Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    51s
  • max time network
    54s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/04/2023, 17:12

General

  • Target

    3073dd11c0885783e651d98f69206a709feeb7c7e20738cc015e639f0f728854.exe

  • Size

    560KB

  • MD5

    59e6e583ba0c81d01a4710d6069e8639

  • SHA1

    8593faaf1e4683f70e29a0427bdccd56e3e898a8

  • SHA256

    3073dd11c0885783e651d98f69206a709feeb7c7e20738cc015e639f0f728854

  • SHA512

    3b8f29f009831d2eaaa187cf216b7d3cc74f4785e2f3100e28ada00e3b9d224fa8cd0d7edb3f952972736899d77efb5f3462acc65b6a7a639e05c3c84a0f73a1

  • SSDEEP

    12288:ky90eBhX8awXSvGIAhKONb3s3w09SelOMQT3VcB4x:ky5Bxjw7IAsEc3w0llfay6x

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3073dd11c0885783e651d98f69206a709feeb7c7e20738cc015e639f0f728854.exe
    "C:\Users\Admin\AppData\Local\Temp\3073dd11c0885783e651d98f69206a709feeb7c7e20738cc015e639f0f728854.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3752
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTu0005.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTu0005.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3648
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it652537.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it652537.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3660
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp844592.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp844592.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5016
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr035688.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr035688.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:380

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr035688.exe

    Filesize

    136KB

    MD5

    49650cdcdc358bb2770f0062abeef88c

    SHA1

    d6f7ec7758e9a80700b81bc7a549838ba99aacac

    SHA256

    79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

    SHA512

    7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr035688.exe

    Filesize

    136KB

    MD5

    49650cdcdc358bb2770f0062abeef88c

    SHA1

    d6f7ec7758e9a80700b81bc7a549838ba99aacac

    SHA256

    79e2e1c24f6eb497a4c8071e93ce7ef130b28621b085a3b9ac89a4ecf1ec4e59

    SHA512

    7ca1453671b64b79f2144bb994b7768cc2320ca5da52f2e6ce4d8906f79dae4698943508678bfe02d17f2a7d7910fc42b84c3b605f1e1cea257955e64d0e02e1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTu0005.exe

    Filesize

    406KB

    MD5

    ce6152161d0b292ae929d087c2130baa

    SHA1

    ed36e4d63e898ca3fc30158f9892d7b2158ae2ce

    SHA256

    ec835eb58a70db4d255973225a4b854a89b5cc365ce54a927528e9c94d520236

    SHA512

    b0ef2a22b4914180ca2f570c8e2e98d79f6d2bcb37c87d9d925c3050710585dc74ea0318adcb20458cf25df1baaa0ab885372197d88f0795ab0e95e77975f861

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTu0005.exe

    Filesize

    406KB

    MD5

    ce6152161d0b292ae929d087c2130baa

    SHA1

    ed36e4d63e898ca3fc30158f9892d7b2158ae2ce

    SHA256

    ec835eb58a70db4d255973225a4b854a89b5cc365ce54a927528e9c94d520236

    SHA512

    b0ef2a22b4914180ca2f570c8e2e98d79f6d2bcb37c87d9d925c3050710585dc74ea0318adcb20458cf25df1baaa0ab885372197d88f0795ab0e95e77975f861

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it652537.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it652537.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp844592.exe

    Filesize

    352KB

    MD5

    02fb4702d4c2f668e01975c76f904cd8

    SHA1

    d19b6f10cf7880ef2ad670f9de523a64382d50f5

    SHA256

    d4f338f3d7e9e4ff7e4e96ecd312be86bedd6860c3e30696f95b3b04fc0f702d

    SHA512

    4456da00b314f1ca6b4e4328228ef467973287c4f7ed951d9396ecfc9709d7adf2fc086fd1a7983e0237bb778cd3c16ee8bf08ccff2fa60a985ff4c1d1513ad3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp844592.exe

    Filesize

    352KB

    MD5

    02fb4702d4c2f668e01975c76f904cd8

    SHA1

    d19b6f10cf7880ef2ad670f9de523a64382d50f5

    SHA256

    d4f338f3d7e9e4ff7e4e96ecd312be86bedd6860c3e30696f95b3b04fc0f702d

    SHA512

    4456da00b314f1ca6b4e4328228ef467973287c4f7ed951d9396ecfc9709d7adf2fc086fd1a7983e0237bb778cd3c16ee8bf08ccff2fa60a985ff4c1d1513ad3

  • memory/380-962-0x0000000000F70000-0x0000000000F98000-memory.dmp

    Filesize

    160KB

  • memory/380-963-0x0000000007D20000-0x0000000007D6B000-memory.dmp

    Filesize

    300KB

  • memory/380-964-0x0000000007D10000-0x0000000007D20000-memory.dmp

    Filesize

    64KB

  • memory/3660-135-0x0000000000BE0000-0x0000000000BEA000-memory.dmp

    Filesize

    40KB

  • memory/5016-179-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-189-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-144-0x0000000002F20000-0x0000000002F30000-memory.dmp

    Filesize

    64KB

  • memory/5016-146-0x0000000002F20000-0x0000000002F30000-memory.dmp

    Filesize

    64KB

  • memory/5016-147-0x0000000004B50000-0x0000000004B8A000-memory.dmp

    Filesize

    232KB

  • memory/5016-145-0x0000000002F20000-0x0000000002F30000-memory.dmp

    Filesize

    64KB

  • memory/5016-148-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-149-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-151-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-153-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-155-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-157-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-159-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-161-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-163-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-165-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-167-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-169-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-171-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-173-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-175-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-177-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-142-0x0000000004870000-0x00000000048AC000-memory.dmp

    Filesize

    240KB

  • memory/5016-181-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-183-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-185-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-187-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-143-0x00000000071F0000-0x00000000076EE000-memory.dmp

    Filesize

    5.0MB

  • memory/5016-191-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-193-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-195-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-197-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-199-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-201-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-203-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-205-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-207-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-209-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-211-0x0000000004B50000-0x0000000004B85000-memory.dmp

    Filesize

    212KB

  • memory/5016-940-0x0000000009B70000-0x000000000A176000-memory.dmp

    Filesize

    6.0MB

  • memory/5016-941-0x000000000A210000-0x000000000A222000-memory.dmp

    Filesize

    72KB

  • memory/5016-942-0x000000000A240000-0x000000000A34A000-memory.dmp

    Filesize

    1.0MB

  • memory/5016-943-0x000000000A360000-0x000000000A39E000-memory.dmp

    Filesize

    248KB

  • memory/5016-944-0x000000000A3E0000-0x000000000A42B000-memory.dmp

    Filesize

    300KB

  • memory/5016-945-0x0000000002F20000-0x0000000002F30000-memory.dmp

    Filesize

    64KB

  • memory/5016-946-0x000000000A670000-0x000000000A6D6000-memory.dmp

    Filesize

    408KB

  • memory/5016-947-0x000000000AD20000-0x000000000ADB2000-memory.dmp

    Filesize

    584KB

  • memory/5016-949-0x000000000ADF0000-0x000000000AE66000-memory.dmp

    Filesize

    472KB

  • memory/5016-950-0x000000000AEB0000-0x000000000B072000-memory.dmp

    Filesize

    1.8MB

  • memory/5016-951-0x000000000B090000-0x000000000B5BC000-memory.dmp

    Filesize

    5.2MB

  • memory/5016-952-0x000000000B6F0000-0x000000000B70E000-memory.dmp

    Filesize

    120KB

  • memory/5016-141-0x0000000002E20000-0x0000000002E66000-memory.dmp

    Filesize

    280KB

  • memory/5016-953-0x0000000006D40000-0x0000000006D90000-memory.dmp

    Filesize

    320KB

  • memory/5016-956-0x0000000002F20000-0x0000000002F30000-memory.dmp

    Filesize

    64KB

  • memory/5016-958-0x0000000002F20000-0x0000000002F30000-memory.dmp

    Filesize

    64KB

  • memory/5016-957-0x0000000002F20000-0x0000000002F30000-memory.dmp

    Filesize

    64KB