Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    75s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/04/2023, 22:10

General

  • Target

    9ddbf2fcfdf520d0d1a8c4bdb347ae4bb0ba2d6a574591f8606a9e236f4aa1d5.exe

  • Size

    694KB

  • MD5

    4c1daf3058cbb316e31e6c75bfb58641

  • SHA1

    266f0d827b382525d6b5619408d0f4b41eccfae6

  • SHA256

    9ddbf2fcfdf520d0d1a8c4bdb347ae4bb0ba2d6a574591f8606a9e236f4aa1d5

  • SHA512

    cb44579dce9320341df59ffb6a407e82a38a76c0bc717ea1b1a831d2456065f07ee5d0c563422554d0802c7e88e343b4b59c9bd5cdcbd57b8bca84e7fc33a2d2

  • SSDEEP

    12288:Ky90tZT8TvEgRPU5eWbdJWs83i09WdBtDWT7Dd2aexPBjczEq980:Ky2ZT4TJU5eWbKVWXWhQZFj0

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ddbf2fcfdf520d0d1a8c4bdb347ae4bb0ba2d6a574591f8606a9e236f4aa1d5.exe
    "C:\Users\Admin\AppData\Local\Temp\9ddbf2fcfdf520d0d1a8c4bdb347ae4bb0ba2d6a574591f8606a9e236f4aa1d5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5056
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un358087.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un358087.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2228
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr549576.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr549576.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3752
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3752 -s 1080
          4⤵
          • Program crash
          PID:4820
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu238878.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu238878.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3900
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 1948
          4⤵
          • Program crash
          PID:1076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si612662.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si612662.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2440
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3752 -ip 3752
    1⤵
      PID:432
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3900 -ip 3900
      1⤵
        PID:1632

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si612662.exe

        Filesize

        136KB

        MD5

        9c75a048f066d01b19ed80dc6e7a7101

        SHA1

        7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

        SHA256

        c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

        SHA512

        b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si612662.exe

        Filesize

        136KB

        MD5

        9c75a048f066d01b19ed80dc6e7a7101

        SHA1

        7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

        SHA256

        c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

        SHA512

        b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un358087.exe

        Filesize

        541KB

        MD5

        4234249af0ef6c397ba59e41aeebe574

        SHA1

        1ffd31389e271ec36cc9ce7ac635885a72a56429

        SHA256

        047ddef611fdc7a5ce26c15ff59aa852fc36056802926f0d60f3008855796d9e

        SHA512

        189b039c097bd6ee521f404fee529a4fcd2b43da74f0379fc7e2061cd293cf3fc5c82383277218cc1a1f776d7fdef232d1864ff55b0a349f50c87c304815eb65

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un358087.exe

        Filesize

        541KB

        MD5

        4234249af0ef6c397ba59e41aeebe574

        SHA1

        1ffd31389e271ec36cc9ce7ac635885a72a56429

        SHA256

        047ddef611fdc7a5ce26c15ff59aa852fc36056802926f0d60f3008855796d9e

        SHA512

        189b039c097bd6ee521f404fee529a4fcd2b43da74f0379fc7e2061cd293cf3fc5c82383277218cc1a1f776d7fdef232d1864ff55b0a349f50c87c304815eb65

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr549576.exe

        Filesize

        278KB

        MD5

        c7c60bf5653c66140276d03fe554f7b9

        SHA1

        36c5a14fe434355f8d8c5d41e730ba1013ef061c

        SHA256

        987a0540c45d51cbbc7e91e91dd8d61a40e0b0e43a5290d7c593c678c775cd4c

        SHA512

        2c41e08aace258ff7987dd415f494a6a649e106a6ec70a615bb21c436b29cbedd82f31319b4d05fdda840ac32f23ef278521627cbb54c32bda3c93a92650a56a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr549576.exe

        Filesize

        278KB

        MD5

        c7c60bf5653c66140276d03fe554f7b9

        SHA1

        36c5a14fe434355f8d8c5d41e730ba1013ef061c

        SHA256

        987a0540c45d51cbbc7e91e91dd8d61a40e0b0e43a5290d7c593c678c775cd4c

        SHA512

        2c41e08aace258ff7987dd415f494a6a649e106a6ec70a615bb21c436b29cbedd82f31319b4d05fdda840ac32f23ef278521627cbb54c32bda3c93a92650a56a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu238878.exe

        Filesize

        361KB

        MD5

        7fa4f26db312bd2b5f5351bb845b484f

        SHA1

        5da16f4bf3a45b60533b7164c1b1524d9b96a4eb

        SHA256

        41fdb6ba63aac5de58db96ff174122a777b8cb81f73fae649f7a577f5e44be1d

        SHA512

        5e00a63bbb6dafb57273bdcba9b1276a598636cd2ebb30406abdc284873e9d452fbeb9e8bf46ba1ad23575e8841ba67fde41af670fb56c1b4646aa50ec1a8c76

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu238878.exe

        Filesize

        361KB

        MD5

        7fa4f26db312bd2b5f5351bb845b484f

        SHA1

        5da16f4bf3a45b60533b7164c1b1524d9b96a4eb

        SHA256

        41fdb6ba63aac5de58db96ff174122a777b8cb81f73fae649f7a577f5e44be1d

        SHA512

        5e00a63bbb6dafb57273bdcba9b1276a598636cd2ebb30406abdc284873e9d452fbeb9e8bf46ba1ad23575e8841ba67fde41af670fb56c1b4646aa50ec1a8c76

      • memory/2440-1005-0x00000000008F0000-0x0000000000918000-memory.dmp

        Filesize

        160KB

      • memory/2440-1006-0x0000000007970000-0x0000000007980000-memory.dmp

        Filesize

        64KB

      • memory/3752-157-0x0000000004A10000-0x0000000004A22000-memory.dmp

        Filesize

        72KB

      • memory/3752-167-0x0000000004A10000-0x0000000004A22000-memory.dmp

        Filesize

        72KB

      • memory/3752-151-0x00000000071F0000-0x0000000007794000-memory.dmp

        Filesize

        5.6MB

      • memory/3752-152-0x0000000004A10000-0x0000000004A22000-memory.dmp

        Filesize

        72KB

      • memory/3752-153-0x0000000004A10000-0x0000000004A22000-memory.dmp

        Filesize

        72KB

      • memory/3752-155-0x0000000004A10000-0x0000000004A22000-memory.dmp

        Filesize

        72KB

      • memory/3752-149-0x0000000002F70000-0x0000000002F80000-memory.dmp

        Filesize

        64KB

      • memory/3752-159-0x0000000004A10000-0x0000000004A22000-memory.dmp

        Filesize

        72KB

      • memory/3752-161-0x0000000004A10000-0x0000000004A22000-memory.dmp

        Filesize

        72KB

      • memory/3752-163-0x0000000004A10000-0x0000000004A22000-memory.dmp

        Filesize

        72KB

      • memory/3752-165-0x0000000004A10000-0x0000000004A22000-memory.dmp

        Filesize

        72KB

      • memory/3752-150-0x0000000002F70000-0x0000000002F80000-memory.dmp

        Filesize

        64KB

      • memory/3752-169-0x0000000004A10000-0x0000000004A22000-memory.dmp

        Filesize

        72KB

      • memory/3752-171-0x0000000004A10000-0x0000000004A22000-memory.dmp

        Filesize

        72KB

      • memory/3752-173-0x0000000004A10000-0x0000000004A22000-memory.dmp

        Filesize

        72KB

      • memory/3752-175-0x0000000004A10000-0x0000000004A22000-memory.dmp

        Filesize

        72KB

      • memory/3752-177-0x0000000004A10000-0x0000000004A22000-memory.dmp

        Filesize

        72KB

      • memory/3752-179-0x0000000004A10000-0x0000000004A22000-memory.dmp

        Filesize

        72KB

      • memory/3752-180-0x0000000002F70000-0x0000000002F80000-memory.dmp

        Filesize

        64KB

      • memory/3752-181-0x0000000000400000-0x0000000002BA6000-memory.dmp

        Filesize

        39.6MB

      • memory/3752-182-0x0000000002F70000-0x0000000002F80000-memory.dmp

        Filesize

        64KB

      • memory/3752-184-0x0000000002F70000-0x0000000002F80000-memory.dmp

        Filesize

        64KB

      • memory/3752-185-0x0000000000400000-0x0000000002BA6000-memory.dmp

        Filesize

        39.6MB

      • memory/3752-148-0x0000000002BB0000-0x0000000002BDD000-memory.dmp

        Filesize

        180KB

      • memory/3900-191-0x00000000071A0000-0x00000000071D5000-memory.dmp

        Filesize

        212KB

      • memory/3900-221-0x00000000071A0000-0x00000000071D5000-memory.dmp

        Filesize

        212KB

      • memory/3900-195-0x00000000071A0000-0x00000000071D5000-memory.dmp

        Filesize

        212KB

      • memory/3900-197-0x00000000071A0000-0x00000000071D5000-memory.dmp

        Filesize

        212KB

      • memory/3900-199-0x00000000071A0000-0x00000000071D5000-memory.dmp

        Filesize

        212KB

      • memory/3900-201-0x00000000071A0000-0x00000000071D5000-memory.dmp

        Filesize

        212KB

      • memory/3900-203-0x00000000071A0000-0x00000000071D5000-memory.dmp

        Filesize

        212KB

      • memory/3900-205-0x00000000071A0000-0x00000000071D5000-memory.dmp

        Filesize

        212KB

      • memory/3900-207-0x00000000071A0000-0x00000000071D5000-memory.dmp

        Filesize

        212KB

      • memory/3900-209-0x00000000071A0000-0x00000000071D5000-memory.dmp

        Filesize

        212KB

      • memory/3900-211-0x0000000002BC0000-0x0000000002C06000-memory.dmp

        Filesize

        280KB

      • memory/3900-212-0x00000000071F0000-0x0000000007200000-memory.dmp

        Filesize

        64KB

      • memory/3900-213-0x00000000071A0000-0x00000000071D5000-memory.dmp

        Filesize

        212KB

      • memory/3900-216-0x00000000071F0000-0x0000000007200000-memory.dmp

        Filesize

        64KB

      • memory/3900-214-0x00000000071F0000-0x0000000007200000-memory.dmp

        Filesize

        64KB

      • memory/3900-217-0x00000000071A0000-0x00000000071D5000-memory.dmp

        Filesize

        212KB

      • memory/3900-219-0x00000000071A0000-0x00000000071D5000-memory.dmp

        Filesize

        212KB

      • memory/3900-193-0x00000000071A0000-0x00000000071D5000-memory.dmp

        Filesize

        212KB

      • memory/3900-223-0x00000000071A0000-0x00000000071D5000-memory.dmp

        Filesize

        212KB

      • memory/3900-225-0x00000000071A0000-0x00000000071D5000-memory.dmp

        Filesize

        212KB

      • memory/3900-227-0x00000000071A0000-0x00000000071D5000-memory.dmp

        Filesize

        212KB

      • memory/3900-986-0x0000000009C70000-0x000000000A288000-memory.dmp

        Filesize

        6.1MB

      • memory/3900-987-0x000000000A310000-0x000000000A322000-memory.dmp

        Filesize

        72KB

      • memory/3900-988-0x000000000A330000-0x000000000A43A000-memory.dmp

        Filesize

        1.0MB

      • memory/3900-989-0x00000000071F0000-0x0000000007200000-memory.dmp

        Filesize

        64KB

      • memory/3900-990-0x000000000A4A0000-0x000000000A4DC000-memory.dmp

        Filesize

        240KB

      • memory/3900-991-0x000000000A750000-0x000000000A7B6000-memory.dmp

        Filesize

        408KB

      • memory/3900-992-0x000000000AE20000-0x000000000AEB2000-memory.dmp

        Filesize

        584KB

      • memory/3900-993-0x000000000AFF0000-0x000000000B066000-memory.dmp

        Filesize

        472KB

      • memory/3900-994-0x000000000B090000-0x000000000B0AE000-memory.dmp

        Filesize

        120KB

      • memory/3900-995-0x000000000B1B0000-0x000000000B372000-memory.dmp

        Filesize

        1.8MB

      • memory/3900-190-0x00000000071A0000-0x00000000071D5000-memory.dmp

        Filesize

        212KB

      • memory/3900-996-0x000000000B380000-0x000000000B8AC000-memory.dmp

        Filesize

        5.2MB

      • memory/3900-997-0x0000000004AD0000-0x0000000004B20000-memory.dmp

        Filesize

        320KB

      • memory/3900-1001-0x00000000071F0000-0x0000000007200000-memory.dmp

        Filesize

        64KB