Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2023, 06:11
Static task
static1
General
-
Target
6d4225b37d1ceb0bdb9d9b0928a55780a55a85c2a9d5c9408d41ef7332706616.exe
-
Size
704KB
-
MD5
312ef15433aa9018c79a6c1c9b983969
-
SHA1
31cb1c0e85af6f1323a5601785b7c4ca0d0b2676
-
SHA256
6d4225b37d1ceb0bdb9d9b0928a55780a55a85c2a9d5c9408d41ef7332706616
-
SHA512
34872b426e17523602a21dfe82816705f2fcc5ffae1a136c0a1904228cf1426f006a7b7a24a5b4b1167bb82c6cca12da3b62802af1f26f0bbd2cbd75d1e80af7
-
SSDEEP
12288:jy90112AWofnp3iWsGKyVH4IMySTTlsLlbXJKrnDY8c0o4ZKueutTaHIO:jyW2ABxyWsyVHMFslr8rnlcbk2Hv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr282707.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr282707.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr282707.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr282707.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr282707.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr282707.exe -
Executes dropped EXE 4 IoCs
pid Process 3548 un054810.exe 2776 pr282707.exe 1844 qu650328.exe 4664 si868170.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr282707.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr282707.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6d4225b37d1ceb0bdb9d9b0928a55780a55a85c2a9d5c9408d41ef7332706616.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un054810.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un054810.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6d4225b37d1ceb0bdb9d9b0928a55780a55a85c2a9d5c9408d41ef7332706616.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4212 2776 WerFault.exe 83 3024 1844 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2776 pr282707.exe 2776 pr282707.exe 1844 qu650328.exe 1844 qu650328.exe 4664 si868170.exe 4664 si868170.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2776 pr282707.exe Token: SeDebugPrivilege 1844 qu650328.exe Token: SeDebugPrivilege 4664 si868170.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5084 wrote to memory of 3548 5084 6d4225b37d1ceb0bdb9d9b0928a55780a55a85c2a9d5c9408d41ef7332706616.exe 82 PID 5084 wrote to memory of 3548 5084 6d4225b37d1ceb0bdb9d9b0928a55780a55a85c2a9d5c9408d41ef7332706616.exe 82 PID 5084 wrote to memory of 3548 5084 6d4225b37d1ceb0bdb9d9b0928a55780a55a85c2a9d5c9408d41ef7332706616.exe 82 PID 3548 wrote to memory of 2776 3548 un054810.exe 83 PID 3548 wrote to memory of 2776 3548 un054810.exe 83 PID 3548 wrote to memory of 2776 3548 un054810.exe 83 PID 3548 wrote to memory of 1844 3548 un054810.exe 88 PID 3548 wrote to memory of 1844 3548 un054810.exe 88 PID 3548 wrote to memory of 1844 3548 un054810.exe 88 PID 5084 wrote to memory of 4664 5084 6d4225b37d1ceb0bdb9d9b0928a55780a55a85c2a9d5c9408d41ef7332706616.exe 91 PID 5084 wrote to memory of 4664 5084 6d4225b37d1ceb0bdb9d9b0928a55780a55a85c2a9d5c9408d41ef7332706616.exe 91 PID 5084 wrote to memory of 4664 5084 6d4225b37d1ceb0bdb9d9b0928a55780a55a85c2a9d5c9408d41ef7332706616.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d4225b37d1ceb0bdb9d9b0928a55780a55a85c2a9d5c9408d41ef7332706616.exe"C:\Users\Admin\AppData\Local\Temp\6d4225b37d1ceb0bdb9d9b0928a55780a55a85c2a9d5c9408d41ef7332706616.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un054810.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un054810.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr282707.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr282707.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 10844⤵
- Program crash
PID:4212
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu650328.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu650328.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 19244⤵
- Program crash
PID:3024
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si868170.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si868170.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2776 -ip 27761⤵PID:2688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1844 -ip 18441⤵PID:4652
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
136KB
MD59c75a048f066d01b19ed80dc6e7a7101
SHA17d37c8ef50e8b83fcdd44032fb082f226ab3d8c3
SHA256c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625
SHA512b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33
-
Filesize
550KB
MD5d3afdb13b89e7f23fcd84bfba2804349
SHA1c7e4006911ad752e5ea253c5ef180c63da1255df
SHA2569a9363bde5596bfc1dc0013d80aa2f92e6f9b82801d8719b53a5a5db07300563
SHA512af4de0cb2697db80370222b2b18b82de59dab4f66ac14e928b4cd10a4c489647946806718d2fd4b7ee48fdd8d6e4a4123cd920318a760d3e5c7ba2517ca83465
-
Filesize
550KB
MD5d3afdb13b89e7f23fcd84bfba2804349
SHA1c7e4006911ad752e5ea253c5ef180c63da1255df
SHA2569a9363bde5596bfc1dc0013d80aa2f92e6f9b82801d8719b53a5a5db07300563
SHA512af4de0cb2697db80370222b2b18b82de59dab4f66ac14e928b4cd10a4c489647946806718d2fd4b7ee48fdd8d6e4a4123cd920318a760d3e5c7ba2517ca83465
-
Filesize
299KB
MD5c246c4e1ef02d7e6fee35cb66437da3b
SHA1c6ae7df72873d6b8011e072d393ea1dec94f4e63
SHA256504239957dc954047e787e057feca32fa8074745aaaf1b05b12ce27310bf52b4
SHA512d14c923077546fa2698be923c741dcf76cdc474f6fe0a16c9ecc8c2c1f7afa085376baa18d7808bbdf1dc92ed461dbaa2768082367be3ed76e024bdbbe88f608
-
Filesize
299KB
MD5c246c4e1ef02d7e6fee35cb66437da3b
SHA1c6ae7df72873d6b8011e072d393ea1dec94f4e63
SHA256504239957dc954047e787e057feca32fa8074745aaaf1b05b12ce27310bf52b4
SHA512d14c923077546fa2698be923c741dcf76cdc474f6fe0a16c9ecc8c2c1f7afa085376baa18d7808bbdf1dc92ed461dbaa2768082367be3ed76e024bdbbe88f608
-
Filesize
382KB
MD538a7e59f58d1ad4adac0fd751c2f6496
SHA1fe9998fb75938b1dca47cef159cc44289ba52724
SHA256fb0031bbcee8916f2a18dfa844111d2ba6655148644dee5a3979c8c5f553998b
SHA512cae5a8500f94ef5f17de0377b88fa0b42f87e0b7bb737a324efac8a60a64fe66b7441c36905b729b42bb310580defaeb30910faabdcebecf3f71985107a74103
-
Filesize
382KB
MD538a7e59f58d1ad4adac0fd751c2f6496
SHA1fe9998fb75938b1dca47cef159cc44289ba52724
SHA256fb0031bbcee8916f2a18dfa844111d2ba6655148644dee5a3979c8c5f553998b
SHA512cae5a8500f94ef5f17de0377b88fa0b42f87e0b7bb737a324efac8a60a64fe66b7441c36905b729b42bb310580defaeb30910faabdcebecf3f71985107a74103