Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    53s
  • max time network
    56s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/04/2023, 14:48

General

  • Target

    c52717c8117f624fe9f2a2d4963cea2b1924e6b747a5af50183125555e671983.exe

  • Size

    706KB

  • MD5

    9ba889d68f60aea2ef345fa8c9bd34c0

  • SHA1

    3327db5334d4ee9096a0cb853281ce60dabac131

  • SHA256

    c52717c8117f624fe9f2a2d4963cea2b1924e6b747a5af50183125555e671983

  • SHA512

    bb9cff4d26e945af1038b44d73eb66e90db0b5c32a8ddfba96cf1ddd757075a2892aa3dee35fdb69f0bc51c96fb4bb251681d53f2eb0fdcce9fb51983d32a43b

  • SSDEEP

    12288:Ry907EKrFJ5Tz8vJZTYprYwMROWPT1RrXZtRhv8NcpCKBKH2gUdB:Ry3oFJ5/8xZ0prYxsWP7FhgxUL

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c52717c8117f624fe9f2a2d4963cea2b1924e6b747a5af50183125555e671983.exe
    "C:\Users\Admin\AppData\Local\Temp\c52717c8117f624fe9f2a2d4963cea2b1924e6b747a5af50183125555e671983.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un519348.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un519348.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr026078.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr026078.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2840
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu877246.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu877246.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5068
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si827395.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si827395.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2464

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si827395.exe

    Filesize

    136KB

    MD5

    49650cdcdc358bb2770f0062abeef88c

    SHA1

    d6f7ec7758e9a80700b81bc7a549838ba99aacac

    SHA256

    79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

    SHA512

    7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si827395.exe

    Filesize

    136KB

    MD5

    49650cdcdc358bb2770f0062abeef88c

    SHA1

    d6f7ec7758e9a80700b81bc7a549838ba99aacac

    SHA256

    79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

    SHA512

    7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un519348.exe

    Filesize

    551KB

    MD5

    57b6370397fc687976abb939ee51896b

    SHA1

    bd2370f2c84375f5813f45af28b544eca100b088

    SHA256

    04effb58659c0092c4c86086cf6bba7d521569d9b153fb567776c625655fb5aa

    SHA512

    84837fc9298945480f246c48c078e3cf024349bf9943cc4b775728a5e5395aeeade0d85a71cd3a3e2a1bdca96bacbe0af7d1769c3fea213ad6b3574c85ec2033

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un519348.exe

    Filesize

    551KB

    MD5

    57b6370397fc687976abb939ee51896b

    SHA1

    bd2370f2c84375f5813f45af28b544eca100b088

    SHA256

    04effb58659c0092c4c86086cf6bba7d521569d9b153fb567776c625655fb5aa

    SHA512

    84837fc9298945480f246c48c078e3cf024349bf9943cc4b775728a5e5395aeeade0d85a71cd3a3e2a1bdca96bacbe0af7d1769c3fea213ad6b3574c85ec2033

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr026078.exe

    Filesize

    260KB

    MD5

    762bd392539517b0186eed87f9890b6e

    SHA1

    01d34c02f91dba3a492b7fc24263918e6691ad6c

    SHA256

    52655fd2a1cff7a85cdfbfccf0ab3ed5ffc66370c81e95b6cac644f563df07cb

    SHA512

    f3e6f490c435bf7db0eb09e13805acc6b580ca8053f428d57f8ea5dda77472693739e3e9f5bf9e00c15a401296bf888a01ae9fe07fae2ad1553a1372c2eaee76

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr026078.exe

    Filesize

    260KB

    MD5

    762bd392539517b0186eed87f9890b6e

    SHA1

    01d34c02f91dba3a492b7fc24263918e6691ad6c

    SHA256

    52655fd2a1cff7a85cdfbfccf0ab3ed5ffc66370c81e95b6cac644f563df07cb

    SHA512

    f3e6f490c435bf7db0eb09e13805acc6b580ca8053f428d57f8ea5dda77472693739e3e9f5bf9e00c15a401296bf888a01ae9fe07fae2ad1553a1372c2eaee76

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu877246.exe

    Filesize

    343KB

    MD5

    a142f01130ccc59408ab0ec87a9bb66f

    SHA1

    8d50e24264c469e9c8547f8e76b70188128cee74

    SHA256

    c34ab32f9021ea9934157349984b3dfa3bf35c1281bd88df3b884b43e4efad3b

    SHA512

    bd97bb886af871316d03861f960d4cc43589fccaecd33259c0cde2598f647c4edc0b3978f61817b3543356eb15d76a52e5054eb707e116211a3554a457577ea3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu877246.exe

    Filesize

    343KB

    MD5

    a142f01130ccc59408ab0ec87a9bb66f

    SHA1

    8d50e24264c469e9c8547f8e76b70188128cee74

    SHA256

    c34ab32f9021ea9934157349984b3dfa3bf35c1281bd88df3b884b43e4efad3b

    SHA512

    bd97bb886af871316d03861f960d4cc43589fccaecd33259c0cde2598f647c4edc0b3978f61817b3543356eb15d76a52e5054eb707e116211a3554a457577ea3

  • memory/2464-994-0x0000000000C80000-0x0000000000CA8000-memory.dmp

    Filesize

    160KB

  • memory/2464-995-0x0000000007A30000-0x0000000007A7B000-memory.dmp

    Filesize

    300KB

  • memory/2464-996-0x00000000079A0000-0x00000000079B0000-memory.dmp

    Filesize

    64KB

  • memory/2840-143-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2840-155-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2840-141-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

    Filesize

    64KB

  • memory/2840-138-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2840-142-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2840-139-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

    Filesize

    64KB

  • memory/2840-145-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2840-147-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2840-149-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2840-151-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2840-153-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2840-140-0x00000000023C0000-0x00000000023D8000-memory.dmp

    Filesize

    96KB

  • memory/2840-157-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2840-159-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2840-161-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2840-163-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2840-165-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2840-167-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2840-169-0x00000000023C0000-0x00000000023D2000-memory.dmp

    Filesize

    72KB

  • memory/2840-170-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2840-171-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

    Filesize

    64KB

  • memory/2840-173-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2840-137-0x0000000004AF0000-0x0000000004FEE000-memory.dmp

    Filesize

    5.0MB

  • memory/2840-136-0x0000000002210000-0x000000000222A000-memory.dmp

    Filesize

    104KB

  • memory/5068-181-0x0000000002630000-0x0000000002665000-memory.dmp

    Filesize

    212KB

  • memory/5068-213-0x0000000002630000-0x0000000002665000-memory.dmp

    Filesize

    212KB

  • memory/5068-183-0x0000000002630000-0x0000000002665000-memory.dmp

    Filesize

    212KB

  • memory/5068-185-0x0000000002630000-0x0000000002665000-memory.dmp

    Filesize

    212KB

  • memory/5068-187-0x0000000002630000-0x0000000002665000-memory.dmp

    Filesize

    212KB

  • memory/5068-189-0x0000000002630000-0x0000000002665000-memory.dmp

    Filesize

    212KB

  • memory/5068-191-0x0000000002630000-0x0000000002665000-memory.dmp

    Filesize

    212KB

  • memory/5068-192-0x00000000004E0000-0x0000000000526000-memory.dmp

    Filesize

    280KB

  • memory/5068-194-0x00000000026D0000-0x00000000026E0000-memory.dmp

    Filesize

    64KB

  • memory/5068-196-0x00000000026D0000-0x00000000026E0000-memory.dmp

    Filesize

    64KB

  • memory/5068-195-0x0000000002630000-0x0000000002665000-memory.dmp

    Filesize

    212KB

  • memory/5068-198-0x00000000026D0000-0x00000000026E0000-memory.dmp

    Filesize

    64KB

  • memory/5068-199-0x0000000002630000-0x0000000002665000-memory.dmp

    Filesize

    212KB

  • memory/5068-201-0x0000000002630000-0x0000000002665000-memory.dmp

    Filesize

    212KB

  • memory/5068-203-0x0000000002630000-0x0000000002665000-memory.dmp

    Filesize

    212KB

  • memory/5068-205-0x0000000002630000-0x0000000002665000-memory.dmp

    Filesize

    212KB

  • memory/5068-207-0x0000000002630000-0x0000000002665000-memory.dmp

    Filesize

    212KB

  • memory/5068-209-0x0000000002630000-0x0000000002665000-memory.dmp

    Filesize

    212KB

  • memory/5068-211-0x0000000002630000-0x0000000002665000-memory.dmp

    Filesize

    212KB

  • memory/5068-180-0x0000000002630000-0x0000000002665000-memory.dmp

    Filesize

    212KB

  • memory/5068-215-0x0000000002630000-0x0000000002665000-memory.dmp

    Filesize

    212KB

  • memory/5068-217-0x0000000002630000-0x0000000002665000-memory.dmp

    Filesize

    212KB

  • memory/5068-976-0x00000000074D0000-0x0000000007AD6000-memory.dmp

    Filesize

    6.0MB

  • memory/5068-977-0x0000000007B20000-0x0000000007B32000-memory.dmp

    Filesize

    72KB

  • memory/5068-978-0x0000000007B50000-0x0000000007C5A000-memory.dmp

    Filesize

    1.0MB

  • memory/5068-979-0x0000000007C70000-0x0000000007CAE000-memory.dmp

    Filesize

    248KB

  • memory/5068-980-0x0000000007CF0000-0x0000000007D3B000-memory.dmp

    Filesize

    300KB

  • memory/5068-981-0x00000000026D0000-0x00000000026E0000-memory.dmp

    Filesize

    64KB

  • memory/5068-982-0x0000000007F80000-0x0000000007FE6000-memory.dmp

    Filesize

    408KB

  • memory/5068-983-0x0000000008640000-0x00000000086D2000-memory.dmp

    Filesize

    584KB

  • memory/5068-984-0x00000000086F0000-0x0000000008766000-memory.dmp

    Filesize

    472KB

  • memory/5068-985-0x00000000087C0000-0x0000000008982000-memory.dmp

    Filesize

    1.8MB

  • memory/5068-179-0x0000000002630000-0x000000000266A000-memory.dmp

    Filesize

    232KB

  • memory/5068-178-0x0000000002190000-0x00000000021CC000-memory.dmp

    Filesize

    240KB

  • memory/5068-986-0x00000000089A0000-0x0000000008ECC000-memory.dmp

    Filesize

    5.2MB

  • memory/5068-987-0x0000000009000000-0x000000000901E000-memory.dmp

    Filesize

    120KB

  • memory/5068-988-0x0000000002590000-0x00000000025E0000-memory.dmp

    Filesize

    320KB