Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    101s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21/04/2023, 02:11

General

  • Target

    3b220de8deb0f0e3c6a5ff2a9bfb4a61f07f1ee14c4692a6fd56ccbbb40ace03.exe

  • Size

    1.0MB

  • MD5

    d08977ea529d5b3e7f2cb4db1471b3bb

  • SHA1

    b93e9caf930a1f5026d02ea4680b136e97f3b853

  • SHA256

    3b220de8deb0f0e3c6a5ff2a9bfb4a61f07f1ee14c4692a6fd56ccbbb40ace03

  • SHA512

    e722d3e9718062bcc8450b50a0a88dc3dfd8684933e2389bf77a1c6a5af73b67f651820741d2552db6e2ee1e71bea4496cd8de41b21b779a8c0db1d3976ef4ea

  • SSDEEP

    24576:qy9PctSJzc2AbkHQmMDFBjQYOELzAMQpk:x0SRZAbzdDXgELUz

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b220de8deb0f0e3c6a5ff2a9bfb4a61f07f1ee14c4692a6fd56ccbbb40ace03.exe
    "C:\Users\Admin\AppData\Local\Temp\3b220de8deb0f0e3c6a5ff2a9bfb4a61f07f1ee14c4692a6fd56ccbbb40ace03.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4156
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un682607.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un682607.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3564
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un974069.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un974069.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4296
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr292025.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr292025.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4332
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu475958.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu475958.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk915262.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk915262.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4316
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si258842.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si258842.exe
      2⤵
      • Executes dropped EXE
      PID:380
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 616
        3⤵
        • Program crash
        PID:4548
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 696
        3⤵
        • Program crash
        PID:4904
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 768
        3⤵
        • Program crash
        PID:4708
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 848
        3⤵
        • Program crash
        PID:1400
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 872
        3⤵
        • Program crash
        PID:3104
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 888
        3⤵
        • Program crash
        PID:4700
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 1080
        3⤵
        • Program crash
        PID:4796

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si258842.exe

    Filesize

    370KB

    MD5

    25bdb483b95a7815e147ca60580eafc9

    SHA1

    71ad1317d9edfe4b2957093f2bd40d0ef11958f7

    SHA256

    00694c2d150ee273469e9ecb1fd2a6e0100b728f37fb0e4b7c9b9a9ee0219e4f

    SHA512

    f4b9b279e06a19c6c299fadefe9c768a81d0c0f708960b7e3ff45e306bd769c239a5266cf23fe3114a76f53d4cab0bc1d7e2d3ed3dc0398c093e8a5cbc08706d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si258842.exe

    Filesize

    370KB

    MD5

    25bdb483b95a7815e147ca60580eafc9

    SHA1

    71ad1317d9edfe4b2957093f2bd40d0ef11958f7

    SHA256

    00694c2d150ee273469e9ecb1fd2a6e0100b728f37fb0e4b7c9b9a9ee0219e4f

    SHA512

    f4b9b279e06a19c6c299fadefe9c768a81d0c0f708960b7e3ff45e306bd769c239a5266cf23fe3114a76f53d4cab0bc1d7e2d3ed3dc0398c093e8a5cbc08706d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un682607.exe

    Filesize

    752KB

    MD5

    c25de3474d8dd6e44cb06d8bd28ca729

    SHA1

    60eda52ffa95e276e964611f2e806261f9d0ce40

    SHA256

    7f2fd2f6ab2969d0bb5f06831cc11af054ee2ec41feda5eced1e6564de78c2ae

    SHA512

    049d769b3c09d304afa8e0d3d4adbc28261c4a199d707630dda91dc963d48e1fc09b2b55842fa8e628b15ee7aaa646de3b4e9e675f921736ccc1f193a67737bf

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un682607.exe

    Filesize

    752KB

    MD5

    c25de3474d8dd6e44cb06d8bd28ca729

    SHA1

    60eda52ffa95e276e964611f2e806261f9d0ce40

    SHA256

    7f2fd2f6ab2969d0bb5f06831cc11af054ee2ec41feda5eced1e6564de78c2ae

    SHA512

    049d769b3c09d304afa8e0d3d4adbc28261c4a199d707630dda91dc963d48e1fc09b2b55842fa8e628b15ee7aaa646de3b4e9e675f921736ccc1f193a67737bf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk915262.exe

    Filesize

    136KB

    MD5

    ac0ffc4fceebe7be421ae8fc8517d1bf

    SHA1

    fa6a6f1878e561b5401ae36422add3d34cfdf6dd

    SHA256

    fe0c2e45eda219cfb1d2bd132437d2412d84cbe8cc2787dd4ff710e1be5c9718

    SHA512

    23de94ab73fc8cf91d573870d7ac1fb6976eaed31d93e0619378ea93ac5feaf06967bc652525b584bba1b973a2c6e6075b8d7dbe3a8ddf5d569b4e80722bfb93

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk915262.exe

    Filesize

    136KB

    MD5

    ac0ffc4fceebe7be421ae8fc8517d1bf

    SHA1

    fa6a6f1878e561b5401ae36422add3d34cfdf6dd

    SHA256

    fe0c2e45eda219cfb1d2bd132437d2412d84cbe8cc2787dd4ff710e1be5c9718

    SHA512

    23de94ab73fc8cf91d573870d7ac1fb6976eaed31d93e0619378ea93ac5feaf06967bc652525b584bba1b973a2c6e6075b8d7dbe3a8ddf5d569b4e80722bfb93

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un974069.exe

    Filesize

    597KB

    MD5

    421f5c081f496e054dbaed514c562b55

    SHA1

    0c6a36068e455bdb3a8ec0209e882e9d196d2b81

    SHA256

    686302525c899ccef3809e6a55c6c4c9f304029cfd62baaa784994fee5ec8ddd

    SHA512

    d496a9e987bffb3e3ca0b29603144458f5c13260930b9d4b775d439a288592e60dd927f73bbb991b7cfde4ab0a662e8b9df4294f6c752037f7424e4caaa5a08d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un974069.exe

    Filesize

    597KB

    MD5

    421f5c081f496e054dbaed514c562b55

    SHA1

    0c6a36068e455bdb3a8ec0209e882e9d196d2b81

    SHA256

    686302525c899ccef3809e6a55c6c4c9f304029cfd62baaa784994fee5ec8ddd

    SHA512

    d496a9e987bffb3e3ca0b29603144458f5c13260930b9d4b775d439a288592e60dd927f73bbb991b7cfde4ab0a662e8b9df4294f6c752037f7424e4caaa5a08d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr292025.exe

    Filesize

    391KB

    MD5

    68e14159c0192fe32484b4f94a721da7

    SHA1

    a040f30f6578df4f32902dda560d937edd64a2e4

    SHA256

    3385399c2bbbd1e9ed6975f8c4a6483ae2642c9bf80179c2329125628029d9f9

    SHA512

    ea67c385ecfedf3a692bf387cef4935138059e48e9355a825b6f804cad91167e5a3afd7e0251d658769176b9c84db69645c992c95995c445cd81a106f7361927

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr292025.exe

    Filesize

    391KB

    MD5

    68e14159c0192fe32484b4f94a721da7

    SHA1

    a040f30f6578df4f32902dda560d937edd64a2e4

    SHA256

    3385399c2bbbd1e9ed6975f8c4a6483ae2642c9bf80179c2329125628029d9f9

    SHA512

    ea67c385ecfedf3a692bf387cef4935138059e48e9355a825b6f804cad91167e5a3afd7e0251d658769176b9c84db69645c992c95995c445cd81a106f7361927

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu475958.exe

    Filesize

    474KB

    MD5

    b3fc9419dad004318ecb315781d6c097

    SHA1

    cb5e9dec6801787542aa3af844b0b22aa70bb6a4

    SHA256

    38cbc203818185dc248a041aab331ea8c3c16b48908a654d045c5fb41d999538

    SHA512

    ed1db57bcb215cfbe592a8286ae0967425cecafa5780cce7ff5ee1b90c399eaacd29f49b79ee6267a5a15f24ffecc3ac217491bf9d6ce5d604d499642bb969b8

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu475958.exe

    Filesize

    474KB

    MD5

    b3fc9419dad004318ecb315781d6c097

    SHA1

    cb5e9dec6801787542aa3af844b0b22aa70bb6a4

    SHA256

    38cbc203818185dc248a041aab331ea8c3c16b48908a654d045c5fb41d999538

    SHA512

    ed1db57bcb215cfbe592a8286ae0967425cecafa5780cce7ff5ee1b90c399eaacd29f49b79ee6267a5a15f24ffecc3ac217491bf9d6ce5d604d499642bb969b8

  • memory/380-1010-0x0000000000810000-0x0000000000845000-memory.dmp

    Filesize

    212KB

  • memory/3116-984-0x0000000007850000-0x0000000007862000-memory.dmp

    Filesize

    72KB

  • memory/3116-986-0x00000000079A0000-0x00000000079DE000-memory.dmp

    Filesize

    248KB

  • memory/3116-996-0x0000000004890000-0x00000000048E0000-memory.dmp

    Filesize

    320KB

  • memory/3116-994-0x0000000008F40000-0x000000000946C000-memory.dmp

    Filesize

    5.2MB

  • memory/3116-993-0x0000000008D70000-0x0000000008F32000-memory.dmp

    Filesize

    1.8MB

  • memory/3116-992-0x0000000008AE0000-0x0000000008AFE000-memory.dmp

    Filesize

    120KB

  • memory/3116-991-0x0000000008A20000-0x0000000008A96000-memory.dmp

    Filesize

    472KB

  • memory/3116-990-0x0000000008980000-0x0000000008A12000-memory.dmp

    Filesize

    584KB

  • memory/3116-989-0x0000000007CB0000-0x0000000007D16000-memory.dmp

    Filesize

    408KB

  • memory/3116-988-0x0000000007A20000-0x0000000007A6B000-memory.dmp

    Filesize

    300KB

  • memory/3116-987-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/3116-985-0x0000000007880000-0x000000000798A000-memory.dmp

    Filesize

    1.0MB

  • memory/3116-983-0x0000000007DD0000-0x00000000083D6000-memory.dmp

    Filesize

    6.0MB

  • memory/3116-309-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/3116-307-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/3116-304-0x0000000000820000-0x0000000000866000-memory.dmp

    Filesize

    280KB

  • memory/3116-306-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/3116-220-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/3116-218-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/3116-185-0x0000000002810000-0x000000000284C000-memory.dmp

    Filesize

    240KB

  • memory/3116-186-0x0000000004D90000-0x0000000004DCA000-memory.dmp

    Filesize

    232KB

  • memory/3116-188-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/3116-190-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/3116-187-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/3116-192-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/3116-194-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/3116-196-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/3116-198-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/3116-200-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/3116-202-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/3116-204-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/3116-206-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/3116-208-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/3116-210-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/3116-212-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/3116-214-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/3116-216-0x0000000004D90000-0x0000000004DC5000-memory.dmp

    Filesize

    212KB

  • memory/4316-1002-0x00000000000D0000-0x00000000000F8000-memory.dmp

    Filesize

    160KB

  • memory/4316-1004-0x0000000006E80000-0x0000000006E90000-memory.dmp

    Filesize

    64KB

  • memory/4316-1003-0x0000000006E90000-0x0000000006EDB000-memory.dmp

    Filesize

    300KB

  • memory/4332-165-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4332-161-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4332-175-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4332-173-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4332-148-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

    Filesize

    64KB

  • memory/4332-171-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4332-151-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4332-169-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4332-167-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4332-149-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

    Filesize

    64KB

  • memory/4332-163-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4332-177-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4332-159-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4332-157-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4332-155-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4332-153-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4332-147-0x00000000025C0000-0x00000000025D8000-memory.dmp

    Filesize

    96KB

  • memory/4332-146-0x0000000004FB0000-0x00000000054AE000-memory.dmp

    Filesize

    5.0MB

  • memory/4332-178-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4332-180-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4332-150-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4332-145-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

    Filesize

    64KB

  • memory/4332-144-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4332-143-0x0000000000BF0000-0x0000000000C0A000-memory.dmp

    Filesize

    104KB