Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20/04/2023, 06:14

General

  • Target

    779bf6c876da1c00db5aca32640aa0bf9db29f6843a12e607df3b45d34c000ee.exe

  • Size

    936KB

  • MD5

    4b59bbe415f025719fb0b0495f687da1

  • SHA1

    dfb486a0a343d87ab187e9d53d219f236bd0e8f5

  • SHA256

    779bf6c876da1c00db5aca32640aa0bf9db29f6843a12e607df3b45d34c000ee

  • SHA512

    7508db0b41138e6dde00331636904afc3cc499ecbb1de90279d8af7f3ed60e0f527142912f3c83911282d81cb00e0d451fc359a8f6567b57c9f130854c2dc8da

  • SSDEEP

    24576:dVyK6NexXMbPCVUrrSQ2nEJcoft04wzzSKuW+:dwK6NKMzMcrSQzJcEq45KB

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\779bf6c876da1c00db5aca32640aa0bf9db29f6843a12e607df3b45d34c000ee.exe
    "C:\Users\Admin\AppData\Local\Temp\779bf6c876da1c00db5aca32640aa0bf9db29f6843a12e607df3b45d34c000ee.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivL5547.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivL5547.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2344
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zivO6685.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zivO6685.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2420
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it364117.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it364117.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2924
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr480167.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr480167.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4424
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp156417.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp156417.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4084
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr106269.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr106269.exe
      2⤵
      • Executes dropped EXE
      PID:2548
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 616
        3⤵
        • Program crash
        PID:1820
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 696
        3⤵
        • Program crash
        PID:4104
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 836
        3⤵
        • Program crash
        PID:2380
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 880
        3⤵
        • Program crash
        PID:2472
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 904
        3⤵
        • Program crash
        PID:2148
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 852
        3⤵
        • Program crash
        PID:3284
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 1068
        3⤵
        • Program crash
        PID:4744

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr106269.exe

    Filesize

    381KB

    MD5

    cad77226c687739cc9c4c4de95709d35

    SHA1

    2edb530e71e26a1d629d1f9bdc56f837ec1116d4

    SHA256

    7e542d101598a5fda2ea37800866546da7f376983731c279f1edf71a97738ef2

    SHA512

    a27961023d9d07a82f84a2d6dd395ba5512d26fe54b69c378ab5cc5c5d14c654a8ed609a3fc92552000182d63804c8f8f36cd4caa3d0be86b830127eb0e1826b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr106269.exe

    Filesize

    381KB

    MD5

    cad77226c687739cc9c4c4de95709d35

    SHA1

    2edb530e71e26a1d629d1f9bdc56f837ec1116d4

    SHA256

    7e542d101598a5fda2ea37800866546da7f376983731c279f1edf71a97738ef2

    SHA512

    a27961023d9d07a82f84a2d6dd395ba5512d26fe54b69c378ab5cc5c5d14c654a8ed609a3fc92552000182d63804c8f8f36cd4caa3d0be86b830127eb0e1826b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivL5547.exe

    Filesize

    623KB

    MD5

    c7474e06be77c9a73f5aefd9f5e4d20c

    SHA1

    a3ad30cfe3a8057cc738426522e26a0d3b135b12

    SHA256

    78eabd901685c4b32a908cbf195846aadb8fafc218ee672ed1cc9311f53b4ff9

    SHA512

    2cbfa791e8e5ad7217a34e75a13598cfdaa988134a8581a8ab9b6b0d2d6f72edcf90b6498d2f4c6d0da9933c8be591fa03f9ce38d352b94df38233a54cd33651

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivL5547.exe

    Filesize

    623KB

    MD5

    c7474e06be77c9a73f5aefd9f5e4d20c

    SHA1

    a3ad30cfe3a8057cc738426522e26a0d3b135b12

    SHA256

    78eabd901685c4b32a908cbf195846aadb8fafc218ee672ed1cc9311f53b4ff9

    SHA512

    2cbfa791e8e5ad7217a34e75a13598cfdaa988134a8581a8ab9b6b0d2d6f72edcf90b6498d2f4c6d0da9933c8be591fa03f9ce38d352b94df38233a54cd33651

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp156417.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp156417.exe

    Filesize

    136KB

    MD5

    86810f340795831f3c2bd147981be929

    SHA1

    573345e2c322720fa43f74d761ff1d48028f36c9

    SHA256

    d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139

    SHA512

    c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zivO6685.exe

    Filesize

    468KB

    MD5

    821995b7af7a7dac27140411a71a4593

    SHA1

    fc43d4ed7720e4086dc49ce9f690afafd87f19b6

    SHA256

    e39cf9198670b527c96f696770976327c8a8fd8ef107631b320c2f17d93ecf67

    SHA512

    437978a14efaeaf9f7faeeb0cc48a214166022b9fb6b4d573f8cb2ae097e18b193d34d8d7b006c6928f80e0b92023cc95b9eb581fee11db55e32cbf0d48ff7d8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zivO6685.exe

    Filesize

    468KB

    MD5

    821995b7af7a7dac27140411a71a4593

    SHA1

    fc43d4ed7720e4086dc49ce9f690afafd87f19b6

    SHA256

    e39cf9198670b527c96f696770976327c8a8fd8ef107631b320c2f17d93ecf67

    SHA512

    437978a14efaeaf9f7faeeb0cc48a214166022b9fb6b4d573f8cb2ae097e18b193d34d8d7b006c6928f80e0b92023cc95b9eb581fee11db55e32cbf0d48ff7d8

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it364117.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it364117.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr480167.exe

    Filesize

    485KB

    MD5

    f18696c2367ab4356ae2016ad934f3d3

    SHA1

    62a0cf82b8c6e752ab489a533eeecc9440a92205

    SHA256

    f35079fd230abc9b950c34ecd4db2a8fa0d369c634e3c85e709f519414f324c1

    SHA512

    d2f2fb59fc540b222c4a3c6196988517424cd67df41db83be1c98020b405726ca7e242c0e6f4d39df65273c8d82810e7785a05eff49ee238df8417e5d7feacde

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr480167.exe

    Filesize

    485KB

    MD5

    f18696c2367ab4356ae2016ad934f3d3

    SHA1

    62a0cf82b8c6e752ab489a533eeecc9440a92205

    SHA256

    f35079fd230abc9b950c34ecd4db2a8fa0d369c634e3c85e709f519414f324c1

    SHA512

    d2f2fb59fc540b222c4a3c6196988517424cd67df41db83be1c98020b405726ca7e242c0e6f4d39df65273c8d82810e7785a05eff49ee238df8417e5d7feacde

  • memory/2548-973-0x00000000008E0000-0x0000000000915000-memory.dmp

    Filesize

    212KB

  • memory/2924-142-0x0000000000D20000-0x0000000000D2A000-memory.dmp

    Filesize

    40KB

  • memory/4084-965-0x0000000000D10000-0x0000000000D38000-memory.dmp

    Filesize

    160KB

  • memory/4084-966-0x0000000007AA0000-0x0000000007AEB000-memory.dmp

    Filesize

    300KB

  • memory/4084-967-0x0000000007A90000-0x0000000007AA0000-memory.dmp

    Filesize

    64KB

  • memory/4424-192-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-206-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-154-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-156-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-158-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-160-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-162-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-164-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-166-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-168-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-170-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-172-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-174-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-178-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-176-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-180-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-184-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-152-0x00000000052A0000-0x00000000052DA000-memory.dmp

    Filesize

    232KB

  • memory/4424-190-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-188-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-194-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-186-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-182-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-198-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-208-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-210-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-212-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-153-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-204-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-202-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-200-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-196-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-216-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-214-0x00000000052A0000-0x00000000052D5000-memory.dmp

    Filesize

    212KB

  • memory/4424-241-0x0000000002840000-0x0000000002850000-memory.dmp

    Filesize

    64KB

  • memory/4424-243-0x0000000002840000-0x0000000002850000-memory.dmp

    Filesize

    64KB

  • memory/4424-947-0x0000000007DD0000-0x00000000083D6000-memory.dmp

    Filesize

    6.0MB

  • memory/4424-948-0x0000000007850000-0x0000000007862000-memory.dmp

    Filesize

    72KB

  • memory/4424-949-0x0000000007880000-0x000000000798A000-memory.dmp

    Filesize

    1.0MB

  • memory/4424-950-0x00000000079A0000-0x00000000079DE000-memory.dmp

    Filesize

    248KB

  • memory/4424-951-0x0000000007A20000-0x0000000007A6B000-memory.dmp

    Filesize

    300KB

  • memory/4424-952-0x0000000002840000-0x0000000002850000-memory.dmp

    Filesize

    64KB

  • memory/4424-953-0x0000000007CB0000-0x0000000007D16000-memory.dmp

    Filesize

    408KB

  • memory/4424-954-0x0000000008980000-0x0000000008A12000-memory.dmp

    Filesize

    584KB

  • memory/4424-955-0x0000000008B60000-0x0000000008BB0000-memory.dmp

    Filesize

    320KB

  • memory/4424-151-0x0000000004DA0000-0x000000000529E000-memory.dmp

    Filesize

    5.0MB

  • memory/4424-150-0x0000000002840000-0x0000000002850000-memory.dmp

    Filesize

    64KB

  • memory/4424-149-0x0000000000A50000-0x0000000000A96000-memory.dmp

    Filesize

    280KB

  • memory/4424-148-0x00000000027A0000-0x00000000027DC000-memory.dmp

    Filesize

    240KB

  • memory/4424-956-0x0000000008BD0000-0x0000000008C46000-memory.dmp

    Filesize

    472KB

  • memory/4424-957-0x0000000008D90000-0x0000000008F52000-memory.dmp

    Filesize

    1.8MB

  • memory/4424-958-0x0000000008F80000-0x00000000094AC000-memory.dmp

    Filesize

    5.2MB

  • memory/4424-959-0x00000000095C0000-0x00000000095DE000-memory.dmp

    Filesize

    120KB