Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
22/04/2023, 02:54
Static task
static1
General
-
Target
e6faf01992aea1470a6d90c7446f1624b74cc5a1840ab54da91953d06cc2780e.exe
-
Size
965KB
-
MD5
b452e476191695c240d3dd1dffbdc331
-
SHA1
089b7d590f9a9d2b1ec71b4ba703f4c3242ce377
-
SHA256
e6faf01992aea1470a6d90c7446f1624b74cc5a1840ab54da91953d06cc2780e
-
SHA512
02d7b4d8efe2f24fb7f781899d6e71671951ced009649625294c46b24c5e5742871b0af36159682c0e58ac88d20e3e131d50f52ddd02aee5477b3a1dec23846d
-
SSDEEP
24576:YysGmcD7W0EHh/ZDD+t3sbSUchCFX++wwr:fsbcD7tEB/Zg3wSUBFu+w
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr769834.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr769834.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr769834.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr769834.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr769834.exe -
Executes dropped EXE 6 IoCs
pid Process 3620 un675665.exe 3564 un887109.exe 2984 pr769834.exe 4960 qu611288.exe 4904 rk209050.exe 2680 si584551.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr769834.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr769834.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un675665.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un675665.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un887109.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un887109.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e6faf01992aea1470a6d90c7446f1624b74cc5a1840ab54da91953d06cc2780e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e6faf01992aea1470a6d90c7446f1624b74cc5a1840ab54da91953d06cc2780e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 7 IoCs
pid pid_target Process procid_target 4956 2680 WerFault.exe 72 1100 2680 WerFault.exe 72 4220 2680 WerFault.exe 72 4276 2680 WerFault.exe 72 3080 2680 WerFault.exe 72 4992 2680 WerFault.exe 72 4028 2680 WerFault.exe 72 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2984 pr769834.exe 2984 pr769834.exe 4960 qu611288.exe 4960 qu611288.exe 4904 rk209050.exe 4904 rk209050.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2984 pr769834.exe Token: SeDebugPrivilege 4960 qu611288.exe Token: SeDebugPrivilege 4904 rk209050.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3452 wrote to memory of 3620 3452 e6faf01992aea1470a6d90c7446f1624b74cc5a1840ab54da91953d06cc2780e.exe 66 PID 3452 wrote to memory of 3620 3452 e6faf01992aea1470a6d90c7446f1624b74cc5a1840ab54da91953d06cc2780e.exe 66 PID 3452 wrote to memory of 3620 3452 e6faf01992aea1470a6d90c7446f1624b74cc5a1840ab54da91953d06cc2780e.exe 66 PID 3620 wrote to memory of 3564 3620 un675665.exe 67 PID 3620 wrote to memory of 3564 3620 un675665.exe 67 PID 3620 wrote to memory of 3564 3620 un675665.exe 67 PID 3564 wrote to memory of 2984 3564 un887109.exe 68 PID 3564 wrote to memory of 2984 3564 un887109.exe 68 PID 3564 wrote to memory of 2984 3564 un887109.exe 68 PID 3564 wrote to memory of 4960 3564 un887109.exe 69 PID 3564 wrote to memory of 4960 3564 un887109.exe 69 PID 3564 wrote to memory of 4960 3564 un887109.exe 69 PID 3620 wrote to memory of 4904 3620 un675665.exe 71 PID 3620 wrote to memory of 4904 3620 un675665.exe 71 PID 3620 wrote to memory of 4904 3620 un675665.exe 71 PID 3452 wrote to memory of 2680 3452 e6faf01992aea1470a6d90c7446f1624b74cc5a1840ab54da91953d06cc2780e.exe 72 PID 3452 wrote to memory of 2680 3452 e6faf01992aea1470a6d90c7446f1624b74cc5a1840ab54da91953d06cc2780e.exe 72 PID 3452 wrote to memory of 2680 3452 e6faf01992aea1470a6d90c7446f1624b74cc5a1840ab54da91953d06cc2780e.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6faf01992aea1470a6d90c7446f1624b74cc5a1840ab54da91953d06cc2780e.exe"C:\Users\Admin\AppData\Local\Temp\e6faf01992aea1470a6d90c7446f1624b74cc5a1840ab54da91953d06cc2780e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un675665.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un675665.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un887109.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un887109.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr769834.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr769834.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu611288.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu611288.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk209050.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk209050.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4904
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si584551.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si584551.exe2⤵
- Executes dropped EXE
PID:2680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 6163⤵
- Program crash
PID:4956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 6963⤵
- Program crash
PID:1100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 8363⤵
- Program crash
PID:4220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 8483⤵
- Program crash
PID:4276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 8723⤵
- Program crash
PID:3080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 8923⤵
- Program crash
PID:4992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 10803⤵
- Program crash
PID:4028
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
277KB
MD5b575bb5a62a62ef0e42269da84b46f5a
SHA13679064685ab28bb6ff0a9276c353a2f71925e0f
SHA25640d50cfa52b338751eb9e1c025fe62778350eee30daa3b005cbccf2c48dfce4e
SHA512676a5cfdf713f174c60623fa2eb3eb0b35298cc62ee27ce5d346635b3173e34edde7de075def9a8c35fff9d56837f268b28201ac2d963bdb975cc29df6fbac5e
-
Filesize
277KB
MD5b575bb5a62a62ef0e42269da84b46f5a
SHA13679064685ab28bb6ff0a9276c353a2f71925e0f
SHA25640d50cfa52b338751eb9e1c025fe62778350eee30daa3b005cbccf2c48dfce4e
SHA512676a5cfdf713f174c60623fa2eb3eb0b35298cc62ee27ce5d346635b3173e34edde7de075def9a8c35fff9d56837f268b28201ac2d963bdb975cc29df6fbac5e
-
Filesize
706KB
MD5314f16b23f2589de432816331328e0ac
SHA1655e8bba9cbca622bfa6e88348a5d1e190e8aaa4
SHA2566939840dc07619fc3208a9bfa29ac45edc037283742c95741ccfdd663844cebb
SHA512c3d6c74ffc0aee423bc451b100d08e0da6fb094036ac8868483346e08199998b26697acf7d528d5fd2c607de269f1954cc56accd7d793a96bf167ab2dc51383c
-
Filesize
706KB
MD5314f16b23f2589de432816331328e0ac
SHA1655e8bba9cbca622bfa6e88348a5d1e190e8aaa4
SHA2566939840dc07619fc3208a9bfa29ac45edc037283742c95741ccfdd663844cebb
SHA512c3d6c74ffc0aee423bc451b100d08e0da6fb094036ac8868483346e08199998b26697acf7d528d5fd2c607de269f1954cc56accd7d793a96bf167ab2dc51383c
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
552KB
MD5bc8bd6a5a4fc585f09e4d25955a31b56
SHA1d257a6d093aca77b9c183ca7b2fa045b101f1eec
SHA256c4bece139f96b6dd91b49497610d73d97f672f47a75abf989bcf31d4e5de9346
SHA5121ec659f72d1841a155e6f64254563a66d5a3d0c6b533ba0f79ade3607572456e1560f7f9897ef3c8ce05809b0888eebe9f446fb708ac6c8aad4cf74f2ff8a6b0
-
Filesize
552KB
MD5bc8bd6a5a4fc585f09e4d25955a31b56
SHA1d257a6d093aca77b9c183ca7b2fa045b101f1eec
SHA256c4bece139f96b6dd91b49497610d73d97f672f47a75abf989bcf31d4e5de9346
SHA5121ec659f72d1841a155e6f64254563a66d5a3d0c6b533ba0f79ade3607572456e1560f7f9897ef3c8ce05809b0888eebe9f446fb708ac6c8aad4cf74f2ff8a6b0
-
Filesize
299KB
MD56a351c8df3d8734cce1b96fcc2d871e3
SHA1bf5f1b981c5ec3378c9859c20cf02d93e6a20c8f
SHA25629794c297bf2b167b6041e90f928a5b68b3b1423cbfcf0f685a0b9e8862de686
SHA512ebf1c9892898e2c96bd9bd84b8ed2c84f42742ed597a74669f8d20d6c9b73b698d04b885674bffbc7142092ff8dbc36664b810b655567c6baf3c53c9e1546c76
-
Filesize
299KB
MD56a351c8df3d8734cce1b96fcc2d871e3
SHA1bf5f1b981c5ec3378c9859c20cf02d93e6a20c8f
SHA25629794c297bf2b167b6041e90f928a5b68b3b1423cbfcf0f685a0b9e8862de686
SHA512ebf1c9892898e2c96bd9bd84b8ed2c84f42742ed597a74669f8d20d6c9b73b698d04b885674bffbc7142092ff8dbc36664b810b655567c6baf3c53c9e1546c76
-
Filesize
381KB
MD50286f9199f5c5e54d4ad9a055c215a15
SHA191a6df9cb9d7a7b1fb7684bcfc26ee6e43dc8d37
SHA256ea20018ab8f32dc9a09f7b90f9ef942f6ed4f1c83f704fbadf0d3bf9793d43fb
SHA512d000202cc7fa938a42bc5fda45a3aabff1526f18f708dbe60d456c1604b8260e56dce15ef646e1ad2e4f5400638384600e98f78cc1a66a82563519586cd89ad6
-
Filesize
381KB
MD50286f9199f5c5e54d4ad9a055c215a15
SHA191a6df9cb9d7a7b1fb7684bcfc26ee6e43dc8d37
SHA256ea20018ab8f32dc9a09f7b90f9ef942f6ed4f1c83f704fbadf0d3bf9793d43fb
SHA512d000202cc7fa938a42bc5fda45a3aabff1526f18f708dbe60d456c1604b8260e56dce15ef646e1ad2e4f5400638384600e98f78cc1a66a82563519586cd89ad6