Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/04/2023, 10:00

General

  • Target

    28868b744806c0bf7f8eb6a8338a7062376d94e2b16186c9e85852cc0f35018e.exe

  • Size

    568KB

  • MD5

    23e8935b635812ad8d02970a8fe7b0ce

  • SHA1

    d0b06fe48c7766aeefb9b1fdcb0baac191e3e5a6

  • SHA256

    28868b744806c0bf7f8eb6a8338a7062376d94e2b16186c9e85852cc0f35018e

  • SHA512

    2ac8aea6b36e83c3aa409d4756e60e6a8ee8e0d37e3930afdfc737fbc5bb2ba8dbc8a9e65a32ddfcc0f606bd0eca2f7f7ddaf9aa5583a074e049d9be81546917

  • SSDEEP

    12288:jy90BPbmi0jjLusWkAJxE9JaOzoc6/zz8DYOFXX:jydiEGjvEPxmUYOFH

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28868b744806c0bf7f8eb6a8338a7062376d94e2b16186c9e85852cc0f35018e.exe
    "C:\Users\Admin\AppData\Local\Temp\28868b744806c0bf7f8eb6a8338a7062376d94e2b16186c9e85852cc0f35018e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioL9172.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioL9172.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2500
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it885870.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it885870.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2756
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp325849.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp325849.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2940
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr436676.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr436676.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1564

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr436676.exe

    Filesize

    136KB

    MD5

    49650cdcdc358bb2770f0062abeef88c

    SHA1

    d6f7ec7758e9a80700b81bc7a549838ba99aacac

    SHA256

    79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

    SHA512

    7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr436676.exe

    Filesize

    136KB

    MD5

    49650cdcdc358bb2770f0062abeef88c

    SHA1

    d6f7ec7758e9a80700b81bc7a549838ba99aacac

    SHA256

    79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

    SHA512

    7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioL9172.exe

    Filesize

    414KB

    MD5

    198780333ec861afed792bb7b3f20a04

    SHA1

    49ac0c162d42cf286039f76536d428423e16f27e

    SHA256

    328a37b65192bb1c98439e0aa14a6b6f7276e73e46b128c71799350160303138

    SHA512

    ecf30305e2827ffb6e41e4dbefb8ed073f6d3e1ccbbb510711c10ab61e00b324900ccd212368da3fa7f2630b27b1f699f7b2cca2a6cbaf24ab60d8f03afe9a81

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioL9172.exe

    Filesize

    414KB

    MD5

    198780333ec861afed792bb7b3f20a04

    SHA1

    49ac0c162d42cf286039f76536d428423e16f27e

    SHA256

    328a37b65192bb1c98439e0aa14a6b6f7276e73e46b128c71799350160303138

    SHA512

    ecf30305e2827ffb6e41e4dbefb8ed073f6d3e1ccbbb510711c10ab61e00b324900ccd212368da3fa7f2630b27b1f699f7b2cca2a6cbaf24ab60d8f03afe9a81

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it885870.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it885870.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp325849.exe

    Filesize

    362KB

    MD5

    f02edfbc7b6690eba1da6bc740f7db6a

    SHA1

    1d578d41a18beccf401355044a1de23672392b34

    SHA256

    0fe8c677b6942f31d29215c3f46ccc45ee55f9e20bf46f35bde823e6a025265c

    SHA512

    5ee445636e0512c4d450c1b6fb2b0b9d1b72c213e42360c0d2b1b57ed16a4e2cc5f05791c55e56cf6e27d066b1d844c39252f19c9af7fb615c4bd04b1c0266a3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp325849.exe

    Filesize

    362KB

    MD5

    f02edfbc7b6690eba1da6bc740f7db6a

    SHA1

    1d578d41a18beccf401355044a1de23672392b34

    SHA256

    0fe8c677b6942f31d29215c3f46ccc45ee55f9e20bf46f35bde823e6a025265c

    SHA512

    5ee445636e0512c4d450c1b6fb2b0b9d1b72c213e42360c0d2b1b57ed16a4e2cc5f05791c55e56cf6e27d066b1d844c39252f19c9af7fb615c4bd04b1c0266a3

  • memory/1564-960-0x0000000000850000-0x0000000000878000-memory.dmp

    Filesize

    160KB

  • memory/1564-961-0x0000000007600000-0x000000000764B000-memory.dmp

    Filesize

    300KB

  • memory/1564-962-0x00000000075F0000-0x0000000007600000-memory.dmp

    Filesize

    64KB

  • memory/2756-135-0x0000000000810000-0x000000000081A000-memory.dmp

    Filesize

    40KB

  • memory/2940-175-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-189-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-144-0x0000000007290000-0x00000000072A0000-memory.dmp

    Filesize

    64KB

  • memory/2940-146-0x0000000007290000-0x00000000072A0000-memory.dmp

    Filesize

    64KB

  • memory/2940-143-0x0000000007290000-0x00000000072A0000-memory.dmp

    Filesize

    64KB

  • memory/2940-147-0x0000000007130000-0x000000000716A000-memory.dmp

    Filesize

    232KB

  • memory/2940-148-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-149-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-151-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-153-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-155-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-157-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-159-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-161-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-163-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-165-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-167-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-169-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-171-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-173-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-142-0x0000000002DC0000-0x0000000002E06000-memory.dmp

    Filesize

    280KB

  • memory/2940-177-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-179-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-181-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-183-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-185-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-187-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-145-0x00000000072A0000-0x000000000779E000-memory.dmp

    Filesize

    5.0MB

  • memory/2940-191-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-195-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-193-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-197-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-199-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-201-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-203-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-205-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-207-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-209-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-211-0x0000000007130000-0x0000000007165000-memory.dmp

    Filesize

    212KB

  • memory/2940-940-0x0000000009C20000-0x000000000A226000-memory.dmp

    Filesize

    6.0MB

  • memory/2940-941-0x0000000007270000-0x0000000007282000-memory.dmp

    Filesize

    72KB

  • memory/2940-942-0x000000000A240000-0x000000000A34A000-memory.dmp

    Filesize

    1.0MB

  • memory/2940-943-0x000000000A360000-0x000000000A39E000-memory.dmp

    Filesize

    248KB

  • memory/2940-944-0x000000000A4E0000-0x000000000A52B000-memory.dmp

    Filesize

    300KB

  • memory/2940-945-0x0000000007290000-0x00000000072A0000-memory.dmp

    Filesize

    64KB

  • memory/2940-946-0x000000000A670000-0x000000000A6D6000-memory.dmp

    Filesize

    408KB

  • memory/2940-947-0x000000000AD30000-0x000000000ADC2000-memory.dmp

    Filesize

    584KB

  • memory/2940-948-0x000000000AED0000-0x000000000AF20000-memory.dmp

    Filesize

    320KB

  • memory/2940-949-0x000000000AF40000-0x000000000AFB6000-memory.dmp

    Filesize

    472KB

  • memory/2940-141-0x00000000070A0000-0x00000000070DC000-memory.dmp

    Filesize

    240KB

  • memory/2940-950-0x000000000AFE0000-0x000000000AFFE000-memory.dmp

    Filesize

    120KB

  • memory/2940-951-0x000000000B0A0000-0x000000000B262000-memory.dmp

    Filesize

    1.8MB

  • memory/2940-952-0x000000000B280000-0x000000000B7AC000-memory.dmp

    Filesize

    5.2MB

  • memory/2940-954-0x0000000007290000-0x00000000072A0000-memory.dmp

    Filesize

    64KB