Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
20/04/2023, 06:14
Static task
static1
General
-
Target
779bf6c876da1c00db5aca32640aa0bf9db29f6843a12e607df3b45d34c000ee.exe
-
Size
936KB
-
MD5
4b59bbe415f025719fb0b0495f687da1
-
SHA1
dfb486a0a343d87ab187e9d53d219f236bd0e8f5
-
SHA256
779bf6c876da1c00db5aca32640aa0bf9db29f6843a12e607df3b45d34c000ee
-
SHA512
7508db0b41138e6dde00331636904afc3cc499ecbb1de90279d8af7f3ed60e0f527142912f3c83911282d81cb00e0d451fc359a8f6567b57c9f130854c2dc8da
-
SSDEEP
24576:dVyK6NexXMbPCVUrrSQ2nEJcoft04wzzSKuW+:dwK6NKMzMcrSQzJcEq45KB
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it364117.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it364117.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it364117.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it364117.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it364117.exe -
Executes dropped EXE 6 IoCs
pid Process 2344 zivL5547.exe 2420 zivO6685.exe 2924 it364117.exe 4424 jr480167.exe 4084 kp156417.exe 2548 lr106269.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it364117.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 779bf6c876da1c00db5aca32640aa0bf9db29f6843a12e607df3b45d34c000ee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 779bf6c876da1c00db5aca32640aa0bf9db29f6843a12e607df3b45d34c000ee.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zivL5547.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zivL5547.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zivO6685.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zivO6685.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 7 IoCs
pid pid_target Process procid_target 1820 2548 WerFault.exe 72 4104 2548 WerFault.exe 72 2380 2548 WerFault.exe 72 2472 2548 WerFault.exe 72 2148 2548 WerFault.exe 72 3284 2548 WerFault.exe 72 4744 2548 WerFault.exe 72 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2924 it364117.exe 2924 it364117.exe 4424 jr480167.exe 4424 jr480167.exe 4084 kp156417.exe 4084 kp156417.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2924 it364117.exe Token: SeDebugPrivilege 4424 jr480167.exe Token: SeDebugPrivilege 4084 kp156417.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2344 2064 779bf6c876da1c00db5aca32640aa0bf9db29f6843a12e607df3b45d34c000ee.exe 66 PID 2064 wrote to memory of 2344 2064 779bf6c876da1c00db5aca32640aa0bf9db29f6843a12e607df3b45d34c000ee.exe 66 PID 2064 wrote to memory of 2344 2064 779bf6c876da1c00db5aca32640aa0bf9db29f6843a12e607df3b45d34c000ee.exe 66 PID 2344 wrote to memory of 2420 2344 zivL5547.exe 67 PID 2344 wrote to memory of 2420 2344 zivL5547.exe 67 PID 2344 wrote to memory of 2420 2344 zivL5547.exe 67 PID 2420 wrote to memory of 2924 2420 zivO6685.exe 68 PID 2420 wrote to memory of 2924 2420 zivO6685.exe 68 PID 2420 wrote to memory of 4424 2420 zivO6685.exe 69 PID 2420 wrote to memory of 4424 2420 zivO6685.exe 69 PID 2420 wrote to memory of 4424 2420 zivO6685.exe 69 PID 2344 wrote to memory of 4084 2344 zivL5547.exe 71 PID 2344 wrote to memory of 4084 2344 zivL5547.exe 71 PID 2344 wrote to memory of 4084 2344 zivL5547.exe 71 PID 2064 wrote to memory of 2548 2064 779bf6c876da1c00db5aca32640aa0bf9db29f6843a12e607df3b45d34c000ee.exe 72 PID 2064 wrote to memory of 2548 2064 779bf6c876da1c00db5aca32640aa0bf9db29f6843a12e607df3b45d34c000ee.exe 72 PID 2064 wrote to memory of 2548 2064 779bf6c876da1c00db5aca32640aa0bf9db29f6843a12e607df3b45d34c000ee.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\779bf6c876da1c00db5aca32640aa0bf9db29f6843a12e607df3b45d34c000ee.exe"C:\Users\Admin\AppData\Local\Temp\779bf6c876da1c00db5aca32640aa0bf9db29f6843a12e607df3b45d34c000ee.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivL5547.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivL5547.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zivO6685.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zivO6685.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it364117.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it364117.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr480167.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr480167.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp156417.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp156417.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4084
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr106269.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr106269.exe2⤵
- Executes dropped EXE
PID:2548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 6163⤵
- Program crash
PID:1820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 6963⤵
- Program crash
PID:4104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 8363⤵
- Program crash
PID:2380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 8803⤵
- Program crash
PID:2472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 9043⤵
- Program crash
PID:2148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 8523⤵
- Program crash
PID:3284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 10683⤵
- Program crash
PID:4744
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381KB
MD5cad77226c687739cc9c4c4de95709d35
SHA12edb530e71e26a1d629d1f9bdc56f837ec1116d4
SHA2567e542d101598a5fda2ea37800866546da7f376983731c279f1edf71a97738ef2
SHA512a27961023d9d07a82f84a2d6dd395ba5512d26fe54b69c378ab5cc5c5d14c654a8ed609a3fc92552000182d63804c8f8f36cd4caa3d0be86b830127eb0e1826b
-
Filesize
381KB
MD5cad77226c687739cc9c4c4de95709d35
SHA12edb530e71e26a1d629d1f9bdc56f837ec1116d4
SHA2567e542d101598a5fda2ea37800866546da7f376983731c279f1edf71a97738ef2
SHA512a27961023d9d07a82f84a2d6dd395ba5512d26fe54b69c378ab5cc5c5d14c654a8ed609a3fc92552000182d63804c8f8f36cd4caa3d0be86b830127eb0e1826b
-
Filesize
623KB
MD5c7474e06be77c9a73f5aefd9f5e4d20c
SHA1a3ad30cfe3a8057cc738426522e26a0d3b135b12
SHA25678eabd901685c4b32a908cbf195846aadb8fafc218ee672ed1cc9311f53b4ff9
SHA5122cbfa791e8e5ad7217a34e75a13598cfdaa988134a8581a8ab9b6b0d2d6f72edcf90b6498d2f4c6d0da9933c8be591fa03f9ce38d352b94df38233a54cd33651
-
Filesize
623KB
MD5c7474e06be77c9a73f5aefd9f5e4d20c
SHA1a3ad30cfe3a8057cc738426522e26a0d3b135b12
SHA25678eabd901685c4b32a908cbf195846aadb8fafc218ee672ed1cc9311f53b4ff9
SHA5122cbfa791e8e5ad7217a34e75a13598cfdaa988134a8581a8ab9b6b0d2d6f72edcf90b6498d2f4c6d0da9933c8be591fa03f9ce38d352b94df38233a54cd33651
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
468KB
MD5821995b7af7a7dac27140411a71a4593
SHA1fc43d4ed7720e4086dc49ce9f690afafd87f19b6
SHA256e39cf9198670b527c96f696770976327c8a8fd8ef107631b320c2f17d93ecf67
SHA512437978a14efaeaf9f7faeeb0cc48a214166022b9fb6b4d573f8cb2ae097e18b193d34d8d7b006c6928f80e0b92023cc95b9eb581fee11db55e32cbf0d48ff7d8
-
Filesize
468KB
MD5821995b7af7a7dac27140411a71a4593
SHA1fc43d4ed7720e4086dc49ce9f690afafd87f19b6
SHA256e39cf9198670b527c96f696770976327c8a8fd8ef107631b320c2f17d93ecf67
SHA512437978a14efaeaf9f7faeeb0cc48a214166022b9fb6b4d573f8cb2ae097e18b193d34d8d7b006c6928f80e0b92023cc95b9eb581fee11db55e32cbf0d48ff7d8
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
485KB
MD5f18696c2367ab4356ae2016ad934f3d3
SHA162a0cf82b8c6e752ab489a533eeecc9440a92205
SHA256f35079fd230abc9b950c34ecd4db2a8fa0d369c634e3c85e709f519414f324c1
SHA512d2f2fb59fc540b222c4a3c6196988517424cd67df41db83be1c98020b405726ca7e242c0e6f4d39df65273c8d82810e7785a05eff49ee238df8417e5d7feacde
-
Filesize
485KB
MD5f18696c2367ab4356ae2016ad934f3d3
SHA162a0cf82b8c6e752ab489a533eeecc9440a92205
SHA256f35079fd230abc9b950c34ecd4db2a8fa0d369c634e3c85e709f519414f324c1
SHA512d2f2fb59fc540b222c4a3c6196988517424cd67df41db83be1c98020b405726ca7e242c0e6f4d39df65273c8d82810e7785a05eff49ee238df8417e5d7feacde