Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
75s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2023, 22:10
Static task
static1
General
-
Target
9ddbf2fcfdf520d0d1a8c4bdb347ae4bb0ba2d6a574591f8606a9e236f4aa1d5.exe
-
Size
694KB
-
MD5
4c1daf3058cbb316e31e6c75bfb58641
-
SHA1
266f0d827b382525d6b5619408d0f4b41eccfae6
-
SHA256
9ddbf2fcfdf520d0d1a8c4bdb347ae4bb0ba2d6a574591f8606a9e236f4aa1d5
-
SHA512
cb44579dce9320341df59ffb6a407e82a38a76c0bc717ea1b1a831d2456065f07ee5d0c563422554d0802c7e88e343b4b59c9bd5cdcbd57b8bca84e7fc33a2d2
-
SSDEEP
12288:Ky90tZT8TvEgRPU5eWbdJWs83i09WdBtDWT7Dd2aexPBjczEq980:Ky2ZT4TJU5eWbKVWXWhQZFj0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr549576.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr549576.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr549576.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr549576.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr549576.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr549576.exe -
Executes dropped EXE 4 IoCs
pid Process 2228 un358087.exe 3752 pr549576.exe 3900 qu238878.exe 2440 si612662.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr549576.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr549576.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9ddbf2fcfdf520d0d1a8c4bdb347ae4bb0ba2d6a574591f8606a9e236f4aa1d5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9ddbf2fcfdf520d0d1a8c4bdb347ae4bb0ba2d6a574591f8606a9e236f4aa1d5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un358087.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un358087.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4820 3752 WerFault.exe 85 1076 3900 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3752 pr549576.exe 3752 pr549576.exe 3900 qu238878.exe 3900 qu238878.exe 2440 si612662.exe 2440 si612662.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3752 pr549576.exe Token: SeDebugPrivilege 3900 qu238878.exe Token: SeDebugPrivilege 2440 si612662.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5056 wrote to memory of 2228 5056 9ddbf2fcfdf520d0d1a8c4bdb347ae4bb0ba2d6a574591f8606a9e236f4aa1d5.exe 84 PID 5056 wrote to memory of 2228 5056 9ddbf2fcfdf520d0d1a8c4bdb347ae4bb0ba2d6a574591f8606a9e236f4aa1d5.exe 84 PID 5056 wrote to memory of 2228 5056 9ddbf2fcfdf520d0d1a8c4bdb347ae4bb0ba2d6a574591f8606a9e236f4aa1d5.exe 84 PID 2228 wrote to memory of 3752 2228 un358087.exe 85 PID 2228 wrote to memory of 3752 2228 un358087.exe 85 PID 2228 wrote to memory of 3752 2228 un358087.exe 85 PID 2228 wrote to memory of 3900 2228 un358087.exe 94 PID 2228 wrote to memory of 3900 2228 un358087.exe 94 PID 2228 wrote to memory of 3900 2228 un358087.exe 94 PID 5056 wrote to memory of 2440 5056 9ddbf2fcfdf520d0d1a8c4bdb347ae4bb0ba2d6a574591f8606a9e236f4aa1d5.exe 99 PID 5056 wrote to memory of 2440 5056 9ddbf2fcfdf520d0d1a8c4bdb347ae4bb0ba2d6a574591f8606a9e236f4aa1d5.exe 99 PID 5056 wrote to memory of 2440 5056 9ddbf2fcfdf520d0d1a8c4bdb347ae4bb0ba2d6a574591f8606a9e236f4aa1d5.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ddbf2fcfdf520d0d1a8c4bdb347ae4bb0ba2d6a574591f8606a9e236f4aa1d5.exe"C:\Users\Admin\AppData\Local\Temp\9ddbf2fcfdf520d0d1a8c4bdb347ae4bb0ba2d6a574591f8606a9e236f4aa1d5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un358087.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un358087.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr549576.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr549576.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3752 -s 10804⤵
- Program crash
PID:4820
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu238878.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu238878.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 19484⤵
- Program crash
PID:1076
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si612662.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si612662.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3752 -ip 37521⤵PID:432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3900 -ip 39001⤵PID:1632
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
541KB
MD54234249af0ef6c397ba59e41aeebe574
SHA11ffd31389e271ec36cc9ce7ac635885a72a56429
SHA256047ddef611fdc7a5ce26c15ff59aa852fc36056802926f0d60f3008855796d9e
SHA512189b039c097bd6ee521f404fee529a4fcd2b43da74f0379fc7e2061cd293cf3fc5c82383277218cc1a1f776d7fdef232d1864ff55b0a349f50c87c304815eb65
-
Filesize
541KB
MD54234249af0ef6c397ba59e41aeebe574
SHA11ffd31389e271ec36cc9ce7ac635885a72a56429
SHA256047ddef611fdc7a5ce26c15ff59aa852fc36056802926f0d60f3008855796d9e
SHA512189b039c097bd6ee521f404fee529a4fcd2b43da74f0379fc7e2061cd293cf3fc5c82383277218cc1a1f776d7fdef232d1864ff55b0a349f50c87c304815eb65
-
Filesize
278KB
MD5c7c60bf5653c66140276d03fe554f7b9
SHA136c5a14fe434355f8d8c5d41e730ba1013ef061c
SHA256987a0540c45d51cbbc7e91e91dd8d61a40e0b0e43a5290d7c593c678c775cd4c
SHA5122c41e08aace258ff7987dd415f494a6a649e106a6ec70a615bb21c436b29cbedd82f31319b4d05fdda840ac32f23ef278521627cbb54c32bda3c93a92650a56a
-
Filesize
278KB
MD5c7c60bf5653c66140276d03fe554f7b9
SHA136c5a14fe434355f8d8c5d41e730ba1013ef061c
SHA256987a0540c45d51cbbc7e91e91dd8d61a40e0b0e43a5290d7c593c678c775cd4c
SHA5122c41e08aace258ff7987dd415f494a6a649e106a6ec70a615bb21c436b29cbedd82f31319b4d05fdda840ac32f23ef278521627cbb54c32bda3c93a92650a56a
-
Filesize
361KB
MD57fa4f26db312bd2b5f5351bb845b484f
SHA15da16f4bf3a45b60533b7164c1b1524d9b96a4eb
SHA25641fdb6ba63aac5de58db96ff174122a777b8cb81f73fae649f7a577f5e44be1d
SHA5125e00a63bbb6dafb57273bdcba9b1276a598636cd2ebb30406abdc284873e9d452fbeb9e8bf46ba1ad23575e8841ba67fde41af670fb56c1b4646aa50ec1a8c76
-
Filesize
361KB
MD57fa4f26db312bd2b5f5351bb845b484f
SHA15da16f4bf3a45b60533b7164c1b1524d9b96a4eb
SHA25641fdb6ba63aac5de58db96ff174122a777b8cb81f73fae649f7a577f5e44be1d
SHA5125e00a63bbb6dafb57273bdcba9b1276a598636cd2ebb30406abdc284873e9d452fbeb9e8bf46ba1ad23575e8841ba67fde41af670fb56c1b4646aa50ec1a8c76