Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
20/04/2023, 09:05
Static task
static1
General
-
Target
7519fe2f61e1112e5151d899e4c5c0d1507337674a90918f5b0462d6c55f63ac.exe
-
Size
935KB
-
MD5
d62094873f8e567fd7a37db6a8805fb8
-
SHA1
302014f40488a99e72c00e042b9e5b8bcb78afc5
-
SHA256
7519fe2f61e1112e5151d899e4c5c0d1507337674a90918f5b0462d6c55f63ac
-
SHA512
a26fc9dc58ff7a4be2ee4743fbd1db014036fb3694533c3c5197cc9086ce4723e58325e0ac86866eb294f3c1af951259bf7157c5973f57ffac0c6aa96962320c
-
SSDEEP
24576:5yP/SrXQ1AGJNQH//rQPbcPYKOeW3gpv:sirQ1AQNSrAbcJW
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it377186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it377186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it377186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it377186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it377186.exe -
Executes dropped EXE 6 IoCs
pid Process 3640 zigH0357.exe 4464 zizC6918.exe 4960 it377186.exe 992 jr812458.exe 1352 kp084901.exe 2872 lr916918.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it377186.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zizC6918.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7519fe2f61e1112e5151d899e4c5c0d1507337674a90918f5b0462d6c55f63ac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7519fe2f61e1112e5151d899e4c5c0d1507337674a90918f5b0462d6c55f63ac.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zigH0357.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zigH0357.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zizC6918.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 7 IoCs
pid pid_target Process procid_target 3684 2872 WerFault.exe 72 4304 2872 WerFault.exe 72 5068 2872 WerFault.exe 72 368 2872 WerFault.exe 72 2064 2872 WerFault.exe 72 4508 2872 WerFault.exe 72 3860 2872 WerFault.exe 72 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4960 it377186.exe 4960 it377186.exe 992 jr812458.exe 992 jr812458.exe 1352 kp084901.exe 1352 kp084901.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4960 it377186.exe Token: SeDebugPrivilege 992 jr812458.exe Token: SeDebugPrivilege 1352 kp084901.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3668 wrote to memory of 3640 3668 7519fe2f61e1112e5151d899e4c5c0d1507337674a90918f5b0462d6c55f63ac.exe 66 PID 3668 wrote to memory of 3640 3668 7519fe2f61e1112e5151d899e4c5c0d1507337674a90918f5b0462d6c55f63ac.exe 66 PID 3668 wrote to memory of 3640 3668 7519fe2f61e1112e5151d899e4c5c0d1507337674a90918f5b0462d6c55f63ac.exe 66 PID 3640 wrote to memory of 4464 3640 zigH0357.exe 67 PID 3640 wrote to memory of 4464 3640 zigH0357.exe 67 PID 3640 wrote to memory of 4464 3640 zigH0357.exe 67 PID 4464 wrote to memory of 4960 4464 zizC6918.exe 68 PID 4464 wrote to memory of 4960 4464 zizC6918.exe 68 PID 4464 wrote to memory of 992 4464 zizC6918.exe 69 PID 4464 wrote to memory of 992 4464 zizC6918.exe 69 PID 4464 wrote to memory of 992 4464 zizC6918.exe 69 PID 3640 wrote to memory of 1352 3640 zigH0357.exe 71 PID 3640 wrote to memory of 1352 3640 zigH0357.exe 71 PID 3640 wrote to memory of 1352 3640 zigH0357.exe 71 PID 3668 wrote to memory of 2872 3668 7519fe2f61e1112e5151d899e4c5c0d1507337674a90918f5b0462d6c55f63ac.exe 72 PID 3668 wrote to memory of 2872 3668 7519fe2f61e1112e5151d899e4c5c0d1507337674a90918f5b0462d6c55f63ac.exe 72 PID 3668 wrote to memory of 2872 3668 7519fe2f61e1112e5151d899e4c5c0d1507337674a90918f5b0462d6c55f63ac.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\7519fe2f61e1112e5151d899e4c5c0d1507337674a90918f5b0462d6c55f63ac.exe"C:\Users\Admin\AppData\Local\Temp\7519fe2f61e1112e5151d899e4c5c0d1507337674a90918f5b0462d6c55f63ac.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigH0357.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigH0357.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zizC6918.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zizC6918.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it377186.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it377186.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr812458.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr812458.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:992
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp084901.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp084901.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr916918.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr916918.exe2⤵
- Executes dropped EXE
PID:2872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 6163⤵
- Program crash
PID:3684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 6963⤵
- Program crash
PID:4304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 8403⤵
- Program crash
PID:5068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 8483⤵
- Program crash
PID:368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 9123⤵
- Program crash
PID:2064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 8883⤵
- Program crash
PID:4508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 10683⤵
- Program crash
PID:3860
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
378KB
MD54a049c67d8c8712736f411efecc7e0b5
SHA19e647c0bd9cd85371b29dd6d15d48a0b442d74b8
SHA256fd8b74c097e6b0a75ad509c3f1d30816d78db9ea58d495769657ca050f27927d
SHA512668e9a94bbaf4cc3efeff5863ebc8a69d5c63f34c12ca7d7e859653f9af6c907c9cb2bd19a980875b23b497860d3c704026d1dd155bc2559225da418174ce1e3
-
Filesize
378KB
MD54a049c67d8c8712736f411efecc7e0b5
SHA19e647c0bd9cd85371b29dd6d15d48a0b442d74b8
SHA256fd8b74c097e6b0a75ad509c3f1d30816d78db9ea58d495769657ca050f27927d
SHA512668e9a94bbaf4cc3efeff5863ebc8a69d5c63f34c12ca7d7e859653f9af6c907c9cb2bd19a980875b23b497860d3c704026d1dd155bc2559225da418174ce1e3
-
Filesize
623KB
MD5cac084cc2a6790fd889f9fd440067297
SHA10c2c6373d4e80da3f1f5177acd883d9f543c598b
SHA25632a8833661370264fdc9fd2185455f6ff7f53175222d21a675801b2552623904
SHA5122de75d79b0c1548040edb202b1c4198b0a2384c21be82fef405f5b780f2b922db5cdbaec65126c0fdd5dae1e49a8631e848308a465cf0dce6afc44dae78bfc90
-
Filesize
623KB
MD5cac084cc2a6790fd889f9fd440067297
SHA10c2c6373d4e80da3f1f5177acd883d9f543c598b
SHA25632a8833661370264fdc9fd2185455f6ff7f53175222d21a675801b2552623904
SHA5122de75d79b0c1548040edb202b1c4198b0a2384c21be82fef405f5b780f2b922db5cdbaec65126c0fdd5dae1e49a8631e848308a465cf0dce6afc44dae78bfc90
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
468KB
MD57b518c1725e5a101b756fde2aa1260f4
SHA10b23e5555bbf1ea739ba003380c5053772bf4b6a
SHA2566550c8fd3867bf289c423de52e5b036f8c6fd46f76e723d4a362eb5ac00fbdca
SHA512982c67279a0cfcd65667bdc432e9d8e8c481ecbce7b7d10ebda6cec822a77738429a386a70397a20db66c3f1a955b7d64d3ce327912dd65f04f46f0cc91cd1c1
-
Filesize
468KB
MD57b518c1725e5a101b756fde2aa1260f4
SHA10b23e5555bbf1ea739ba003380c5053772bf4b6a
SHA2566550c8fd3867bf289c423de52e5b036f8c6fd46f76e723d4a362eb5ac00fbdca
SHA512982c67279a0cfcd65667bdc432e9d8e8c481ecbce7b7d10ebda6cec822a77738429a386a70397a20db66c3f1a955b7d64d3ce327912dd65f04f46f0cc91cd1c1
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
485KB
MD5a7056d6180824bd949780599021bf40f
SHA1a0d02409637180d073705120c87b30858c53c2af
SHA2562e411da4ce7729afab89b996f66e928733d18fd873ec5de86ba381443f067f24
SHA512bbf4149dcb93759bc478ea94afb3de23fd701056b7bc354994c1170adad18224dbd5d26afdb70dab96bea475ef8e50590a2b7352eb8cba837afe3601d7fb26cb
-
Filesize
485KB
MD5a7056d6180824bd949780599021bf40f
SHA1a0d02409637180d073705120c87b30858c53c2af
SHA2562e411da4ce7729afab89b996f66e928733d18fd873ec5de86ba381443f067f24
SHA512bbf4149dcb93759bc478ea94afb3de23fd701056b7bc354994c1170adad18224dbd5d26afdb70dab96bea475ef8e50590a2b7352eb8cba837afe3601d7fb26cb