Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/04/2023, 06:11

General

  • Target

    6d4225b37d1ceb0bdb9d9b0928a55780a55a85c2a9d5c9408d41ef7332706616.exe

  • Size

    704KB

  • MD5

    312ef15433aa9018c79a6c1c9b983969

  • SHA1

    31cb1c0e85af6f1323a5601785b7c4ca0d0b2676

  • SHA256

    6d4225b37d1ceb0bdb9d9b0928a55780a55a85c2a9d5c9408d41ef7332706616

  • SHA512

    34872b426e17523602a21dfe82816705f2fcc5ffae1a136c0a1904228cf1426f006a7b7a24a5b4b1167bb82c6cca12da3b62802af1f26f0bbd2cbd75d1e80af7

  • SSDEEP

    12288:jy90112AWofnp3iWsGKyVH4IMySTTlsLlbXJKrnDY8c0o4ZKueutTaHIO:jyW2ABxyWsyVHMFslr8rnlcbk2Hv

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d4225b37d1ceb0bdb9d9b0928a55780a55a85c2a9d5c9408d41ef7332706616.exe
    "C:\Users\Admin\AppData\Local\Temp\6d4225b37d1ceb0bdb9d9b0928a55780a55a85c2a9d5c9408d41ef7332706616.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5084
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un054810.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un054810.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3548
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr282707.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr282707.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2776
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 1084
          4⤵
          • Program crash
          PID:4212
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu650328.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu650328.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1844
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 1924
          4⤵
          • Program crash
          PID:3024
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si868170.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si868170.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4664
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2776 -ip 2776
    1⤵
      PID:2688
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1844 -ip 1844
      1⤵
        PID:4652

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si868170.exe

        Filesize

        136KB

        MD5

        9c75a048f066d01b19ed80dc6e7a7101

        SHA1

        7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

        SHA256

        c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

        SHA512

        b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si868170.exe

        Filesize

        136KB

        MD5

        9c75a048f066d01b19ed80dc6e7a7101

        SHA1

        7d37c8ef50e8b83fcdd44032fb082f226ab3d8c3

        SHA256

        c816d0c862e5001569f4454d0a12c7ee85a7d5afbf3abd896546bba1816d1625

        SHA512

        b70e03a3fcfd29276b36d42ae1b2fedda5de020f0279d798f9fbd1d7f4ac1f10e60cf623e173a55dc42f87d99a83fe9a8db8f6b02a349257d8a2665f84f99e33

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un054810.exe

        Filesize

        550KB

        MD5

        d3afdb13b89e7f23fcd84bfba2804349

        SHA1

        c7e4006911ad752e5ea253c5ef180c63da1255df

        SHA256

        9a9363bde5596bfc1dc0013d80aa2f92e6f9b82801d8719b53a5a5db07300563

        SHA512

        af4de0cb2697db80370222b2b18b82de59dab4f66ac14e928b4cd10a4c489647946806718d2fd4b7ee48fdd8d6e4a4123cd920318a760d3e5c7ba2517ca83465

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un054810.exe

        Filesize

        550KB

        MD5

        d3afdb13b89e7f23fcd84bfba2804349

        SHA1

        c7e4006911ad752e5ea253c5ef180c63da1255df

        SHA256

        9a9363bde5596bfc1dc0013d80aa2f92e6f9b82801d8719b53a5a5db07300563

        SHA512

        af4de0cb2697db80370222b2b18b82de59dab4f66ac14e928b4cd10a4c489647946806718d2fd4b7ee48fdd8d6e4a4123cd920318a760d3e5c7ba2517ca83465

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr282707.exe

        Filesize

        299KB

        MD5

        c246c4e1ef02d7e6fee35cb66437da3b

        SHA1

        c6ae7df72873d6b8011e072d393ea1dec94f4e63

        SHA256

        504239957dc954047e787e057feca32fa8074745aaaf1b05b12ce27310bf52b4

        SHA512

        d14c923077546fa2698be923c741dcf76cdc474f6fe0a16c9ecc8c2c1f7afa085376baa18d7808bbdf1dc92ed461dbaa2768082367be3ed76e024bdbbe88f608

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr282707.exe

        Filesize

        299KB

        MD5

        c246c4e1ef02d7e6fee35cb66437da3b

        SHA1

        c6ae7df72873d6b8011e072d393ea1dec94f4e63

        SHA256

        504239957dc954047e787e057feca32fa8074745aaaf1b05b12ce27310bf52b4

        SHA512

        d14c923077546fa2698be923c741dcf76cdc474f6fe0a16c9ecc8c2c1f7afa085376baa18d7808bbdf1dc92ed461dbaa2768082367be3ed76e024bdbbe88f608

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu650328.exe

        Filesize

        382KB

        MD5

        38a7e59f58d1ad4adac0fd751c2f6496

        SHA1

        fe9998fb75938b1dca47cef159cc44289ba52724

        SHA256

        fb0031bbcee8916f2a18dfa844111d2ba6655148644dee5a3979c8c5f553998b

        SHA512

        cae5a8500f94ef5f17de0377b88fa0b42f87e0b7bb737a324efac8a60a64fe66b7441c36905b729b42bb310580defaeb30910faabdcebecf3f71985107a74103

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu650328.exe

        Filesize

        382KB

        MD5

        38a7e59f58d1ad4adac0fd751c2f6496

        SHA1

        fe9998fb75938b1dca47cef159cc44289ba52724

        SHA256

        fb0031bbcee8916f2a18dfa844111d2ba6655148644dee5a3979c8c5f553998b

        SHA512

        cae5a8500f94ef5f17de0377b88fa0b42f87e0b7bb737a324efac8a60a64fe66b7441c36905b729b42bb310580defaeb30910faabdcebecf3f71985107a74103

      • memory/1844-226-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/1844-988-0x00000000072C0000-0x00000000072D2000-memory.dmp

        Filesize

        72KB

      • memory/1844-998-0x000000000BA70000-0x000000000BA8E000-memory.dmp

        Filesize

        120KB

      • memory/1844-997-0x000000000B440000-0x000000000B96C000-memory.dmp

        Filesize

        5.2MB

      • memory/1844-996-0x000000000B260000-0x000000000B422000-memory.dmp

        Filesize

        1.8MB

      • memory/1844-995-0x000000000AF40000-0x000000000AFB6000-memory.dmp

        Filesize

        472KB

      • memory/1844-994-0x000000000AED0000-0x000000000AF20000-memory.dmp

        Filesize

        320KB

      • memory/1844-993-0x000000000AE10000-0x000000000AEA2000-memory.dmp

        Filesize

        584KB

      • memory/1844-992-0x000000000A760000-0x000000000A7C6000-memory.dmp

        Filesize

        408KB

      • memory/1844-991-0x0000000007350000-0x0000000007360000-memory.dmp

        Filesize

        64KB

      • memory/1844-990-0x0000000007300000-0x000000000733C000-memory.dmp

        Filesize

        240KB

      • memory/1844-989-0x000000000A3B0000-0x000000000A4BA000-memory.dmp

        Filesize

        1.0MB

      • memory/1844-987-0x0000000009D90000-0x000000000A3A8000-memory.dmp

        Filesize

        6.1MB

      • memory/1844-228-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/1844-224-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/1844-222-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/1844-220-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/1844-218-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/1844-216-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/1844-214-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/1844-212-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/1844-208-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/1844-210-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/1844-191-0x0000000002BD0000-0x0000000002C16000-memory.dmp

        Filesize

        280KB

      • memory/1844-192-0x0000000007350000-0x0000000007360000-memory.dmp

        Filesize

        64KB

      • memory/1844-193-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/1844-195-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/1844-194-0x0000000007350000-0x0000000007360000-memory.dmp

        Filesize

        64KB

      • memory/1844-198-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/1844-196-0x0000000007350000-0x0000000007360000-memory.dmp

        Filesize

        64KB

      • memory/1844-200-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/1844-202-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/1844-204-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/1844-206-0x0000000004C40000-0x0000000004C75000-memory.dmp

        Filesize

        212KB

      • memory/2776-155-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/2776-148-0x0000000002BC0000-0x0000000002BED000-memory.dmp

        Filesize

        180KB

      • memory/2776-186-0x0000000000400000-0x0000000002BB5000-memory.dmp

        Filesize

        39.7MB

      • memory/2776-185-0x0000000007410000-0x0000000007420000-memory.dmp

        Filesize

        64KB

      • memory/2776-184-0x0000000007410000-0x0000000007420000-memory.dmp

        Filesize

        64KB

      • memory/2776-183-0x0000000007410000-0x0000000007420000-memory.dmp

        Filesize

        64KB

      • memory/2776-181-0x0000000000400000-0x0000000002BB5000-memory.dmp

        Filesize

        39.7MB

      • memory/2776-180-0x0000000007410000-0x0000000007420000-memory.dmp

        Filesize

        64KB

      • memory/2776-178-0x0000000007410000-0x0000000007420000-memory.dmp

        Filesize

        64KB

      • memory/2776-150-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/2776-179-0x0000000007410000-0x0000000007420000-memory.dmp

        Filesize

        64KB

      • memory/2776-173-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/2776-153-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/2776-151-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/2776-177-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/2776-171-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/2776-169-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/2776-167-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/2776-165-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/2776-163-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/2776-161-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/2776-159-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/2776-157-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/2776-149-0x0000000007420000-0x00000000079C4000-memory.dmp

        Filesize

        5.6MB

      • memory/2776-175-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/4664-1005-0x0000000000E10000-0x0000000000E38000-memory.dmp

        Filesize

        160KB

      • memory/4664-1006-0x0000000008020000-0x0000000008030000-memory.dmp

        Filesize

        64KB