bce54a7da9b180e90

    SHA1

    32a87256e5a6e941b7c6fec3cbfe767be5ed014e

    SHA256

    b69ba0798ac23055fa91929cb1e22ba023ddb95684369d22a32da2cac2032ed0

    SHA512

    afec173de5d3f259f73fc2762f1af24f19a39519e0dca9070924131ea42757a92ff3cd82efcc5003a69f3072572bdc6ccd3a49f6455a7c695e1ca205c06f985b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwr7394.exe

    Filesize

    616KB

    MD5

    b52d073f0287a59bce54a7da9b180e90

    SHA1

    32a87256e5a6e941b7c6fec3cbfe767be5ed014e

    SHA256

    b69ba0798ac23055fa91929cb1e22ba023ddb95684369d22a32da2cac2032ed0

    SHA512

    afec173de5d3f259f73fc2762f1af24f19a39519e0dca9070924131ea42757a92ff3cd82efcc5003a69f3072572bdc6ccd3a49f6455a7c695e1ca205c06f985b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp891483.exe

    Filesize

    136KB

    MD5

    ac0ffc4fceebe7be421ae8fc8517d1bf

    SHA1

    fa6a6f1878e561b5401ae36422add3d34cfdf6dd

    SHA256

    fe0c2e45eda219cfb1d2bd132437d2412d84cbe8cc2787dd4ff710e1be5c9718

    SHA512

    23de94ab73fc8cf91d573870d7ac1fb6976eaed31d93e0619378ea93ac5feaf06967bc652525b584bba1b973a2c6e6075b8d7dbe3a8ddf5d569b4e80722bfb93

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp891483.exe

    Filesize

    136KB

    MD5

    ac0ffc4fceebe7be421ae8fc8517d1bf

    SHA1

    fa6a6f1878e561b5401ae36422add3d34cfdf6dd

    SHA256

    fe0c2e45eda219cfb1d2bd132437d2412d84cbe8cc2787dd4ff710e1be5c9718

    SHA512

    23de94ab73fc8cf91d573870d7ac1fb6976eaed31d93e0619378ea93ac5feaf06967bc652525b584bba1b973a2c6e6075b8d7dbe3a8ddf5d569b4e80722bfb93

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziHC3316.exe

    Filesize

    461KB

    MD5

    aeb7ea01d89e26ac3f2dde09c325c319

    SHA1

    fcc8aa5a3dc74af02d35ea355e468e971aa92064

    SHA256

    9a8dbc7d0b61b74e56538303c7ed5446e0e914dcdefc23ea075f2ace0d9c251c

    SHA512

    fe8f1f6fad17420e8b79e6ea7fcb3bcc8572487bd7dae53c4cc9ba469f83d620fa43abf4a3aeeef9e6f81883c1d97d4a7fbd44a86730e3648334d939541ce6c0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziHC3316.exe

    Filesize

    461KB

    MD5

    aeb7ea01d89e26ac3f2dde09c325c319

    SHA1

    fcc8aa5a3dc74af02d35ea355e468e971aa92064

    SHA256

    9a8dbc7d0b61b74e56538303c7ed5446e0e914dcdefc23ea075f2ace0d9c251c

    SHA512

    fe8f1f6fad17420e8b79e6ea7fcb3bcc8572487bd7dae53c4cc9ba469f83d620fa43abf4a3aeeef9e6f81883c1d97d4a7fbd44a86730e3648334d939541ce6c0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it576829.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it576829.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr475406.exe

    Filesize

    472KB

    MD5

    5660ca80741a62c2259d2d9ca391f684

    SHA1

    3fbfd23caf98a2ce3e4e592787495a0d102a5483

    SHA256

    66bf29c60e90a2d7ff92d8363cc2f1390403af660e1fa537cc1080068085d9f5

    SHA512

    d5e99a15df02b61e518966fd2be768ae2bd6bfb8e72fa59f67734aa3a5c2e8807eb501c5fbc7b4650d4500681a083dd3233ceb81535ff4a70b08500fc6be5d59

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr475406.exe

    Filesize

    472KB

    MD5

    5660ca80741a62c2259d2d9ca391f684

    SHA1

    3fbfd23caf98a2ce3e4e592787495a0d102a5483

    SHA256

    66bf29c60e90a2d7ff92d8363cc2f1390403af660e1fa537cc1080068085d9f5

    SHA512

    d5e99a15df02b61e518966fd2be768ae2bd6bfb8e72fa59f67734aa3a5c2e8807eb501c5fbc7b4650d4500681a083dd3233ceb81535ff4a70b08500fc6be5d59

  • memory/1604-186-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-210-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-150-0x0000000004E10000-0x0000000004E4A000-memory.dmp

    Filesize

    232KB

  • memory/1604-151-0x0000000000820000-0x0000000000866000-memory.dmp

    Filesize

    280KB

  • memory/1604-152-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/1604-153-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/1604-154-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/1604-155-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-156-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-158-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-160-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-162-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-164-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-166-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-168-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-170-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-172-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-174-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-176-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-178-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-180-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-188-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-148-0x0000000002910000-0x000000000294C000-memory.dmp

    Filesize

    240KB

  • memory/1604-190-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-184-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-182-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-192-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-194-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-198-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-149-0x0000000004EE0000-0x00000000053DE000-memory.dmp

    Filesize

    5.0MB

  • memory/1604-212-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-208-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-206-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-214-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-204-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-202-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-200-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-196-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-218-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-216-0x0000000004E10000-0x0000000004E45000-memory.dmp

    Filesize

    212KB

  • memory/1604-947-0x0000000007860000-0x0000000007E66000-memory.dmp

    Filesize

    6.0MB

  • memory/1604-948-0x0000000007E70000-0x0000000007E82000-memory.dmp

    Filesize

    72KB

  • memory/1604-949-0x0000000007E90000-0x0000000007F9A000-memory.dmp

    Filesize

    1.0MB

  • memory/1604-950-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/1604-951-0x0000000007FB0000-0x0000000007FEE000-memory.dmp

    Filesize

    248KB

  • memory/1604-952-0x0000000008030000-0x000000000807B000-memory.dmp

    Filesize

    300KB

  • memory/1604-953-0x00000000082C0000-0x0000000008326000-memory.dmp

    Filesize

    408KB

  • memory/1604-954-0x0000000008970000-0x0000000008A02000-memory.dmp

    Filesize

    584KB

  • memory/1604-955-0x0000000008A20000-0x0000000008A70000-memory.dmp

    Filesize

    320KB

  • memory/1604-956-0x0000000008A90000-0x0000000008B06000-memory.dmp

    Filesize

    472KB

  • memory/1604-957-0x0000000008B60000-0x0000000008D22000-memory.dmp

    Filesize

    1.8MB

  • memory/1604-958-0x0000000008D30000-0x000000000925C000-memory.dmp

    Filesize

    5.2MB

  • memory/1604-959-0x0000000009380000-0x000000000939E000-memory.dmp

    Filesize

    120KB

  • memory/1624-973-0x0000000000800000-0x0000000000835000-memory.dmp

    Filesize

    212KB

  • memory/1844-965-0x0000000000E70000-0x0000000000E98000-memory.dmp

    Filesize

    160KB

  • memory/1844-966-0x0000000007C10000-0x0000000007C5B000-memory.dmp

    Filesize

    300KB

  • memory/1844-967-0x0000000007F50000-0x0000000007F60000-memory.dmp

    Filesize

    64KB

  • memory/2740-142-0x0000000000D60000-0x0000000000D6A000-memory.dmp

    Filesize

    40KB