Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
60s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2023, 05:30
Static task
static1
General
-
Target
98770e23c98aead3ccf50c39db50a39e0fdf57bbc9329fab0c79ac7cf7839e9f.exe
-
Size
569KB
-
MD5
196d145d6ced13980a85ae7664740e72
-
SHA1
6808bbb390f8597652239462d49075fea5925c25
-
SHA256
98770e23c98aead3ccf50c39db50a39e0fdf57bbc9329fab0c79ac7cf7839e9f
-
SHA512
a95d647b741e03b1f40ee921349a85e48ca8fcee654319f18e29f2195b8153621cc27ca1233c53fc1ea1aac8c2293e33eeab607fa7ae4a2871757d550db255a0
-
SSDEEP
12288:6y90rQwHE/5dNjfpivZje71ladqn2Y8X0fLQVsXUE2+/x6:6yzKE/5LjIRQGqnGX8y+56
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it505377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it505377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it505377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it505377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it505377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it505377.exe -
Executes dropped EXE 4 IoCs
pid Process 4760 ziKw3784.exe 4504 it505377.exe 1964 kp916999.exe 3180 lr512793.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it505377.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziKw3784.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 98770e23c98aead3ccf50c39db50a39e0fdf57bbc9329fab0c79ac7cf7839e9f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 98770e23c98aead3ccf50c39db50a39e0fdf57bbc9329fab0c79ac7cf7839e9f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziKw3784.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4488 1964 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4504 it505377.exe 4504 it505377.exe 1964 kp916999.exe 1964 kp916999.exe 3180 lr512793.exe 3180 lr512793.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4504 it505377.exe Token: SeDebugPrivilege 1964 kp916999.exe Token: SeDebugPrivilege 3180 lr512793.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2636 wrote to memory of 4760 2636 98770e23c98aead3ccf50c39db50a39e0fdf57bbc9329fab0c79ac7cf7839e9f.exe 82 PID 2636 wrote to memory of 4760 2636 98770e23c98aead3ccf50c39db50a39e0fdf57bbc9329fab0c79ac7cf7839e9f.exe 82 PID 2636 wrote to memory of 4760 2636 98770e23c98aead3ccf50c39db50a39e0fdf57bbc9329fab0c79ac7cf7839e9f.exe 82 PID 4760 wrote to memory of 4504 4760 ziKw3784.exe 83 PID 4760 wrote to memory of 4504 4760 ziKw3784.exe 83 PID 4760 wrote to memory of 1964 4760 ziKw3784.exe 84 PID 4760 wrote to memory of 1964 4760 ziKw3784.exe 84 PID 4760 wrote to memory of 1964 4760 ziKw3784.exe 84 PID 2636 wrote to memory of 3180 2636 98770e23c98aead3ccf50c39db50a39e0fdf57bbc9329fab0c79ac7cf7839e9f.exe 87 PID 2636 wrote to memory of 3180 2636 98770e23c98aead3ccf50c39db50a39e0fdf57bbc9329fab0c79ac7cf7839e9f.exe 87 PID 2636 wrote to memory of 3180 2636 98770e23c98aead3ccf50c39db50a39e0fdf57bbc9329fab0c79ac7cf7839e9f.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\98770e23c98aead3ccf50c39db50a39e0fdf57bbc9329fab0c79ac7cf7839e9f.exe"C:\Users\Admin\AppData\Local\Temp\98770e23c98aead3ccf50c39db50a39e0fdf57bbc9329fab0c79ac7cf7839e9f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKw3784.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKw3784.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it505377.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it505377.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp916999.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp916999.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 13204⤵
- Program crash
PID:4488
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr512793.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr512793.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1964 -ip 19641⤵PID:2644
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
415KB
MD54654a7bd3ed065a973cf4c712924cc5f
SHA1955c45eaa8a88dfc1caf9afb62b2762e5bc09ead
SHA2566bb976dbe6043f76d0bfc823a4d8ab42d02340d7510e9bf02bb876631d914fea
SHA5127413d3f28e174cb2d801506515bbcd5f3b09e4244db3045e350567785a33cac74790737c6efaae45db9c02801ebe6198e34ec10ed837feac4bf8f788e640dd33
-
Filesize
415KB
MD54654a7bd3ed065a973cf4c712924cc5f
SHA1955c45eaa8a88dfc1caf9afb62b2762e5bc09ead
SHA2566bb976dbe6043f76d0bfc823a4d8ab42d02340d7510e9bf02bb876631d914fea
SHA5127413d3f28e174cb2d801506515bbcd5f3b09e4244db3045e350567785a33cac74790737c6efaae45db9c02801ebe6198e34ec10ed837feac4bf8f788e640dd33
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
382KB
MD5ff1e0f72695d8f26a3735219b30b1505
SHA180150d91fa3396925166a17df11a787b433b5043
SHA25691fff2175678b1d369db6bca20c6d208d1edf3bba4c4b76c0d9e617e72c53de6
SHA51227dead804d32e5766c5edf364c48a55485aa0ebc6060e224939e770c7105cd31ba7142b76498897162ae915b93c4be90d3bf683324cae57149bcdc91bb5c040a
-
Filesize
382KB
MD5ff1e0f72695d8f26a3735219b30b1505
SHA180150d91fa3396925166a17df11a787b433b5043
SHA25691fff2175678b1d369db6bca20c6d208d1edf3bba4c4b76c0d9e617e72c53de6
SHA51227dead804d32e5766c5edf364c48a55485aa0ebc6060e224939e770c7105cd31ba7142b76498897162ae915b93c4be90d3bf683324cae57149bcdc91bb5c040a