Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
92s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
20/04/2023, 05:32
Static task
static1
General
-
Target
e6916a446c465844ae6afdeadbca0dfd2b109659ef9e7c43798851d653e79002.exe
-
Size
936KB
-
MD5
5ba853a212e4b8fac1d0a8464d759772
-
SHA1
7dc0b1584028b77af60b4743663706892f87085e
-
SHA256
e6916a446c465844ae6afdeadbca0dfd2b109659ef9e7c43798851d653e79002
-
SHA512
88d92495574604ba93c728fe14901663f2ac5d84a2325e6aab193f80293bf16410575c2d0b03bd33ac28206e056e6280538141dd493ca9368618eb40a30d57dc
-
SSDEEP
12288:Zy90hhvSZLZQv2raInUJ38GlTlUrSfqMrwIDXCFShQYfKKF2k6LaHr1LdSH2Hw6L:ZyYwaOeIng33rwsh3Z7+aHZO2Hw6veU
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it658703.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it658703.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it658703.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it658703.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it658703.exe -
Executes dropped EXE 6 IoCs
pid Process 4560 ziJo8411.exe 5040 zihy6433.exe 2068 it658703.exe 2700 jr174562.exe 356 kp390966.exe 4028 lr232746.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it658703.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zihy6433.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zihy6433.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e6916a446c465844ae6afdeadbca0dfd2b109659ef9e7c43798851d653e79002.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e6916a446c465844ae6afdeadbca0dfd2b109659ef9e7c43798851d653e79002.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziJo8411.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziJo8411.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 7 IoCs
pid pid_target Process procid_target 392 4028 WerFault.exe 72 3100 4028 WerFault.exe 72 2068 4028 WerFault.exe 72 3884 4028 WerFault.exe 72 4624 4028 WerFault.exe 72 4732 4028 WerFault.exe 72 944 4028 WerFault.exe 72 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2068 it658703.exe 2068 it658703.exe 2700 jr174562.exe 2700 jr174562.exe 356 kp390966.exe 356 kp390966.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2068 it658703.exe Token: SeDebugPrivilege 2700 jr174562.exe Token: SeDebugPrivilege 356 kp390966.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4144 wrote to memory of 4560 4144 e6916a446c465844ae6afdeadbca0dfd2b109659ef9e7c43798851d653e79002.exe 66 PID 4144 wrote to memory of 4560 4144 e6916a446c465844ae6afdeadbca0dfd2b109659ef9e7c43798851d653e79002.exe 66 PID 4144 wrote to memory of 4560 4144 e6916a446c465844ae6afdeadbca0dfd2b109659ef9e7c43798851d653e79002.exe 66 PID 4560 wrote to memory of 5040 4560 ziJo8411.exe 67 PID 4560 wrote to memory of 5040 4560 ziJo8411.exe 67 PID 4560 wrote to memory of 5040 4560 ziJo8411.exe 67 PID 5040 wrote to memory of 2068 5040 zihy6433.exe 68 PID 5040 wrote to memory of 2068 5040 zihy6433.exe 68 PID 5040 wrote to memory of 2700 5040 zihy6433.exe 69 PID 5040 wrote to memory of 2700 5040 zihy6433.exe 69 PID 5040 wrote to memory of 2700 5040 zihy6433.exe 69 PID 4560 wrote to memory of 356 4560 ziJo8411.exe 71 PID 4560 wrote to memory of 356 4560 ziJo8411.exe 71 PID 4560 wrote to memory of 356 4560 ziJo8411.exe 71 PID 4144 wrote to memory of 4028 4144 e6916a446c465844ae6afdeadbca0dfd2b109659ef9e7c43798851d653e79002.exe 72 PID 4144 wrote to memory of 4028 4144 e6916a446c465844ae6afdeadbca0dfd2b109659ef9e7c43798851d653e79002.exe 72 PID 4144 wrote to memory of 4028 4144 e6916a446c465844ae6afdeadbca0dfd2b109659ef9e7c43798851d653e79002.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6916a446c465844ae6afdeadbca0dfd2b109659ef9e7c43798851d653e79002.exe"C:\Users\Admin\AppData\Local\Temp\e6916a446c465844ae6afdeadbca0dfd2b109659ef9e7c43798851d653e79002.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJo8411.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJo8411.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zihy6433.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zihy6433.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it658703.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it658703.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr174562.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr174562.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp390966.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp390966.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:356
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr232746.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr232746.exe2⤵
- Executes dropped EXE
PID:4028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 6163⤵
- Program crash
PID:392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 6963⤵
- Program crash
PID:3100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 8363⤵
- Program crash
PID:2068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 8443⤵
- Program crash
PID:3884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 8723⤵
- Program crash
PID:4624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 8843⤵
- Program crash
PID:4732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 10603⤵
- Program crash
PID:944
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381KB
MD52cf0e6a0663f4f7256d6e8facc9d9b50
SHA1009db6b64429943ff2aa5ea4c5a3c5a9c6741ba9
SHA2561d2caab70ef647c746aeeb5f93b7a52852d7368baf9eda5b216dd13da3a7a12e
SHA512759aeb00b387c90e9066943dbb083d8e6e6173c8f1befe97a8c7370db33099591d9072545abb2bae63b3c85daceb463c2781496d214041726a27ee8d82ffe20e
-
Filesize
381KB
MD52cf0e6a0663f4f7256d6e8facc9d9b50
SHA1009db6b64429943ff2aa5ea4c5a3c5a9c6741ba9
SHA2561d2caab70ef647c746aeeb5f93b7a52852d7368baf9eda5b216dd13da3a7a12e
SHA512759aeb00b387c90e9066943dbb083d8e6e6173c8f1befe97a8c7370db33099591d9072545abb2bae63b3c85daceb463c2781496d214041726a27ee8d82ffe20e
-
Filesize
623KB
MD59be3ef0f263fd0acda33ec6b7c909acd
SHA16613db489d711288c91543b9be528534ed866e0a
SHA256fe8b5682f9690aa8635e808fa7642f6ce39160789a20372837c39b22d2d92ba3
SHA512d3313aa43d639dccb29179a72d89ec55760adf835421e75ad006a7fe1a0b634cc1a513a5586a514eb5052673c1bcd211145229f676f28e74fe64fa638bb7ffd1
-
Filesize
623KB
MD59be3ef0f263fd0acda33ec6b7c909acd
SHA16613db489d711288c91543b9be528534ed866e0a
SHA256fe8b5682f9690aa8635e808fa7642f6ce39160789a20372837c39b22d2d92ba3
SHA512d3313aa43d639dccb29179a72d89ec55760adf835421e75ad006a7fe1a0b634cc1a513a5586a514eb5052673c1bcd211145229f676f28e74fe64fa638bb7ffd1
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
468KB
MD54aba90cce71e3bda4321610348f7f0a4
SHA15e21b00bc42035318e45ec3cfab50863f23e2edc
SHA256900a35516b7d74cfb37f8e73895d73576fa7cf3f9cf416f4a139ba1dc989ba4f
SHA512f130bc912b35c83034d8935b82f57fdd1bf30f68b60723328d44cfa5312b8d77ec959d7604ff59b79ed508b24d032eeb3c68ab888966c763ec10e5e60641b57e
-
Filesize
468KB
MD54aba90cce71e3bda4321610348f7f0a4
SHA15e21b00bc42035318e45ec3cfab50863f23e2edc
SHA256900a35516b7d74cfb37f8e73895d73576fa7cf3f9cf416f4a139ba1dc989ba4f
SHA512f130bc912b35c83034d8935b82f57fdd1bf30f68b60723328d44cfa5312b8d77ec959d7604ff59b79ed508b24d032eeb3c68ab888966c763ec10e5e60641b57e
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
485KB
MD5e68264d67e11f28228ed602c4de77b58
SHA153e7f46f229aee825933dfa3ec39db4933f3ab71
SHA25640890563de10131e0b567664401552138fa5e2c147d94144dbe2ab672e735651
SHA512f9a906a3c80f49190dfe40f3ac1dd2aa4a0dfc43fbbd9fab6112c2ea251738eaade158dd3ec15c475ea0a658943c6acf55f0b2820919fc7095f8c354efbeb9da
-
Filesize
485KB
MD5e68264d67e11f28228ed602c4de77b58
SHA153e7f46f229aee825933dfa3ec39db4933f3ab71
SHA25640890563de10131e0b567664401552138fa5e2c147d94144dbe2ab672e735651
SHA512f9a906a3c80f49190dfe40f3ac1dd2aa4a0dfc43fbbd9fab6112c2ea251738eaade158dd3ec15c475ea0a658943c6acf55f0b2820919fc7095f8c354efbeb9da