Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    62s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/04/2023, 16:57

General

  • Target

    df5636aa81be20bade6800b157c2551f11e3c60c46e1f5a951af76a0a345266e.exe

  • Size

    559KB

  • MD5

    47deaf6a29ee08f22aeb9935f9fcae39

  • SHA1

    30474e8e2ab0a91cfa32e270e5b14aa5cdb62cd1

  • SHA256

    df5636aa81be20bade6800b157c2551f11e3c60c46e1f5a951af76a0a345266e

  • SHA512

    06dfe4da830cbd95cc5b3f6f8b462fc1feb4cb2a8dc293b86d8a6f9b7bd7d71b288d634997a894ca6069103179cb4baf7bb455f3ca03ede2845c18b6704a3b1e

  • SSDEEP

    12288:Dy90dQqwVpimY4eJzG4/cF39fKMV5bBhne7Vn6Iru0iV:Dye9Epi34gkl9C6NZe7hib

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df5636aa81be20bade6800b157c2551f11e3c60c46e1f5a951af76a0a345266e.exe
    "C:\Users\Admin\AppData\Local\Temp\df5636aa81be20bade6800b157c2551f11e3c60c46e1f5a951af76a0a345266e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4504
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizS1424.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizS1424.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1836
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it269852.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it269852.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1268
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp613351.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp613351.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3724
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 1716
          4⤵
          • Program crash
          PID:1912
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr680286.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr680286.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2472
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3724 -ip 3724
    1⤵
      PID:4020

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr680286.exe

      Filesize

      136KB

      MD5

      49650cdcdc358bb2770f0062abeef88c

      SHA1

      d6f7ec7758e9a80700b81bc7a549838ba99aacac

      SHA256

      79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

      SHA512

      7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr680286.exe

      Filesize

      136KB

      MD5

      49650cdcdc358bb2770f0062abeef88c

      SHA1

      d6f7ec7758e9a80700b81bc7a549838ba99aacac

      SHA256

      79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

      SHA512

      7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizS1424.exe

      Filesize

      405KB

      MD5

      b883b9327842da8f490c8fa85a2ba320

      SHA1

      44f138a3b95ac8d263a049971cb1b9fa9f6cf9e1

      SHA256

      57247cb6eb21cfa11364df83eb68a60df1db68595e78b9934ecba2706cefb84e

      SHA512

      e67b8322bb9cb252465c611f2b41a50d60d07f7cd234d7f180fde71160137b0099f1aac42a7fae28bf3e5b54bab609a14e3df386fef2d52bb869dc8fc648d5bf

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizS1424.exe

      Filesize

      405KB

      MD5

      b883b9327842da8f490c8fa85a2ba320

      SHA1

      44f138a3b95ac8d263a049971cb1b9fa9f6cf9e1

      SHA256

      57247cb6eb21cfa11364df83eb68a60df1db68595e78b9934ecba2706cefb84e

      SHA512

      e67b8322bb9cb252465c611f2b41a50d60d07f7cd234d7f180fde71160137b0099f1aac42a7fae28bf3e5b54bab609a14e3df386fef2d52bb869dc8fc648d5bf

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it269852.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it269852.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp613351.exe

      Filesize

      352KB

      MD5

      6a988d4b194c77b9d4338aad00ab35d3

      SHA1

      8709839a1556f38c1fd5ff43ca62490b5b3b3304

      SHA256

      fe62a5c9778cbc498e898ca16aeae0f3ddfc195a3b780126404c04e4759986b5

      SHA512

      70dbd7f33e746449524251fa73703e2167f479fec3bb60b6a5b4e41a0f69beeac9d65b169be7bb3fb74b8f6c201c371eabe2ec91a4cce0d5cb80c8fe2a40a02a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp613351.exe

      Filesize

      352KB

      MD5

      6a988d4b194c77b9d4338aad00ab35d3

      SHA1

      8709839a1556f38c1fd5ff43ca62490b5b3b3304

      SHA256

      fe62a5c9778cbc498e898ca16aeae0f3ddfc195a3b780126404c04e4759986b5

      SHA512

      70dbd7f33e746449524251fa73703e2167f479fec3bb60b6a5b4e41a0f69beeac9d65b169be7bb3fb74b8f6c201c371eabe2ec91a4cce0d5cb80c8fe2a40a02a

    • memory/1268-147-0x0000000000EF0000-0x0000000000EFA000-memory.dmp

      Filesize

      40KB

    • memory/2472-968-0x0000000000220000-0x0000000000248000-memory.dmp

      Filesize

      160KB

    • memory/2472-969-0x0000000006F80000-0x0000000006F90000-memory.dmp

      Filesize

      64KB

    • memory/3724-185-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-197-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-155-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-156-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-158-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-160-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-162-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-164-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-166-0x0000000004A00000-0x0000000004A10000-memory.dmp

      Filesize

      64KB

    • memory/3724-168-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-167-0x0000000004A00000-0x0000000004A10000-memory.dmp

      Filesize

      64KB

    • memory/3724-171-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-173-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-169-0x0000000004A00000-0x0000000004A10000-memory.dmp

      Filesize

      64KB

    • memory/3724-175-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-177-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-179-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-181-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-183-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-153-0x0000000002CA0000-0x0000000002CE6000-memory.dmp

      Filesize

      280KB

    • memory/3724-187-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-189-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-191-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-193-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-195-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-154-0x00000000071B0000-0x0000000007754000-memory.dmp

      Filesize

      5.6MB

    • memory/3724-199-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-201-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-203-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-205-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-207-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-209-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-211-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-213-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-215-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-217-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-219-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-221-0x00000000077A0000-0x00000000077D5000-memory.dmp

      Filesize

      212KB

    • memory/3724-950-0x0000000009CA0000-0x000000000A2B8000-memory.dmp

      Filesize

      6.1MB

    • memory/3724-951-0x000000000A320000-0x000000000A332000-memory.dmp

      Filesize

      72KB

    • memory/3724-952-0x000000000A340000-0x000000000A44A000-memory.dmp

      Filesize

      1.0MB

    • memory/3724-953-0x000000000A460000-0x000000000A49C000-memory.dmp

      Filesize

      240KB

    • memory/3724-954-0x0000000004A00000-0x0000000004A10000-memory.dmp

      Filesize

      64KB

    • memory/3724-955-0x000000000A760000-0x000000000A7C6000-memory.dmp

      Filesize

      408KB

    • memory/3724-956-0x000000000AE30000-0x000000000AEC2000-memory.dmp

      Filesize

      584KB

    • memory/3724-957-0x000000000AEE0000-0x000000000AF56000-memory.dmp

      Filesize

      472KB

    • memory/3724-958-0x000000000AF90000-0x000000000AFAE000-memory.dmp

      Filesize

      120KB

    • memory/3724-959-0x000000000B2B0000-0x000000000B472000-memory.dmp

      Filesize

      1.8MB

    • memory/3724-960-0x000000000B480000-0x000000000B9AC000-memory.dmp

      Filesize

      5.2MB

    • memory/3724-961-0x0000000004CB0000-0x0000000004D00000-memory.dmp

      Filesize

      320KB